Absurdistan: For $2.5k per day, you can attack Verge (XVG). For $44k you can shut down Electroneum (ETN) as well.

2019-3-1 01:51

A 51% attack means that 51% of the ‘computer processing power’ used to verify transactions is controlled by one entity, and once this number (51%) has been reached, they can create a new ledger (blockchain ‘fork’ basically) so that they can double spend their own coins (among a few other capabilities). So basically, if there was an election and you control 51% of the vote, you decide who gets elected.

If you are curious what an attack like this costs to undertake on any blockchain, there is an interesting website that calculates exactly that. You can basically rent hashing power from NiceHash to complete an attack and the website tracks the cost for that rent.


The calculations are based on renting hashing power from NiceHash (explained in more detail here). As noted on the website, the top coins are safe from this, and the real problem occurs for smaller coins where NiceHash has more than enough hashing power to complete an attack.

It is very surprising that it is possible to rent enough hashing power for many of the smaller currencies, which makes you question the use of PoW for smaller coins.

The numbers this websites shows are staggering: for example, Verge has a 88 million dollar market cap and can be attacked for 100$ an hour or 2500$ for an entire day. By using a simple mining pool like NiceHash.

And Verge already knows the feeling – it suffered the attack two times in its short history. If you are in a mood – here is our XVG price prediction for the future.

With this much hash power you can basically rewrite the whole chain of a smaller cryptocoin. This makes it possible for hackers to send their coins to exchange, exchange the coins for another coin, withdraw those coins, ewrite the blockchain back to the original and now hacker has the old coins and the coins he stole.

Most of the smaller coins networks rely on the benevolence of miners. They rely on miners playing nice which means the security model is broken right now. The whole point of crypto is we shouldn’t need to trust anyone.

Another coin that has a $57 million market cap, Electroneum, can be attacked and reorganized for $1800 per hour or $44k per day. A bit more money than for Verge, but still a low number for a moderately serious attacker. Here is our ETN price prediction for 2019 and beyond.

This is where importance and advantages, among many other, of Bitcoin network lie, it is slow and archaic, but it’s the historical ledger of crypto and the most difficult to attack. – $7.5 million per day. Relative to other coins, that is huge but surely a pocket change for a state or institutional adversary that would want to attack bitcoin. This raises a question of viability of PoW model but that is beyond the scope of this article.

The post Absurdistan: For $2.5k per day, you can attack Verge (XVG). For $44k you can shut down Electroneum (ETN) as well. appeared first on CaptainAltcoin.

Similar to Notcoin - TapSwap on Solana Airdrops In 2024

origin »

Well (WELL) íà Currencies.ru

$ 0 (+0.00%)
Îáúåì 24H $0
Èçìåíåèÿ 24h: 0.00 %, 7d: 0.00 %
Cåãîäíÿ L: $0 - H: $0
Êàïèòàëèçàöèÿ $0 Rank 99999
Äîñòóïíî / Âñåãî 0 WELL

attack well etn basically absurdistan day electroneum

attack well → Ðåçóëüòàòîâ: 45


The Proof-of-Stake Pandora’s Box—A “Rich Get Richer” Formula?

It has been six days since Constantinople had to be forcefully put off because of a bug. Chain Security sniffed out the vulnerability just before miners upgraded gifting hackers—who appear to be on the prowl, to not only siphon out hard earned funds but revive the memories of 2016 DAO attack that as well all […] The post The Proof-of-Stake Pandora’s Box—A “Rich Get Richer” Formula? appeared first on Ethereum World News.

2019-1-22 15:30


Ôîòî:

Security Researchers Reveal Wallet Vulnerabilities On Stage at 35C3

In a demonstration titled “Wallet. fail,” a team of security researchers hacked into the Trezor One, Ledger Blue and Ledger Nano S. Unfortunately, it appears as if their findings were first put on display at the 35th Chaos Communication Congress (35C3) in Leipzig, Germany, rather than through accepted Responsible Disclosure practices, which would have allowed the manufacturers to patch the vulnerabilities and protect their customers from any potential attack.

2019-1-1 19:15


Ôîòî:

Researchers Link NotPetya Outbreak and Kiev Power Grid Outage to one Hacking Group

Depending on how one looks at the world, coincidence is either a common thing or doesn’t exist at all. In the world of cyberthreats, it would seem the latter is the more common conclusion. New research shows the NotPetya ransomware attack, as well as a disruption of Ukraine’s power grid, are linked together by one […] The post Researchers Link NotPetya Outbreak and Kiev Power Grid Outage to one Hacking Group appeared first on NullTX.

2018-11-8 18:58


Ôîòî:

The free internet makes us the product — we need to stop it

The bad headlines continue to stack up for Facebook this year: from the Cambridge Analytica scandal, to the New York Times report that Facebook gave Apple, Samsung, and other mobile device makers access to its users personal data without permission, to the revelation that the firm routinely gives user information and preferences to several Chinese telecommunications firms, to last week’s security breach in which hackers took control of 50 million user accounts as well as any third-party sites those users logged into via Facebook.

2018-10-6 19:30


Ôîòî:

What Bitcoin Did Gets Technical with Crypto-Educator Jimmy Song

<iframe style="border: none" src="//html5-player. libsyn. com/embed/episode/id/7132345/height/90/theme/custom/autoplay/no/autonext/no/thumbnail/yes/preload/no/no_addthis/no/direction/backward/render-playlist/no/custom-color/87A93A/" height="90" width="100%" scrolling="no"  allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen></iframe> On the latest episode of What Bitcoin Did, host Peter McCormack interviews Jimmy Song, a consultant in blockchain education, to take an in-depth look at a relatively recent incident in the world of cryptocurrency and use that as an example to segue into a deeper discussion on the possible trajectories of Bitcoin itself.

2018-10-6 00:05


Bitcoin Gold (BTG) Gets Delisted By Bittrex Crypto Exchange Due To $18 Million Hack

Bittrex Exchange Removes Bitcoin Gold From Their Exchange Among cryptocurrency startup companies, the risk of theft, extortion, or major attack is very significant. The cryptocurrency community has always been especially susceptible to crime, because of the prevalence of technology-minded hackers in the markets, as well as the anonymous nature of cryptocurrencies in general. For these […]

2018-9-4 13:37


A Guide to 99% Fault Tolerant Consensus

Special thanks to Emin Gun Sirer for review We’ve heard for a long time that it’s possible to achieve consensus with 50% fault tolerance in a synchronous network where messages broadcasted by any honest node are guaranteed to be received by all other honest nodes within some known time period (if an attacker has more than 50%, they can perform a “51% attack”, and there’s an analogue of this for any algorithm of this type).

2018-8-9 04:03


Are you afraid of cyber attacks? Improve your cyber security!

Even though we are well into our second decade of widespread internet use, the term ‘cyber attack’ is still a relatively new and daunting one for many people. Many individuals and small businesses entrust their cybersecurity to off-the-shelf antivirus softwares, which can effective but certainly aren’t foolproof. When it comes to preventing cyber attacks, everyone […]

2018-7-27 16:04


Ôîòî:

Governance, Part 2: Plutocracy Is Still Bad

Coin holder voting, both for governance of technical features, and for more extensive use cases like deciding who runs validator nodes and who receives money from development bounty funds, is unfortunately continuing to be popular, and so it seems worthwhile for me to write another post explaining why I (and Vlad Zamfir and others) do not consider it wise for Ethereum (or really, any base-layer blockchain) to start adopting these kinds of mechanisms in a tightly coupled form in any significant way.

2018-7-21 23:03


STARKs, Part I: Proofs with Polynomials

Special thanks to Eli Ben-Sasson for ongoing help, explanations and review, coming up with some of the examples used in this post, and most crucially of all inventing a lot of this stuff; thanks to Hsiao-wei Wang for reviewing Hopefully many people by now have heard of ZK-SNARKs, the general-purpose succinct zero knowledge proof technology that can be used for all sorts of usecases ranging from verifiable computation to privacy-preserving cryptocurrency.

2018-7-21 23:03