Bitcoin Forum
January 24, 2018, 02:40:03 AM *
News: Electrum users must upgrade to 3.0.5 if they haven't already. More info.
   Home   Help Search Donate Login Register  
Pages: [1]
Author Topic: question answered, nvm  (Read 690 times)
Offline Offline

Activity: 81

View Profile WWW
May 21, 2011, 07:29:14 AM

It's late at night; my mind is wondering; I had this thought (I'm sure the point has been raised before, but oh well):

We're all familiar with the vulnerability posed by an entity with 51% of the total cpu power: potentially reversing transactions.

But this kind of attack requires sophistication and, well, 51% of the total network hash rate:

As many have pointed out, botnets are presumably made up of a bunch of low-cpu-power machines (servers in closets), making the threat of the aforementioned attack unlikely.

However, these low-cpu-powered machines would be capable of spamming small transactions (.00001 btc's) to each other, right?  Even if future clients are written to enforce transaction fees, couldn't a botnet use a forked client?

I believe the result of such an attack would be massively delayed transaction validations.

I'm sorry if I'm totally off base with these assumptions, and I don't mean to fear-monger.  I thought this was a valid concern. - Free Printable Bitcoin Certificates.  A Transparent Company. - Reviews and Interviews.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction. Advertise here.
Hero Member
Offline Offline

Activity: 504

View Profile
May 21, 2011, 07:31:28 AM

This is why small tramsactions require a fee to be accepted by generators.

Pages: [1]
Jump to:  

Sponsored by , a Bitcoin-accepting VPN.
Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!