Security patch scheme
1. Why should technology be improved?
A currency with stagnant technology will not only bring loopholes, but also make people distrust, and will gradually disappear in the historical arena. At the same time of technological upgrading, it is also brushing the sense of existence.
2. Why is it called security patch?
First of all, there is a consensus that all community members and unlimited currency holders do not support forking and chain-changing, which is also the basis for technological improvement. Only by adhering to the existing blocks and not making any changes in the block chain can we win the consensus of all coinholders.
Secondly, because this update is mainly to prevent 51% of attacks, only to upgrade the security aspects, do not make other changes, so it is called security patch.
3. What is the solution of security patch?
At present, unlimited coins can revoke blocks indefinitely when switching the longest chain. That's the biggest factor in the attack. On the premise of acknowledging computational power, 51% of computational attacks can be effectively prevented if the switching of its longest chain can be restricted.
Look down, please.
Analysis of Attacks
1. Fill the money into the exchange first and wait for the exchange to enter the account (previously dozens of confirmations)
2. Intranet first digs (generates bifurcation) with great effort, removing the transaction of filling its own money.
3. Buy other currencies regardless of price, such as ltc, doge, eth, EOS and other currencies with fast transfer speed. The process can be completed in about 10 minutes.
4. At this time, the attacker will interconnect the bifurcated blocks in the intranet, synchronize this longer chain to the whole network, and the other shorter chains will delete their own blocks, using the attacker's longer chain.
5. At this time, because his money was not packaged into the block chain, the exchange wallet had only one line of grey unacknowledged records, and his own wallet had returned the money he had filled out.
6. If the attack succeeds, the attacker can either continue to pack or withdraw his calculating power.
In the development group of infinite currency blocks, many people jointly participated in the discussion. At present, there is a general consensus, and this plan is worth trying.
Specific changes to this scheme are as follows:
1. Increase the current confirmation number from 3 (90 seconds) to 6-10 (300 seconds, 5 minutes)
2. Change the selection mechanism of the longest chain. When the block is not confirmed, synchronization is carried out according to the longest chain. Once the confirmation number exceeds, the block solidifies and will not be revoked.
This scheme can effectively avoid 51% attacks, and needs mining node + exchange + ordinary node deployment. Recommend users to use new wallets. There is no risk of bifurcation and there is no bifurcation at the technical level.
Without changing the consensus algorithm, it can be understood as a security patch
Specific 10 confirmation numbers or 6, it is not easy to determine at present.
In theory, the arrival of global network information is generally at the second level. 10M data, which can be transmitted to 1000 nodes all over the world through peer-to-peer network, can also be completed in 30-60 seconds.
Wright is 2.5 minutes a piece, at least 6 confirmation 15 minutes. Bit takes six confirmations for an hour to complete the transaction.
An infinite 30 seconds per block, if the same 6 confirmations can be completed in 3 minutes, 10 confirmations can only be 5 minutes. It's faster than anything else.
risk
1. Bifurcation:
Under the premise that users, miners, mines and exchanges all use new wallets, there is only one case of bifurcation. If an attacker attacks, the attacker will be isolated (his own bifurcation), and all other users will not bifurcate.
If the user or the exchange uses the same old wallet as the attacker, then this part of the user is isolated with the attacker. Of course, it does not affect the wallet. The user only needs to upgrade the wallet execution file.
2. What are the consequences of such bifurcation?
First of all, if the use of the new wallet is in the majority, there will be no problem with this bifurcation, which is also the purpose of this update, isolate the attacker and let him play by himself.
Secondly, when new wallets are used in exchanges and mines, users and attackers are separated at the same time, which requires users to update block data and wallet files.
Finally, under normal circumstances, there will be no bifurcation.
Security patches do not change block data and structure.
To guard against:
It will not run in the main network before full testing.
Adhere to the following principles: no chain change, no bifurcation, no additional issuance, resolute open source
This scheme is not easy to come by and even more difficult to develop.
History of this scheme: POW2.0 Security Infinite Currency Wallet Development Scheme Based on POW Mechanism
https://bbs.ifc123.net/thread-19385.htm