BTCI am reading the bitcoin whitepaper but not understanding this red boxed terms,
here satoshi talk about nodes, honest nodes collectively control more cpu power .
my question is what type of nodes are honest nodes , how the nodes decide network to be honest and how would dishonest nodes can change the network or attack the network or hack the network
https://ibb.co/VtChQLn dishonest nodes
would send out blocks containing bad things that do not fit the rules
things like:
transactions that are trying to spend funds already spent
moving funds without signature proofs of ownership of funds
adding random non payment data like monkey pictures
trying to give a bigger block reward than what the rules allow
[insert anything bad that does not fit bitcoins utility purpose/ethos/rules]
honest nodes
agree(consent) to the same rules and dont allow rules to change unless they majority consent by being ready with a new ruleset ready to check honestly. before the new rule activates(gets used on the network)
dishonest node can move the funds ?, or they can move the funds if they have more than 50% control over the network
no they cant. because dishonest nodes with data that tries to do things outside the rules, would get their blocks rejected
as thats the point of consensus
..
a 51% attack cant do rule breaking
all it can do is three main things
A. re-organising the current blocks
this is done by a powerful pool re-trying to build a previous/older block, but with a different transaction listing to the original block. then catch up and overtaking the block height of the honest nodes, so that it becomes the main chain nodes follow and the new blocks become the active blocks and the old blocks get orphaned(abandoned)
B. perpetually appear more often then competing block producers
this is where they can by being the main block producer just do things like:
make blocks with no transactions to significantly increase confirm wait times
only accept high tx fee's to push users to need to pay more
only accept bloated transactions
C. change the rules IF a malicious dev team released code for a new ruleset
and a dishonest pool only released blocks that allowed the new ruleset. depending on how the dev team orchestrated the new code release and implemented it. could activate the code
pools still need to produce blocks that fit the rules to have their blocks accepted by nodes, but they can still cause malicious things within the rules, or where the main nodes (businesses/services) have certain rules that allow strange things to change
51% is just a buzzword for having more hashpower then its competitors combined meaning the attacker will be the main block producer