Bitcoin Forum
May 31, 2024, 01:16:55 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Hack of the DAO system. MAIN MINER attack.  (Read 85 times)
WadymMC (OP)
Newbie
*
Offline Offline

Activity: 1
Merit: 0


View Profile
January 15, 2018, 01:21:04 AM
Last edit: January 15, 2018, 01:39:13 AM by WadymMC
 #1

(Sorry for my English)
Hello, world.
Fist of all I must say that I no holder eny crypto money. Eny holding crypto money lies in the sphere of my scientific interes - reseach of weakness of systems. So...
Attack "MAIN MINER" (more MM)
more google translation...
The attack of MM is the result of the system's cryptographic security methods which are based on 32 byte hash key. Looking ahead, I will say that this does not allow to destroy the system or take over it full control as Sybil's attack (This possibility has not yet been studied. Next, I will talk about the results already achieved in part.). MM allows only to destroy the "infrastructure" of network miners :-) More precisely - consolidate all mining in a narrow circle. This feature was discovered by chance when studying the program code of mining for the CPU (yes, not even the GPU, ASIC). That gives grounds to assume the reality of the MM attack using only a small part of the power of a decentralized network. According to the preliminary (!!!) estimates, this is not more than 20% (in reality under certain conditions it will be much less) of the network that uses the mechanics of the PoW consensus. Even less PoW & PoS (20% - exp/100%). And even less PoS (exp func). For each DAO, its CRITICAL values, but in any case, this inherent property of DAO mining (I do not know how to put it more accurately in English) results in higher mining (CPU) at a peer. It's not about OPTIMIZATION code for CPU mining. This is a complete rewrite of it for a hack MM attack in a 32 byte hash-based crypto system. Add to this GitHub open codes where the process of validation hash-code is visually shown that significantly reduces its cryptostability and makes MM even easier.
In simple language ... All that stands between your crypto money and an intruder is not even the encryption algorithms. But 32 byte hash-code. Understand my main idea ... The power of the DAO network is huge, it exceeds the power of all supercomputers in the world many times, but it gives birth to the MM-atack. Just a small part of this powerful network for hacking 32-byte hash.
This is all...
Exact mathematical calculations it makes sense to debug only for a certain DAO. And perhaps will be laid out later, after more detailed studies.
At the moment:
There are studies for the GPU, ASIC in the implementation of the MM attack.
Discusses the formation of POOL for power consolidation to study the sustainability of individual DAOs to MM-atack.
Conducting experiments with DASH (This is not an accidental choice. This is not a crude system. Positioning itself as a crypto protected currency, And most importantly, it has X11 crypto algorithm, which gives us some advantages over other DAOs at the initial stage, as long as we do not have enough power of hardware).
Our mission is not making money, crashing currencies or raising it. The main thing is the work on the stability of the DAO's systems.
Good luck to all...  Smiley

P.S. Greed is a vice. Remember this.
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!