We know that mining can't be used here because CfB has stated that it undermines the security model.
Can someone link me to that and/or the relevant page of the white paper? Seems to be mining could be used to generate check points. That was one of tweaks I had in mind.
PoS can be used for that as well.