Bitcoin Forum
December 05, 2024, 09:23:51 AM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: is dgc 51% attack?  (Read 1049 times)
nesic1 (OP)
Hero Member
*****
Offline Offline

Activity: 636
Merit: 500


View Profile
July 11, 2013, 11:39:35 PM
 #1

Network hashrate: 986.14 MH/s Pool hashrate: 730.81 MH/s
so? when other coin it at it all of you scream, what is now?
mustyoshi
Sr. Member
****
Offline Offline

Activity: 287
Merit: 250



View Profile
July 11, 2013, 11:40:43 PM
 #2

It's only an attack if they do something malicious with that power.
seleme
Legendary
*
Offline Offline

Activity: 2772
Merit: 1028


Duelbits.com


View Profile WWW
July 12, 2013, 12:22:51 AM
 #3

It's only an attack if they do something malicious with that power.

this

       ███████████████▄▄
    ██████████████████████▄
  ██████████████████████████▄
 ███████   ▀████████▀   ████▄
██████████    █▀  ▀    ██████▄
███████████▄▄▀  ██  ▀▄▄████████
███████████          █████████
███████████▀▀▄  ██  ▄▀▀████████
██████████▀   ▀▄  ▄▀   ▀██████▀
 ███████  ▄██▄████▄█▄  █████▀
  ██████████████████████████▀
    ██████████████████████▀
       ███████████████▀▀
.
.Duelbits.
.
..THE MOST REWARDING CASINO......
   ▄▄▄▄████▀███▄▄▄▄▄
▄███▄▀▄██▄   ▄██▄▀▄███▄
████▄█▄███▄█▄███▄█▄████
███████████████████████   ▄██▄
██     ██     ██     ██   ▀██▀
██ ▀▀█ ██ ▀▀█ ██ ▀▀█ ██    ██
██  █  ██  █  ██  █  ██
█▌  ██
██     ██     ██     ████  ██
█████████████████████████  ██
████████████████████████████▀
█████████████████████████
█████████████████████████
████████████████████████▌
       +4,000      
PROVABLY FAIR
GAMES
   $500,000  
MONTHLY
PRIZE POOL
      $10,000     
BLACKJACK
GIVEAWAY
erk
Hero Member
*****
Offline Offline

Activity: 826
Merit: 500



View Profile
July 12, 2013, 12:28:38 AM
 #4

Network hashrate: 986.14 MH/s Pool hashrate: 730.81 MH/s
so? when other coin it at it all of you scream, what is now?

They pool hash rates are an estimate calculated from the block numbers and the timestamps, they don't really tell you might about what is going on with the network.

The shorter the confirmation time, the less time available for an attacker to calculate valid blocks to subvert the chain.


nearmiss
Sr. Member
****
Offline Offline

Activity: 448
Merit: 250



View Profile
July 12, 2013, 12:57:14 AM
 #5

nevertheless, not a great state for any coin to be in.....

Profit-Switching Pool w/ Vardiff -> http://hashco.ws  Optionally keep the alts we mine or auto-trade for BTC. In addition can be paid out in any of: 365, AC, BC,  BTC, C2, CINNI, COMM, FAC, HBN, MINT, PMC, QRK, RDD, WC, XBC
Scrappy Do
Hero Member
*****
Offline Offline

Activity: 686
Merit: 500



View Profile
July 12, 2013, 01:21:39 AM
 #6

nevertheless, not a great state for any coin to be in.....

 Not a bad one either. This coin has challenged folks to find flaws, and to date, is flawless. Also, they are growing by leaps and bounds. For this said 51%, one would have to hold the coins. and as every big rig guy joins 41kh/s there is another joining as well. This is not to say they could not send coins to each other, but why would you waste the power to kill a coin? 41 kh/s a sec is around 1200 a month power here and my rate is .078 per. Do the math.
seleme
Legendary
*
Offline Offline

Activity: 2772
Merit: 1028


Duelbits.com


View Profile WWW
July 12, 2013, 01:33:22 AM
 #7

nevertheless, not a great state for any coin to be in.....

That for sure.. never a good thing to have a single party with that amount of network hashrate

       ███████████████▄▄
    ██████████████████████▄
  ██████████████████████████▄
 ███████   ▀████████▀   ████▄
██████████    █▀  ▀    ██████▄
███████████▄▄▀  ██  ▀▄▄████████
███████████          █████████
███████████▀▀▄  ██  ▄▀▀████████
██████████▀   ▀▄  ▄▀   ▀██████▀
 ███████  ▄██▄████▄█▄  █████▀
  ██████████████████████████▀
    ██████████████████████▀
       ███████████████▀▀
.
.Duelbits.
.
..THE MOST REWARDING CASINO......
   ▄▄▄▄████▀███▄▄▄▄▄
▄███▄▀▄██▄   ▄██▄▀▄███▄
████▄█▄███▄█▄███▄█▄████
███████████████████████   ▄██▄
██     ██     ██     ██   ▀██▀
██ ▀▀█ ██ ▀▀█ ██ ▀▀█ ██    ██
██  █  ██  █  ██  █  ██
█▌  ██
██     ██     ██     ████  ██
█████████████████████████  ██
████████████████████████████▀
█████████████████████████
█████████████████████████
████████████████████████▌
       +4,000      
PROVABLY FAIR
GAMES
   $500,000  
MONTHLY
PRIZE POOL
      $10,000     
BLACKJACK
GIVEAWAY
DeathAndTaxes
Donator
Legendary
*
Offline Offline

Activity: 1218
Merit: 1079


Gerald Davis


View Profile
July 12, 2013, 01:40:12 AM
 #8

The shorter the confirmation time, the less time available for an attacker to calculate valid blocks to subvert the chain.

Nonsense.  Where do people come up with this junk?
usahero
Sr. Member
****
Offline Offline

Activity: 434
Merit: 250


View Profile
July 12, 2013, 01:53:39 AM
 #9

The shorter the confirmation time, the less time available for an attacker to calculate valid blocks to subvert the chain.

Nonsense.  Where do people come up with this junk?

In the lol-land of wishful thinking...


erk
Hero Member
*****
Offline Offline

Activity: 826
Merit: 500



View Profile
July 12, 2013, 02:02:16 AM
 #10

The shorter the confirmation time, the less time available for an attacker to calculate valid blocks to subvert the chain.

Nonsense.  Where do people come up with this junk?


http://we.lovebitco.in/bitcoin-paper/#ch11
DeathAndTaxes
Donator
Legendary
*
Offline Offline

Activity: 1218
Merit: 1079


Gerald Davis


View Profile
July 12, 2013, 02:46:33 AM
Last edit: July 12, 2013, 04:20:20 AM by DeathAndTaxes
 #11

The shorter the confirmation time, the less time available for an attacker to calculate valid blocks to subvert the chain.

Nonsense.  Where do people come up with this junk?


http://we.lovebitco.in/bitcoin-paper/#ch11

Yeah that cite doesn't prove what you said.  It doesn't because what you said was wrong.

Difficulty and block window are arbitrary.  The amount of hashpower that the attacker has relative to the global hashpower is all that matters.

If the attacker has 10% of the hash power he has a 10% chance of solving the next block.
He has a 10% chance of solving the next block if the block window is 600 seconds or 1 second.

The risk with many of these yet-another-copycoins is the low hashpower on the chain.  That makes it far easier for an attacker to have the resources necessary for an attack.

groll
Sr. Member
****
Offline Offline

Activity: 336
Merit: 250


View Profile
July 12, 2013, 02:51:44 AM
 #12

The shorter the confirmation time, the less time available for an attacker to calculate valid blocks to subvert the chain.

Nonsense.  Where do people come up with this junk?


http://we.lovebitco.in/bitcoin-paper/#ch11

ok you need to put that in perspective this is catchup, 51% don`t have to be in catchup. And 75% can catch up easily for 5-10 blocks over 20

In recent 51% the attacker seems to have use it in it`s favor so he try to get some block before the honest get one (as choosen block for the fork usually are when the honest chain have bad luck in the few sample I have looked at.) then make its false transaction in honest chain that he want to revert continue to race until honest is long enough for the double spend to be accepted, since he was already in front and have more power is chain is longer and then he release it invalidating 5-7 block in honest chain with a longer chain. so this can easily be automated to start when you have the advantage(fast block don't help as it should be miliseconds to have impact).

i intentionnaly remove variance and some probability to just keep average to make it easy to understand in the following explanation(simplified but still valid for around 50% chance):

Faster block means nothing in itself as difficulty to find block need to be factored to balance the real difficulty to make the catchup at 51% hash power starting 1 minutes later will take the same time in average for block every seconds the blocks every minutes. in first one he start 1 block back in seconds he start 60 block back. but difficulty to find a block in the 1 seconds is 60 times less then the one for 1 minutes. The number of block for 1 minutes should be around 50 so after 50 minutes he should catchup. for 1 seconds blocks it will be after 50*60 to catchup the 60 blocks yes the number is way bigger but the hashpower is the same the difficulty to find a block is 60 times less so still 50 minutes.

what the paper explain is that catching up 60 block for the 1 minutes will takes a lots of time 50 hours (50*60)

But faster block because hash power is high makes the attack more difficult as 51% require more hash power from the attacker. so faster then target in correct or high difficulty is a good sign. slow block the target and low difficulty means vulnerable (very slow and high diff also means vulnerable)

in fact script with less then 1Gh/s are subject to 51%, above 2Gh/s should be not a bad spot.
erk
Hero Member
*****
Offline Offline

Activity: 826
Merit: 500



View Profile
July 12, 2013, 03:13:41 AM
 #13

Here is a paper on the theory of a bitcoin double spend attack

https://bitcoil.co.il/Doublespend.pdf


Quote
7 Conclusions
In this paper we have explained the basic structure of the Bitcoin blockchain, the protection
it gives against double-spending, and the ways in which this protection can be undermined.
We have derived the probability for a successful double-spend, and tabulated it in various
ways. We have also brie y discussed the conditions in which a double-spending attack can
be economical, and hence likely. In so doing we have dispelled some popular myths, such as
the absolute security believed to be granted by waiting for 6 con rmations, or the length of
time waited (as opposed to the number of con firmations in terms of discrete blocks) as an
allegedly major factor in determining security.

So the quicker you can get to a high number of confirmations, the safer you are.


This is most likely why during the recent FTC attack, it was carried out when the FTC confirmation time had blown out to over half an hour.



groll
Sr. Member
****
Offline Offline

Activity: 336
Merit: 250


View Profile
July 12, 2013, 03:46:33 AM
 #14



So the quicker you can get to a high number of confirmations, the safer you are.

mostly true. at same difficulty it's true. But 10 confirm at 0.01 diff at 10 seconds each  is way easier to revert then 5 confirms at diff 87 at 1.5 minutes each

~50kh/s vs 4Gh/s for the 51% attack

but for same diff 10 is safer then 5 for sure


Quote

This is most likely why during the recent FTC attack, it was carried out when the FTC confirmation time had blown out to over half an hour.



hash power was very low so the attacker had >70% and is likely to have used the method described in the paper with 1 block before start so he had 0% chance to fail
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!