Bitcoin Forum
November 03, 2024, 11:25:15 PM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Great explanation about 51% attack on Alts.  (Read 837 times)
nawazish1 (OP)
Sr. Member
****
Offline Offline

Activity: 462
Merit: 250


PXC Research Team


View Profile
June 22, 2013, 08:39:52 AM
 #1

Hello Guys,

Here is a really good explanation of 51% attack on altcoin for those who want to know what 51% attack is.


http://www.bitcoinmoney.com/post/53207712103/your-bitcoins-are-not-safe-at-alt-coin-exchanges

Edit: If I helped someone feel free to share some wealth. Grin

PXC: PmfFgdwwcXPa1QUmtVJevdPfHhmhztHHCv
BTC: 1P22tVABsd85L7kkpTmohCv5vK2BypFz3H
Phoenixcoin (PXC), a decentralised open source digital currency.
Oldminer
Legendary
*
Offline Offline

Activity: 1022
Merit: 1001



View Profile
June 22, 2013, 09:25:16 PM
 #2

Good read, but this specifically refers to an intentional attack. What about 'accidental' forks due to someone or a pool having more than 51% of the net hash rate? Is this possible?

If you like my post please feel free to give me some positive rep https://bitcointalk.org/index.php?action=trust;u=18639
Tip me BTC: 1FBmoYijXVizfYk25CpiN8Eds9J6YiRDaX
peonminer
Hero Member
*****
Offline Offline

Activity: 798
Merit: 531


Crypto is King.


View Profile
June 22, 2013, 09:34:53 PM
 #3

Good read, but this specifically refers to an intentional attack. What about 'accidental' forks due to someone or a pool having more than 51% of the net hash rate? Is this possible?
Most certainly Watson. Although, a responsible pool owner will put in an auto script to halt new members from registering and overpowering the network.
tacotime
Legendary
*
Offline Offline

Activity: 1484
Merit: 1005



View Profile
June 22, 2013, 09:38:30 PM
 #4

Accidental forks are created from bugs in software making two distinct forks with clients from one version only seeing one valid, while clients from the other version only see the other as valid (see BIP 0050).

If a pool has 51% of the hash rate (or more) it's not a problem for the network unless the pool owner (or a hacker with administrative privileges to that pool) decides he wants to start hiding his chain from the network.

PoW 51% + doublespend in a few words:
1) Everyone else has <50% of hash and is mining a chain.
2) Attacker mines a longer chain in secret, not reporting it to the network.  Attacker can do this because he has more hash power.
3) Attacker spends on the <50% fork, waits for 6 (or whatever) confs to get it to spend at the exchange, then exchanges it for cash or whatever.
4) Attacker dumps his chain onto the network.  Entire network invalidates the <50% chain, replacing it with the attacker's chain.  Attacker's coins are now returned to him to respend at will.  Not only this, but all the blocks mined in the <50% chain are now invalidated, so everyone not the attacker loses their blockrewards.

So, end result is that attacker gets 100% of the network coins from block reward and can double spend freely.

Code:
XMR: 44GBHzv6ZyQdJkjqZje6KLZ3xSyN1hBSFAnLP6EAqJtCRVzMzZmeXTC2AHKDS9aEDTRKmo6a6o9r9j86pYfhCWDkKjbtcns
Oldminer
Legendary
*
Offline Offline

Activity: 1022
Merit: 1001



View Profile
June 22, 2013, 09:48:20 PM
 #5

Accidental forks are created from bugs in software making two distinct forks with clients from one version only seeing one valid, while clients from the other version only see the other as valid (see BIP 0050).

If a pool has 51% of the hash rate (or more) it's not a problem for the network unless the pool owner (or a hacker with administrative privileges to that pool) decides he wants to start hiding his chain from the network.

PoW 51% + doublespend in a few words:
1) Everyone else has <50% of hash and is mining a chain.
2) Attacker mines a longer chain in secret, not reporting it to the network.  Attacker can do this because he has more hash power.
3) Attacker spends on the <50% fork, waits for 6 (or whatever) confs to get it to spend at the exchange, then exchanges it for cash or whatever.
4) Attacker dumps his chain onto the network.  Entire network invalidates the <50% chain, replacing it with the attacker's chain.  Attacker's coins are now returned to him to respend at will.  Not only this, but all the blocks mined in the <50% chain are now invalidated, so everyone not the attacker loses their blockrewards.

So, end result is that attacker gets 100% of the network coins from block reward and can double spend freely.

Great explanation. Thankyou  Smiley

If you like my post please feel free to give me some positive rep https://bitcointalk.org/index.php?action=trust;u=18639
Tip me BTC: 1FBmoYijXVizfYk25CpiN8Eds9J6YiRDaX
nawazish1 (OP)
Sr. Member
****
Offline Offline

Activity: 462
Merit: 250


PXC Research Team


View Profile
June 22, 2013, 09:58:40 PM
 #6

Accidental forks are created from bugs in software making two distinct forks with clients from one version only seeing one valid, while clients from the other version only see the other as valid (see BIP 0050).

If a pool has 51% of the hash rate (or more) it's not a problem for the network unless the pool owner (or a hacker with administrative privileges to that pool) decides he wants to start hiding his chain from the network.

PoW 51% + doublespend in a few words:
1) Everyone else has <50% of hash and is mining a chain.
2) Attacker mines a longer chain in secret, not reporting it to the network.  Attacker can do this because he has more hash power.
3) Attacker spends on the <50% fork, waits for 6 (or whatever) confs to get it to spend at the exchange, then exchanges it for cash or whatever.
4) Attacker dumps his chain onto the network.  Entire network invalidates the <50% chain, replacing it with the attacker's chain.  Attacker's coins are now returned to him to respend at will.  Not only this, but all the blocks mined in the <50% chain are now invalidated, so everyone not the attacker loses their blockrewards.

So, end result is that attacker gets 100% of the network coins from block reward and can double spend freely.

The link I shared it tells something different . It says that the attackers coins get invalidated after he has converted them to BTC and other currencies and thus the exchange loses the coins not the normal user. But your story is opposite. Don't know which one to believe.

PXC: PmfFgdwwcXPa1QUmtVJevdPfHhmhztHHCv
BTC: 1P22tVABsd85L7kkpTmohCv5vK2BypFz3H
Phoenixcoin (PXC), a decentralised open source digital currency.
tacotime
Legendary
*
Offline Offline

Activity: 1484
Merit: 1005



View Profile
June 22, 2013, 10:03:08 PM
 #7

Accidental forks are created from bugs in software making two distinct forks with clients from one version only seeing one valid, while clients from the other version only see the other as valid (see BIP 0050).

If a pool has 51% of the hash rate (or more) it's not a problem for the network unless the pool owner (or a hacker with administrative privileges to that pool) decides he wants to start hiding his chain from the network.

PoW 51% + doublespend in a few words:
1) Everyone else has <50% of hash and is mining a chain.
2) Attacker mines a longer chain in secret, not reporting it to the network.  Attacker can do this because he has more hash power.
3) Attacker spends on the <50% fork, waits for 6 (or whatever) confs to get it to spend at the exchange, then exchanges it for cash or whatever.
4) Attacker dumps his chain onto the network.  Entire network invalidates the <50% chain, replacing it with the attacker's chain.  Attacker's coins are now returned to him to respend at will.  Not only this, but all the blocks mined in the <50% chain are now invalidated, so everyone not the attacker loses their blockrewards.

So, end result is that attacker gets 100% of the network coins from block reward and can double spend freely.

The link I shared it tells something different . It says that the attackers coins get invalidated after he has converted them to BTC and other currencies and thus the exchange loses the coins not the normal user. But your story is opposite. Don't know which one to believe.

No, it is the same story.  The <50% chain has the coins spent, attacker's chain has coins unspent.  Exchange sees <50% chain, so it sees them spent (sent to exchange).  Attacker then swaps these coins for something else, then dumps their chain onto the network.  The transaction in which the coins are spent on the <50% chain become invalidated because the whole chain is invalidated.  Thus the attacker now regains his coins (because they are unspent on his chain) while the exchange loses these coins (because they came from a now invalid transaction).

Code:
XMR: 44GBHzv6ZyQdJkjqZje6KLZ3xSyN1hBSFAnLP6EAqJtCRVzMzZmeXTC2AHKDS9aEDTRKmo6a6o9r9j86pYfhCWDkKjbtcns
nawazish1 (OP)
Sr. Member
****
Offline Offline

Activity: 462
Merit: 250


PXC Research Team


View Profile
June 22, 2013, 10:11:03 PM
 #8


No, it is the same story.  The <50% chain has the coins spent, attacker's chain has coins unspent.  Exchange sees <50% chain, so it sees them spent (sent to exchange).  Attacker then swaps these coins for something else, then dumps their chain onto the network.  The transaction in which the coins are spent on the <50% chain become invalidated because the whole chain is invalidated.  Thus the attacker now regains his coins (because they are unspent on his chain) while the exchange loses these coins (because they came from a now invalid transaction).

Now I got it perfectly. It means that the exchange and normal miners both loose their coins. Smiley

PXC: PmfFgdwwcXPa1QUmtVJevdPfHhmhztHHCv
BTC: 1P22tVABsd85L7kkpTmohCv5vK2BypFz3H
Phoenixcoin (PXC), a decentralised open source digital currency.
philipkdick
Member
**
Offline Offline

Activity: 84
Merit: 10



View Profile
June 23, 2013, 01:19:30 PM
 #9

Accidental forks are created from bugs in software making two distinct forks with clients from one version only seeing one valid, while clients from the other version only see the other as valid (see BIP 0050).

If a pool has 51% of the hash rate (or more) it's not a problem for the network unless the pool owner (or a hacker with administrative privileges to that pool) decides he wants to start hiding his chain from the network.

PoW 51% + doublespend in a few words:
1) Everyone else has <50% of hash and is mining a chain.
2) Attacker mines a longer chain in secret, not reporting it to the network.  Attacker can do this because he has more hash power.
3) Attacker spends on the <50% fork, waits for 6 (or whatever) confs to get it to spend at the exchange, then exchanges it for cash or whatever.
4) Attacker dumps his chain onto the network.  Entire network invalidates the <50% chain, replacing it with the attacker's chain.  Attacker's coins are now returned to him to respend at will.  Not only this, but all the blocks mined in the <50% chain are now invalidated, so everyone not the attacker loses their blockrewards.

So, end result is that attacker gets 100% of the network coins from block reward and can double spend freely.

The link I shared it tells something different . It says that the attackers coins get invalidated after he has converted them to BTC and other currencies and thus the exchange loses the coins not the normal user. But your story is opposite. Don't know which one to believe.

No, it is the same story.  The <50% chain has the coins spent, attacker's chain has coins unspent.  Exchange sees <50% chain, so it sees them spent (sent to exchange).  Attacker then swaps these coins for something else, then dumps their chain onto the network.  The transaction in which the coins are spent on the <50% chain become invalidated because the whole chain is invalidated.  Thus the attacker now regains his coins (because they are unspent on his chain) while the exchange loses these coins (because they came from a now invalid transaction).

Taco you seem quite busy but I've posted a request for quotes , Willingboro pay a dev forma simple dynamic checkpointing system for sCrypt , and a possible blockchain " audit system"   - for the whole community , but will pay for work , topic is on page 1 .
donjonson
Full Member
***
Offline Offline

Activity: 210
Merit: 100



View Profile
June 23, 2013, 02:40:57 PM
 #10

Accidental forks are created from bugs in software making two distinct forks with clients from one version only seeing one valid, while clients from the other version only see the other as valid (see BIP 0050).

If a pool has 51% of the hash rate (or more) it's not a problem for the network unless the pool owner (or a hacker with administrative privileges to that pool) decides he wants to start hiding his chain from the network.

PoW 51% + doublespend in a few words:
1) Everyone else has <50% of hash and is mining a chain.
2) Attacker mines a longer chain in secret, not reporting it to the network.  Attacker can do this because he has more hash power.
3) Attacker spends on the <50% fork, waits for 6 (or whatever) confs to get it to spend at the exchange, then exchanges it for cash or whatever.
4) Attacker dumps his chain onto the network.  Entire network invalidates the <50% chain, replacing it with the attacker's chain.  Attacker's coins are now returned to him to respend at will.  Not only this, but all the blocks mined in the <50% chain are now invalidated, so everyone not the attacker loses their blockrewards.

So, end result is that attacker gets 100% of the network coins from block reward and can double spend freely.

How the attacker could have money to spend in step 3 if he s holding a secret chain? His coins wouldnt be valid until he dumps his chain?

I'm just a simple guy swimming in a sea of sharks.
BitJohn
Hero Member
*****
Offline Offline

Activity: 826
Merit: 1001

@Bit_John


View Profile
June 23, 2013, 02:50:22 PM
 #11

Great article I highly encourage folks to read through every line. Digital currency in general is risk business. Big risk Big rewards
Fernandez
Legendary
*
Offline Offline

Activity: 1008
Merit: 1000



View Profile
June 23, 2013, 04:35:09 PM
 #12

Accidental forks are created from bugs in software making two distinct forks with clients from one version only seeing one valid, while clients from the other version only see the other as valid (see BIP 0050).

If a pool has 51% of the hash rate (or more) it's not a problem for the network unless the pool owner (or a hacker with administrative privileges to that pool) decides he wants to start hiding his chain from the network.

PoW 51% + doublespend in a few words:
1) Everyone else has <50% of hash and is mining a chain.
2) Attacker mines a longer chain in secret, not reporting it to the network.  Attacker can do this because he has more hash power.
3) Attacker spends on the <50% fork, waits for 6 (or whatever) confs to get it to spend at the exchange, then exchanges it for cash or whatever.
4) Attacker dumps his chain onto the network.  Entire network invalidates the <50% chain, replacing it with the attacker's chain.  Attacker's coins are now returned to him to respend at will.  Not only this, but all the blocks mined in the <50% chain are now invalidated, so everyone not the attacker loses their blockrewards.

So, end result is that attacker gets 100% of the network coins from block reward and can double spend freely.

How the attacker could have money to spend in step 3 if he s holding a secret chain? His coins wouldnt be valid until he dumps his chain?

He has to have the coins beforehand.

So if you want to 51%, first buy up; then mine your chain while selling your stock; then overwrite and again send the coins somewhere.

The coins earned by mining the blocks in your longer chain is no more than what you would get by mining on the normal chain anyway. The only profit is the double spend. Which makes the attack on FTC quite baffling as there was no significant double spend.






██████████████████████████████████████████████████████████████████████████████████████████████
██████████████████████████████████████████████████████████████████████████████████████
███████████████████████████████████████████████████████████████████████▄▄▄███████████████████████
███████████████████████████████████████████████████████████████████████▀▀▀████████████████████████
██████████████████████████████████████████████████████████████████████████████████████████████████
█████████████████████████████████████████████████████████████████████████████████████████████████





...INTRODUCING WAVES........
...ULTIMATE ASSET/CUSTOM TOKEN BLOCKCHAIN PLATFORM...






Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!