Bitcoin Forum
May 03, 2024, 12:42:09 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Rogue bitcoin nodes.  (Read 1347 times)
Wipeout2097 (OP)
Sr. Member
****
Offline Offline

Activity: 840
Merit: 255


SportsIcon - Connect With Your Sports Heroes


View Profile
October 01, 2013, 10:26:56 AM
 #1

Quick question: can or cannot a powerful actor, like an opressive government compromise bitcoin? For example, run multiple rogue bitcoin full nodes and modifying source code according to their best interest. What is the worst that can happen?

Thanks.

███████████████████████████████████████████████████████████████
██▀       ▀█       ▀████████████        ▀█         █▀       ▀██
██   ▀██▄▄▄█   ██   ████████████   ███   ████   ████   ▀██▄▄▄██
███▄     ▀██       ▄████████████       ▄█████   █████▄     ▀███
██▀▀▀██▄   █   █████████████████   █▄  ▀█████   ████▀▀▀██▄   ██
██▄       ▄█   █████████████████   ██▄  ▀████   ████▄       ▄██
███████████████████████████████████████████████████████████████
██       ██▀      ▀█████████████    ▀██   █████████████████████
████   ███   ▄██▄   ████████████     ▀█   █████████████████████
████   ███   ████████   ████   █   ▄  ▀   █████████████████████
████   ███   ▀██▀   █   ████   █   █▄     █████████████████████
██       ██▄      ▄███        ██   ██▄    █████████████████████
███████████████████████████████████████████████████████████████
██████████████
██
██
██
██
██
██
██
██
██
██
██
██████████████
████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████                                                             ████████████████████████████████████████████████
.
.
.

████████████████████████████████████████████████████████████          ████████████████                                 ██████████████████████████████████████████████████████████████████████████████████████
██████████████
██
██
██
██
██
██
██
██
██
██
██
██████████████
███████
██
██
██
██
██
██
██
██
██
██
██
███████
███████
██
██
██
██
██
██
██
██
██
██
██
███████
►►  Powered by
BOUNTY
DETECTIVE
1714696929
Hero Member
*
Offline Offline

Posts: 1714696929

View Profile Personal Message (Offline)

Ignore
1714696929
Reply with quote  #2

1714696929
Report to moderator
Each block is stacked on top of the previous one. Adding another block to the top makes all lower blocks more difficult to remove: there is more "weight" above each block. A transaction in a block 6 blocks deep (6 confirmations) will be very difficult to remove.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
jackjack
Legendary
*
Offline Offline

Activity: 1176
Merit: 1233


May Bitcoin be touched by his Noodly Appendage


View Profile
October 01, 2013, 11:00:53 AM
 #2

What is the worst that can happen?
Nothing

Own address: 19QkqAza7BHFTuoz9N8UQkryP4E9jHo4N3 - Pywallet support: 1AQDfx22pKGgXnUZFL1e4UKos3QqvRzNh5 - Bitcointalk++ script support: 1Pxeccscj1ygseTdSV1qUqQCanp2B2NMM2
Pywallet: instructions. Encrypted wallet support, export/import keys/addresses, backup wallets, export/import CSV data from/into wallet, merge wallets, delete/import addresses and transactions, recover altcoins sent to bitcoin addresses, sign/verify messages and files with Bitcoin addresses, recover deleted wallets, etc.
justusranvier
Legendary
*
Offline Offline

Activity: 1400
Merit: 1009



View Profile
October 01, 2013, 12:11:47 PM
 #3

How can a node have a colour anyway?
Raoul Duke
aka psy
Legendary
*
Offline Offline

Activity: 1358
Merit: 1002



View Profile
October 01, 2013, 12:22:45 PM
 #4

How can a node have a colour anyway?

http://grammarist.com/spelling/rogue-rouge/
drawingthesun
Legendary
*
Offline Offline

Activity: 1176
Merit: 1015


View Profile
October 01, 2013, 12:49:21 PM
 #5

Quick question: can or cannot a powerful actor, like an opressive government compromise bitcoin? For example, run multiple rogue bitcoin full nodes and modifying source code according to their best interest. What is the worst that can happen?

Thanks.

If the government run a billion nodes, far more than the amount of nodes currently running and all those nodes tried to block a payment then what happens? Have a little think about it. Those nodes can't influence the miners and the legitimate nodes. All that would happen is the government nodes would be changing rules but those rules would just be for themselves, the government would end up with an odd alternative bitcoin network that means nothing to the outside world.

The only time they can influence the real bitcoin network is if they forced every bitcoin user to use their version of the code as a node. Of course this is an exponentially harder problem than simply having more mining power than the network.

So the nodes are not an issue. Only having majority control of the miners matters. The government can own 99.999% of all the nodes, but because no real commerce will be done with those nodes it does not matter.
behindtext
Full Member
***
Offline Offline

Activity: 121
Merit: 103


View Profile WWW
October 01, 2013, 02:09:09 PM
 #6

Quick question: can or cannot a powerful actor, like an opressive government compromise bitcoin? For example, run multiple rogue bitcoin full nodes and modifying source code according to their best interest. What is the worst that can happen?

Thanks.
the worst case is that the USG or some other large-scale actor has ASICs that can beat the shit out of everything created publicly thus far. in this case they can rewrite, i.e. spoof, the entire blockchain since the last checkpoint. however, this is highly unlikely and would blow their cover since there is no plausibly deniable story for what happened besides "we decided to take over your chain, dawg". i know some ppl have a distaste for checkpoints, but i think they are a good idea.

as i stated above, such an attack would be rather overt and would likely tip the hand of an attacker. once you know someone knows, you know you need to adjust your behavior (hawthorne effect). lesser attacks would be 51% attacks but these suffer from the same hawthorne effect mechanism i just referenced.

overall, the system is quite secure unless a large group with advanced crypto knowledge, tons of money and serious hw chops were to openly attempt to shut it down.

Stephen Gornick
Legendary
*
Offline Offline

Activity: 2506
Merit: 1010


View Profile
October 01, 2013, 06:16:40 PM
 #7

The government can own 99.999% of all the nodes, but because no real commerce will be done with those nodes it does not matter.

From a related thread:

Short summary: An attacker could run tens of thousands of Bitcoin clients to isolate certain nodes from the network and then double-spend his coins.

That's actually a very hard attack to successfully pull off; I file it under "theoretically worrisome, but practically not a high priority."

It is hard because: [...]

Unichange.me

            █
            █
            █
            █
            █
            █
            █
            █
            █
            █
            █
            █
            █
            █
            █
            █


drawingthesun
Legendary
*
Offline Offline

Activity: 1176
Merit: 1015


View Profile
October 01, 2013, 06:21:25 PM
 #8

The government can own 99.999% of all the nodes, but because no real commerce will be done with those nodes it does not matter.

From a related thread:

Short summary: An attacker could run tens of thousands of Bitcoin clients to isolate certain nodes from the network and then double-spend his coins.

That's actually a very hard attack to successfully pull off; I file it under "theoretically worrisome, but practically not a high priority."

It is hard because: [...]


Oh wow that is an interesting attack. Run so many nodes as to isolate legitimate ones.

I wonder what possible solutions exit?
jedunnigan
Sr. Member
****
Offline Offline

Activity: 279
Merit: 250


View Profile
October 02, 2013, 03:33:09 AM
 #9

Running lots of nodes is not an effective attack vector if you are looking to disrupt the workings of the network.

Running a significant portion of nodes could be used, however, to unmask the identity of someone behind a transaction. If a malicious entity is connected to every node it is easy to figure out who is who. The first node to propagate a transaction is presumably one of the parties involved in the transaction... thus you now know the origin IP of the transaction.
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!