{"id":1149,"date":"2019-01-15T21:36:49","date_gmt":"2019-01-15T21:36:49","guid":{"rendered":"https:\/\/2miners.com\/blog\/?p=1149"},"modified":"2020-04-04T21:29:23","modified_gmt":"2020-04-04T21:29:23","slug":"51-attack-explained","status":"publish","type":"post","link":"https:\/\/2miners.com\/blog\/51-attack-explained\/","title":{"rendered":"Crypto Mythbusters: 51% Attack Explained"},"content":{"rendered":"<p>Today we will discuss the 51% attack, which is particularly relevant in light of the issues Ethereum Classic is experiencing. <!--more-->Many cryptocurrency \u201cexperts\u201d believe that if a user has more than a half of the network hash rate, he can do whatever he wants, such as going on a spending spree. But in reality, it&#8217;s much different. Let\u2019s find out why.<br \/>\n<\/p>\n<h2><b>What Is a 51% Attack?<\/b><\/h2>\n<p>First of all, make sure to read the article <a href=\"https:\/\/2miners.com\/blog\/orphan-stale-uncle-blocks-in-bitcoin-and-ethereum\/\">about orphan, stale and uncle blocks<\/a> in Bitcoin and Ethereum mining.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/01\/51-percent-attack-mining.jpg\" alt=\"\" width=\"1422\" height=\"800\" class=\"alignnone size-full wp-image-1166\" data-wp-pid=\"1166\" nopin=\"nopin\" srcset=\"https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/01\/51-percent-attack-mining.jpg 1422w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/01\/51-percent-attack-mining-300x169.jpg 300w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/01\/51-percent-attack-mining-768x432.jpg 768w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/01\/51-percent-attack-mining-1024x576.jpg 1024w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/01\/51-percent-attack-mining-800x450.jpg 800w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/01\/51-percent-attack-mining-1200x675-cropped.jpg 1200w\" sizes=\"auto, (max-width: 1422px) 100vw, 1422px\" \/><\/p>\n<p>Let\u2019s say a miner owns 60% of the network hash rate. This lets him \u201chold\u201d his blocks and not send them to the network. Instead, he continues mining his own chain by himself. Over a certain period of time, the miner is very likely to create more blocks than the rest of the network. As a result, the miner\u2019s chain becomes longer, so when he puts it out into the world, the network gladly accepts it, while other miners keep mining and get nothing for found blocks because all of their blocks have become orphan and\/or stale.<\/p>\n<h2><b>2019 &#8211; Biggest Ethereum Classic Hack<\/b><\/h2>\n<p>It seems that rumors about the ETC chain reorganization and double spend attack turned out to be true. Blockchain ecosystem security company <a href=\"https:\/\/www.slowmist.com\">SlowMist<\/a> was the first to report the issue. In the course of a few hours, the blockchain went through several reorganizations, which was confirmed by an <a href=\"https:\/\/blockscout.com\/etc\/mainnet\">Ethereum Classic BlockScout<\/a> block explorer. The Ethereum Classic team informed exchanges and mining pools about the need to increase the number of block confirmations.<\/p>\n<p>Previously, Coinpage reported that Ethereum Classic is under a 51% attack. After that, exchanges that trade the coin were notified about the potential threat and the need to upgrade their security. The news caused the ETC exchange rate to drop.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1152\" src=\"https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/01\/image3.png\" alt=\"\" width=\"1100\" height=\"570\" data-wp-pid=\"1152\" srcset=\"https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/01\/image3.png 1100w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/01\/image3-300x155.png 300w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/01\/image3-768x398.png 768w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/01\/image3-1024x531.png 1024w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/01\/image3-800x415.png 800w\" sizes=\"auto, (max-width: 1100px) 100vw, 1100px\" \/><\/p>\n<p>However, the official Ethereum Classic speaker tweeted that they are not aware of any double spend attack or chain reorganizations attaching the screenshot to back up his remarks.<\/p>\n<p>https:\/\/twitter.com\/eth_classic\/status\/1082045223310483457<\/p>\n<p>There is no doubt that the chain reorganization did happen, probably after the tweet. The next tweet by Ethereum Classic only fueled more rumors. In the tweet, exchanges and mining pools were informed about the need to increase transaction confirmation time and set a minimum limit for coin deposits and withdrawals.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1154\" src=\"https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/01\/image2.jpg\" alt=\"\" width=\"680\" height=\"319\" data-wp-pid=\"1154\" srcset=\"https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/01\/image2.jpg 680w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/01\/image2-300x141.jpg 300w\" sizes=\"auto, (max-width: 680px) 100vw, 680px\" \/><\/p>\n<p>Before that, an unknown user bought hashing power on <a href=\"https:\/\/www.nicehash.com\/?refby=720a2fc8-d333-4fca-965e-aca84df62231\">Nicehash<\/a> to mine Ethash based coins, which caused the platform\u2019s prices to double. MiningRigRentals was also used for the attack. As a result, the hacker managed to gain control of the chain.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1155\" src=\"https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/01\/image11.jpg\" alt=\"\" width=\"679\" height=\"476\" data-wp-pid=\"1155\" srcset=\"https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/01\/image11.jpg 679w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/01\/image11-300x210.jpg 300w\" sizes=\"auto, (max-width: 679px) 100vw, 679px\" \/><\/p>\n<h2><b>2Miners Ethereum Classic Pool Operation during the Attack<\/b><\/h2>\n<p>2Miners increased block confirmation times as recommended in both pools: <a href=\"https:\/\/2miners.com\/etc-mining-pool\">PPLNS<\/a> and <a href=\"https:\/\/2miners.com\/solo-etc-mining-pool\">SOLO<\/a>.<\/p>\n<p>https:\/\/twitter.com\/pool2miners\/status\/1082157492875022337<\/p>\n<h2><b>How Can You Take Advantage of a 51% Attack?<\/b><\/h2>\n<p>Let\u2019s say, you are the bad guy who owns 60% of the network. You have 100 BTC in your wallet. You are mining and making your chain grow longer, while nobody knows of its existence. Then you send 100 BTC to an exchange, but instead of doing that in your own chain, you use the chain that is accepted by the rest of the world. Your coins reach the exchange and receive confirmation. You exchange them for another cryptocurrency, let\u2019s say Ethereum, and withdraw your coins from the exchange. Then you make your chain public saying something like:<\/p>\n<p style=\"padding-left: 30px;\"><i>\u201cSorry guys, the world\u2019s chain sucks. Mine is longer, so it\u2019s valid.\u201d<\/i><\/p>\n<p>The Ether is in your wallet. As for Bitcoin, you never actually sent it anywhere. As a result, the exchange bears a loss.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1158\" src=\"https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/01\/image4.jpg\" alt=\"\" width=\"1024\" height=\"576\" data-wp-pid=\"1158\" srcset=\"https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/01\/image4.jpg 1024w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/01\/image4-300x169.jpg 300w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/01\/image4-768x432.jpg 768w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/01\/image4-800x450.jpg 800w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p><b>You should understand that if you own 51% of the network, you can\u2019t possess, seize or destroy the network itself. You don\u2019t have access to users wallets or transactions, neither past nor future.<\/b><\/p>\n<p>Is it profitable? It depends on the coin. For example, it is surely <a href=\"https:\/\/www.crypto51.app\/\">not profitable to attack Bitcoin<\/a>. It would require too much hashing power to do so, and therefore be too expensive, relative to the potential profit.<\/p>\n<p>It isn\u2019t only exchanges that run the risk of a 51% attack, but also any service that accepts cryptocurrency as a form of payment.<\/p>\n<h2><b>What Is An Attacker Unable To Do?<\/b><\/h2>\n<p>The miner that owns 51% doesn\u2019t control anything. He is just a miner. He doesn\u2019t have access to wallets. Without the private key to your wallet, nobody in the world can access it. The miner may mine blocks or he may not. Of course, there is a chance that he will roll back your transactions, but there is no way he can change the recipient of your transactions or send coins from your wallet on your behalf. You are the only person who can control your cryptocurrency.<\/p>\n<blockquote><p><i>The attacker can\u2019t create new coins out of thin air, he can\u2019t control anyone\u2019s balance! It\u2019s nonsense.<\/i><\/p><\/blockquote>\n<h2><b>Why Doesn\u2019t Anybody Attack Bitcoin Or Other Major Coins?<\/b><\/h2>\n<p>One should understand that if you were to attack one of the major coins, you would need to spend millions of dollars per hour. Not many people would spend this much money knowing that profits are not guaranteed.<\/p>\n<p>For mining pools that own 51% of a coin\u2019s hash rate, it&#8217;s even worse. If they try to defraud the community, they put their whole business at risk.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1159\" src=\"https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/01\/image5.png\" alt=\"\" width=\"1422\" height=\"800\" data-wp-pid=\"1159\" srcset=\"https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/01\/image5.png 1422w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/01\/image5-300x169.png 300w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/01\/image5-768x432.png 768w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/01\/image5-1024x576.png 1024w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/01\/image5-800x450.png 800w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/01\/image5-1200x675-cropped.png 1200w\" sizes=\"auto, (max-width: 1422px) 100vw, 1422px\" \/><\/p>\n<p>If a pool organizes a 51% attack, everyone will find out about it right away. The pool would be discredited, crypto developers and miners wouldn\u2019t work with it anymore and the platform would cease to exist. Do pools really need that? They get a decent percentage from mining activity, so such a scenario is very unlikely.<\/p>\n<p>Even if a pool conducts a 51% attack, crypto creators can just roll back their blockchains using hard forks. The DAO has already set a precedent for that.<\/p>\n<h2><b>How To Fight Against 51% Attacks<\/b><\/h2>\n<p>Exchanges require a great number of confirmations before crediting coins to the user\u2019s balance. For example, ZEN or ZCL require as many as 500 confirmations, that is, 500 new blocks or 1,250 minutes, which is almost 24 hours! Too long, right? But it\u2019s the only way networks with a low hash rate can protect themselves. This requires an attacker to spend more resources to obtain 500 blocks than it would be worth to perform the attack.<\/p>\n<p>Pools are in control of what\u2019s happening, they see the hash rate distribution among miners and who confirms which blocks. If a pool suspects something, its representatives will notify the community and cryptocurrency developers, so that they could roll back the blockchain and take further action if necessary.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Today we will discuss the 51% attack, which is particularly relevant in light of the issues Ethereum Classic is experiencing.<\/p>\n","protected":false},"author":3,"featured_media":1150,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-1149","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mining"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Crypto Mythbusters: 51% Attack Explained - Crypto Mining Blog<\/title>\n<meta name=\"description\" content=\"Today we will discuss the 51% attack, which is particularly relevant in light of the issues Ethereum Classic is experiencing. Many cryptocurrency\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/2miners.com\/blog\/51-attack-explained\/\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/2miners.com\/blog\/51-attack-explained\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/2miners.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Crypto Mythbusters: 51% Attack Explained\"}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Crypto Mythbusters: 51% Attack Explained - Crypto Mining Blog","description":"Today we will discuss the 51% attack, which is particularly relevant in light of the issues Ethereum Classic is experiencing. Many cryptocurrency","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/2miners.com\/blog\/51-attack-explained\/","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BreadcrumbList","@id":"https:\/\/2miners.com\/blog\/51-attack-explained\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/2miners.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Crypto Mythbusters: 51% Attack Explained"}]}]}},"_links":{"self":[{"href":"https:\/\/2miners.com\/blog\/wp-json\/wp\/v2\/posts\/1149","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/2miners.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/2miners.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/2miners.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/2miners.com\/blog\/wp-json\/wp\/v2\/comments?post=1149"}],"version-history":[{"count":6,"href":"https:\/\/2miners.com\/blog\/wp-json\/wp\/v2\/posts\/1149\/revisions"}],"predecessor-version":[{"id":2256,"href":"https:\/\/2miners.com\/blog\/wp-json\/wp\/v2\/posts\/1149\/revisions\/2256"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/2miners.com\/blog\/wp-json\/wp\/v2\/media\/1150"}],"wp:attachment":[{"href":"https:\/\/2miners.com\/blog\/wp-json\/wp\/v2\/media?parent=1149"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/2miners.com\/blog\/wp-json\/wp\/v2\/categories?post=1149"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/2miners.com\/blog\/wp-json\/wp\/v2\/tags?post=1149"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}