{"id":1491,"date":"2019-04-03T15:36:00","date_gmt":"2019-04-03T15:36:00","guid":{"rendered":"https:\/\/2miners.com\/blog\/?p=1491"},"modified":"2020-04-04T21:27:11","modified_gmt":"2020-04-04T21:27:11","slug":"how-to-prevent-a-51-attack","status":"publish","type":"post","link":"https:\/\/2miners.com\/blog\/how-to-prevent-a-51-attack\/","title":{"rendered":"How to Prevent a 51% Attack"},"content":{"rendered":"<p>Many cryptocurrencies have already been 51%-attacked. Recently, among others, <a href=\"https:\/\/2miners.com\/blog\/51-attack-explained\/\">Ethereum Classic<\/a>, <a href=\"https:\/\/2miners.com\/blog\/moac-chain-under-attack-by-mining-pools\/\">MOAC<\/a> and <a href=\"https:\/\/2miners.com\/blog\/callisto-network-under-51-attack\/\">Callisto<\/a> joined the club. We talked about 51% attacks in this article: <a href=\"https:\/\/2miners.com\/blog\/51-attack-explained\/\">\u201cCrypto Mythbusters: 51% Attack Explained\u201d<\/a><!--more--><\/p>\n<p>Not so long ago, Litecoin creator Charlie Lee has made a provocative statement.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"525\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">This is a thought-provoking observation. \ud83e\udd14<\/p>\n<p>By definition, a decentralized cryptocurrency must be susceptible to 51% attacks whether by hashrate, stake, and\/or other permissionlessly-acquirable resources.<\/p>\n<p>If a crypto can&#39;t be 51% attacked, it is permissioned and centralized. <a href=\"https:\/\/t.co\/LRCVj5F0O1\">https:\/\/t.co\/LRCVj5F0O1<\/a><\/p>\n<p>&mdash; Charlie Lee \u24c2\ufe0f\ud83d\udd78\ufe0f (@SatoshiLite) <a href=\"https:\/\/twitter.com\/SatoshiLite\/status\/1082491687169998848?ref_src=twsrc%5Etfw\">January 8, 2019<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Is Charlie right? Is it true that cryptocurrencies are doomed to fail and are created to be destroyed? Are there any ways of protection? Let\u2019s get into it.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1502\" src=\"https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/04\/51-attack-protection.jpg\" alt=\"\" width=\"1422\" height=\"800\" data-wp-pid=\"1502\" srcset=\"https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/04\/51-attack-protection.jpg 1422w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/04\/51-attack-protection-300x169.jpg 300w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/04\/51-attack-protection-768x432.jpg 768w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/04\/51-attack-protection-1024x576.jpg 1024w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/04\/51-attack-protection-800x450.jpg 800w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/04\/51-attack-protection-1200x675-cropped.jpg 1200w\" sizes=\"auto, (max-width: 1422px) 100vw, 1422px\" \/><\/p>\n<h2>Dominant Coin of the Algorithm<\/h2>\n<p><i>The dominant coin is a coin with the highest hashrate within the same mining algorithm.<\/i><\/p>\n<p>So what about Charlie? Whether he is right or wrong is up to you to decide, but he is definitely very canny. Here are two examples from his life that prove it.<\/p>\n<ol>\n<li>While creating Litecoin, Charlie Lee intentionally chose not to use Bitcoin algorithm SHA-256 and created his own Scrypt algorithm.<\/li>\n<li>He sold all the cryptocurrency he owned in the period of peak price in December 2017. What a great intuition!<\/li>\n<\/ol>\n<p>Charlie had a good reason not to use the Bitcoin algorithm for Litecoin. He was perfectly aware of the fact that it would be extremely difficult to compete with Bitcoin. He also understood the importance of being the dominant coin of the algorithm. We\u2019ll try to give you some insight into the matter.<\/p>\n<p>Let\u2019s say, there is Xcoin with network hashrate of 100 TH\/s and Ycoin with 1TH\/s \u2013\u00a0both on the same algorithm. Let\u2019s assume that one out of ten miners on this algorithm uses <a href=\"https:\/\/www.nicehash.com\/?refby=720a2fc8-d333-4fca-965e-aca84df62231\">Nicehash<\/a> for mining, so the power available for purchase is around 10 TH\/s. If we rent all 10 TH\/s and try manipulating Xcoin, we will fail. But in case of Ycoin, we could do some damage, because the hashrate would be 10 times higher than the overall network hashrate.<\/p>\n<p>Whether the power is yours or rented is not important \u2013\u00a0it\u2019s very difficult to find hardware that will let you take control of 51% of hashrate of the dominant coin. Look at Bitcoin \u2013 the king of cryptocurrencies. Today\u2019s network hashrate is 41,572 PH\/s. Let\u2019s imagine that the only existing miner in the Bitcoin network is Antminer S9 with hashrate of 14 TH\/s. We would have to find around 3 million such devices with power of 1.4 kW each. In order to make it all work, we would need an entire power station of a big million city. And its location raises some issues too.<\/p>\n<p>Also, in May 2018 Charlie Lee tweeted about the attack on Bitcoin Gold.<\/p>\n<p>https:\/\/twitter.com\/satoshilite\/status\/999681220639318017<\/p>\n<h2>Which Cryptocurrencies Can Be Attacked?<\/h2>\n<p>Check out the <a href=\"https:\/\/www.crypto51.app\/\">Crypto51<\/a> project. It is clear that the attack on Bitcoin, Litecoin or Ethereum is expensive and dangerous. One hour of attack on these cryptocurrencies costs $275 thousand, $33 thousand and $73 thousand respectively.<\/p>\n<p>As a rule, non-dominant coins on Ethash (Dagger Hashimoto) algorithm are the ones that fall under attacks. And this can be easily explained.<\/p>\n<ol>\n<li>There is a very large number of Ethash coins, so the choice is vast.<\/li>\n<li><a href=\"https:\/\/www.nicehash.com\/?refby=720a2fc8-d333-4fca-965e-aca84df62231\">Nicehash<\/a> and <a href=\"https:\/\/www.miningrigrentals.com\/?ref=41992\">Miningrigrentals<\/a> have a lot of available power to rent for this algorithm.<\/li>\n<li>Relatively low hashrate of some coins means low cost of an attack.<\/li>\n<\/ol>\n<p>Let\u2019s assume that our cryptocurrency uses Ethash or Equihash \u2013 after all, not everyone can create their own algorithm, like <a href=\"https:\/\/2miners.com\/blog\/how-to-mine-zcoin\/\">Zcoin<\/a>. So what to do now? Shut it down? No, wait \u2013 the developers of several cryptocurrencies created solutions that can help. First of all, it\u2019s Horizen protection system, Komodo dPoW and PirlGuard. Let\u2019s get to know them better.<\/p>\n<h2>Horizen Protection System<\/h2>\n<p>In 2018 Horizen (formerly Zencash) developers came up with their own way of protection against 51% attack. Zencash (ZEN) uses Equihash mining algorithm, just like its bigger brother Zcash (ZEC). ZEC has always been the dominant coin for the algorithm, while ZEN and ZCL (Zclassic) were the ones affected by the attacks.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1504\" src=\"https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/04\/horizen_dpow.jpg\" alt=\"\" width=\"1280\" height=\"720\" data-wp-pid=\"1504\" srcset=\"https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/04\/horizen_dpow.jpg 1280w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/04\/horizen_dpow-300x169.jpg 300w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/04\/horizen_dpow-768x432.jpg 768w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/04\/horizen_dpow-1024x576.jpg 1024w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/04\/horizen_dpow-800x450.jpg 800w\" sizes=\"auto, (max-width: 1280px) 100vw, 1280px\" \/><\/p>\n<p>Exchanges have always suffered the most from 51% attacks, as funds are withdrawn at their expense. So they came up with an idea to increase the number of blocks required for verification for all deposits to 200 or even 500. Still today it takes quite a lot of time for ZCL to be charged to account \u2013 it may take up to several days. Coinbase require 5676 blocks(about 24 hours) for confirmation of all ETC deposits.<\/p>\n<p>ZEN developers approached the problem differently and came up with the new PoW approach called <a href=\"https:\/\/www.horizen.global\/assets\/files\/A-Penalty-System-for-Delayed-Block-Submission-by-Horizen.pdf\">the delayed block submission penalty approach<\/a>.<\/p>\n<p><a href=\"https:\/\/2miners.com\/blog\/51-attack-explained\/\">Remember how 51% attack works?<\/a> Look at the image below.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1495\" src=\"https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/04\/image2.png\" alt=\"\" width=\"1322\" height=\"628\" data-wp-pid=\"1495\" srcset=\"https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/04\/image2.png 1322w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/04\/image2-300x143.png 300w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/04\/image2-768x365.png 768w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/04\/image2-1024x486.png 1024w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/04\/image2-800x380.png 800w\" sizes=\"auto, (max-width: 1322px) 100vw, 1322px\" \/><\/p>\n<p>It is a blockchain example where NB stands for Normal Block and MB is Malicious Block. Starting from block NB100, the attacker disconnected his node from the rest of the cryptocurrency network N and started mining his own branch M alone. When the rest of the world reached NB116, the attacker had already mined MB119, that is, he mined 3 blocks more than others. Without protection system, once the attacker reconnects to other nodes, he could make the work of the rest of the world invalid and cancel blocks NB100\u2013NB116, replacing them with MB100\u2013MB119.<\/p>\n<p>The Horizen team came up with the protection mechanism that \u201cpenalizes\u201d the attacker\u2019s branch with the blockchain hidden from the rest of the network. As a punishment, the attacker is forced to mine some amount of blocks in his branch.<\/p>\n<p>In the example above, after block MB122 the attacker has to mine another 133 blocks in his branch. The formula is simple. The current block in the network is NB116, the first block of the attacker is MB100.<\/p>\n<pre>116\u2013100 = 16 penalty points.\r\n\r\nThe second block of the attacker is MB101.\r\n\r\n116\u2013101 = 15 penalty points. And so on.\r\n\r\nAfter block 116 the attacker gets minus 1 point for each block. As a result, we get 16+15+14+13+...+1+0-1-1-1\u00a0= 133 blocks.<\/pre>\n<p>Still, don\u2019t get it? Let\u2019s try again.<\/p>\n<p>Let\u2019s say, we disconnected from the network and started mining our own branch. After we reconnect, we want to add 20 new blocks, but in response, the network says the following.<\/p>\n<p>You are a nice guy, but go mine another 231 blocks in your own branch, and then we can talk.<\/p>\n<p>Block find time in the ZEN network is 2.5 minutes, so the attack must last no less than 10 hours. Profitability of such attacks is obviously not very high. And most importantly, exchanges can monitor them and block malicious deposits.<\/p>\n<h2>Komodo Delayed Proof of Work (dPoW)<\/h2>\n<p>Komodo (KMD) developers suggested a universal solution that fits all cryptocurrencies with low hashrate on both PoW and PoS algorithms. The main idea is to regularly register the state of the coin\u2019s blockchain in the Bitcoin blockchain. It is extremely difficult to attack the BTC blockchain, so KMD developers used this to their advantage.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1505\" src=\"https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/04\/komodo-protection.jpeg\" alt=\"\" width=\"1024\" height=\"514\" data-wp-pid=\"1505\" srcset=\"https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/04\/komodo-protection.jpeg 1024w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/04\/komodo-protection-300x151.jpeg 300w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/04\/komodo-protection-768x386.jpeg 768w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/04\/komodo-protection-800x402.jpeg 800w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>Here is what\u2019s needed to make Komodo dPoW system work:<\/p>\n<ol>\n<li>the network of 64 notary nodes;<\/li>\n<li>a separate Bitcoin node for every notary node;<\/li>\n<li>BTC reserve for transactions in the Bitcoin blockchain.<\/li>\n<\/ol>\n<p>Komodo notary nodes are similar to masternodes in the way they work. The only difference is that in order to launch a masternode, a certain sum of your funds must be frozen \u2013 <a href=\"https:\/\/2masternodes.com\/\">1,000 DASH, 1,000 Zcoin, 500,000 $PAC<\/a> (the sum is established by the developers of a cryptocurrency). On the contrary, it is not a requirement in Komodo notary nodes. Komodo notary nodes owners are chosen by the KMD community. Komodo notary nodes get around 75% of the block rewards in the KMD network.<\/p>\n<pre>Average block time in the Komodo network \u00a0\u2013 1 minute.\r\nAverage block time in the Bitcoin network \u00a0\u2013 10 minutes.\r\n<\/pre>\n<p>Every ten minutes notary nodes register (validate) information about the state of the Komodo blockchain in the Bitcoin blockchain. Ideally, one needs to send a notary transaction to the Bitcoin network a few seconds before a new block is found. But the exact time when a block is found can\u2019t be predicted. So if in the course of 20\u201330 min there are no blocks in the Bitcoin network, there is no way to validate the current state of the Komodo blockchain.<\/p>\n<h2>How Komodo dPoW Fights Against 51% Attack<\/h2>\n<p>Let\u2019s take an ideal world as an example, where every 10 minutes we register the state of the Komodo blockchain in the Bitcoin blockchain. During this period of time, 10 new blocks are found in the Komodo network.<\/p>\n<p><b>Once the Komodo block state is registered in the Bitcoin blockchain, it can\u2019t be changed anymore. <\/b>This is the main idea of dPOW protection mechanism. After registration mining can only start from this point. Validation, in this case, works the same way as a safety net in \u201cWho Wants to Be a Millionaire?\u201d.<\/p>\n<p>Let\u2019s say, you want to attack the Komodo network. You disconnect your node on block 100, mine 15 blocks until block 115, then you reconnect your node and wait for the blockchain reorganization gladly rubbing your hands. But then it turns out that on block 110 Komodo notary nodes registered the state of the blockchain in the Bitcoin blockchain. They created a \u201csafety net\u201d, so now your 15 blocks can\u2019t be authorized.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1506\" src=\"https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/04\/komodo-bitcoin.png\" alt=\"\" width=\"1200\" height=\"627\" data-wp-pid=\"1506\" srcset=\"https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/04\/komodo-bitcoin.png 1200w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/04\/komodo-bitcoin-300x157.png 300w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/04\/komodo-bitcoin-768x401.png 768w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/04\/komodo-bitcoin-1024x535.png 1024w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/04\/komodo-bitcoin-800x418.png 800w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/04\/komodo-bitcoin-600x315-cropped.png 600w\" sizes=\"auto, (max-width: 1200px) 100vw, 1200px\" \/><\/p>\n<p>And what if blocks in Bitcoin are found every hour instead of every 10 minutes due to some delay? Will the attacker win then? In this case an exchange comes into play and sets the required number of verifications for incoming deposits. For example, if the requirement for deposits verification is 50 blocks (= 50 minutes), there is no point in 51% attack on KMD. Keep in mind that exchange and subsequent withdrawal of illegal funds also take time.<\/p>\n<p>Komodo created a truly safe, but rather difficult protection mechanism. You can find the detailed description of KMD dPoW on <a href=\"https:\/\/github.com\/KomodoPlatform\/komodo\/wiki\/Delayed-Proof-of-Work-%28dPoW%29-Whitepaper#attacks\">github<\/a> and in the <a href=\"https:\/\/blog.komodoplatform.com\/delayed-proof-of-work-explained-9a74250dbb86\">Komodo blog<\/a>.<\/p>\n<h2>PirlGuard Protection System<\/h2>\n<p>Pirl has been 51% attacked many times. It was depressing, but in the end developers created their own PirlGuard protection system.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1507\" src=\"https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/04\/pirlguard_blockchain_security.png\" alt=\"\" width=\"1000\" height=\"303\" data-wp-pid=\"1507\" srcset=\"https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/04\/pirlguard_blockchain_security.png 1000w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/04\/pirlguard_blockchain_security-300x91.png 300w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/04\/pirlguard_blockchain_security-768x233.png 768w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/04\/pirlguard_blockchain_security-800x242.png 800w\" sizes=\"auto, (max-width: 1000px) 100vw, 1000px\" \/><\/p>\n<p>The only article that describes the operation of PirlGuard was published by the Pirl team on <a href=\"https:\/\/medium.com\/pirl\/pirlguard-innovative-solution-against-51-attacks-87dd45aa1109\">Medium<\/a>. The title says that it is an innovative solution against 51% attacks. Let\u2019s take a look at the description of the PirlGuard operating mechanism.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-1508\" src=\"https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/04\/pirl-guard-system-description.png\" alt=\"\" width=\"1665\" height=\"878\" data-wp-pid=\"1508\" srcset=\"https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/04\/pirl-guard-system-description.png 1665w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/04\/pirl-guard-system-description-300x158.png 300w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/04\/pirl-guard-system-description-768x405.png 768w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/04\/pirl-guard-system-description-1024x540.png 1024w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/04\/pirl-guard-system-description-800x422.png 800w, https:\/\/2miners.com\/blog\/wp-content\/uploads\/2019\/04\/pirl-guard-system-description-600x315-cropped.png 600w\" sizes=\"auto, (max-width: 1665px) 100vw, 1665px\" \/><\/p>\n<p>The method seems to be the same as that of ZEN, right? If the attacker disconnects his node from the network, mines blocks and then reconnects, he gets penalized by the network and is forced to mine X amount of blocks in his own branch. Sadly, the article says nothing about how parameter X is calculated. We\u2019ve studied the PirlGuard code and it turned out that PirlGuard operates very differently from what they say in the official description.<\/p>\n<pre>if penalty &gt; 0 {\r\n\u00a0\u00a0\u00a0context := []interface{}{\r\n\u00a0\u00a0\u00a0\u00a0\u00a0\"penalty\", penalty,\r\n\u00a0\u00a0\u00a0}\r\n\u00a0\u00a0\u00a0log.Error(\"Chain is a malicious and we should reject it\", context... )\r\n\u00a0\u00a0\u00a0err = ErrDelayTooHigh\r\n\u00a0}<\/pre>\n<p>Here is how PirlGuard actually works: the developers set a certain parameter \u2013 the number of blocks. Let\u2019s say, it\u2019s 20. If the attacker reconnects his node to the network and adds his 15 blocks to it (15 is less than the established number, which is 20), the network will accept them and reorganize. If he adds 25 blocks, the branch will be rejected. That\u2019s it. There is no sophisticated penalty system or parameter X.<\/p>\n<p>We thought that maybe it\u2019s just a misunderstanding, so we decided to ask one of the Pirl developers for help. After a two-day discussion in Discord, we got nowhere. He claims that PirlGuard works just like the ZEN protection system, and we are simply missing something.<\/p>\n<p>Since we already found ourselves auditing the PirlGuard code, we decided to finish the job by creating<a href=\"https:\/\/git.pirl.io\/community\/pirl\/issues\/38\">\u00a0issue in their git-repository<\/a>. We pointed out the discrepancy between the description and the code itself. Cryptocurrencies that implemented PirlGuard can still be affected by 51% attacks, if the amount of blocks added to the network by the attacker is smaller than the established parameter that we mentioned earlier. Of course, you can always change settings of the required number of verifications on an exchange. For example, if you change the protection algorithm threshold to 50 blocks and the number of verifications on the exchange to more than 50 blocks, your cryptocurrency is unlikely to be successfully attacked.<\/p>\n<h2>Global Cryptocurrency Security Concern<\/h2>\n<p>We all use cryptocurrency products, but we don\u2019t know enough about the bugs they have. And they surely exist. There is no crypto police, so if something goes wrong, nobody is going to refund your savings.<\/p>\n<p>Just remember how Parity Multisig Wallets were destroyed with Ether worth 150 million dollars.<\/p>\n<p>And what about Ethereum developers delaying forks the day before the release because they found a security flaw? It\u2019s good they even noticed it.<\/p>\n<p>Decentralization is a huge advantage of cryptocurrencies, but also a huge disadvantage at the same time. Not all coin&#8217;s users have enough knowledge and time to analyze the code of the products they use. So they just have to take it on trust. It is what it is.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Many cryptocurrencies have already been 51%-attacked. Recently, among others, Ethereum Classic, MOAC and Callisto joined the club. We talked about 51% attacks in this article: \u201cCrypto Mythbusters: 51% Attack Explained\u201d<\/p>\n","protected":false},"author":3,"featured_media":1502,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-1491","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mining"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to Prevent a 51% Attack - Crypto Mining Blog<\/title>\n<meta name=\"description\" content=\"Many cryptocurrencies have already been 51%-attacked. Recently, among others, Ethereum Classic, MOAC and Callisto joined the club. We talked about 51%\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/2miners.com\/blog\/how-to-prevent-a-51-attack\/\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/2miners.com\/blog\/how-to-prevent-a-51-attack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/2miners.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Prevent a 51% Attack\"}]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Prevent a 51% Attack - Crypto Mining Blog","description":"Many cryptocurrencies have already been 51%-attacked. Recently, among others, Ethereum Classic, MOAC and Callisto joined the club. We talked about 51%","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/2miners.com\/blog\/how-to-prevent-a-51-attack\/","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BreadcrumbList","@id":"https:\/\/2miners.com\/blog\/how-to-prevent-a-51-attack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/2miners.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Prevent a 51% Attack"}]}]}},"_links":{"self":[{"href":"https:\/\/2miners.com\/blog\/wp-json\/wp\/v2\/posts\/1491","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/2miners.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/2miners.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/2miners.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/2miners.com\/blog\/wp-json\/wp\/v2\/comments?post=1491"}],"version-history":[{"count":8,"href":"https:\/\/2miners.com\/blog\/wp-json\/wp\/v2\/posts\/1491\/revisions"}],"predecessor-version":[{"id":2255,"href":"https:\/\/2miners.com\/blog\/wp-json\/wp\/v2\/posts\/1491\/revisions\/2255"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/2miners.com\/blog\/wp-json\/wp\/v2\/media\/1502"}],"wp:attachment":[{"href":"https:\/\/2miners.com\/blog\/wp-json\/wp\/v2\/media?parent=1491"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/2miners.com\/blog\/wp-json\/wp\/v2\/categories?post=1491"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/2miners.com\/blog\/wp-json\/wp\/v2\/tags?post=1491"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}