Forum

Let the world know
  • bitcoinBitcoin (BTC) $ 94,397.00 2.54%
  • ethereumEthereum (ETH) $ 3,087.54 0.06%
  • tetherTether (USDT) $ 1.00 0.03%
  • solanaSolana (SOL) $ 237.45 0.85%
  • bnbBNB (BNB) $ 611.67 0.53%
  • xrpXRP (XRP) $ 1.11 3.08%
  • dogecoinDogecoin (DOGE) $ 0.380505 1.19%
  • usd-coinUSDC (USDC) $ 0.999848 0.14%
  • staked-etherLido Staked Ether (STETH) $ 3,086.29 0.03%
  • cardanoCardano (ADA) $ 0.813429 11.43%
You need to log in to create posts and topics.

crypto51.app Crypto assetinfo, insights

crypto51.app is intended to bring light to the risk of 51% attacks on smaller cryptocurrencies. It is not intended to encourage or help in completing an attack, but instead to get people talking about the problem and potential solutions.

In Proof of Work (PoW) cryptocurrencies, nodes typically are set up to recognize the blockchain with the most blocks (and therefore the most hashing power) as the correct version of history. Miners with > 50% of the network hashing power can take advantage of this by sending funds to one address on the main chain, while sending the same funds to another address on a forked copy of the blockchain that they are silently mining with more hashing power than the main chain.

Since other nodes only know about the main chain, they will see the first transaction as valid, and exchanges, etc will accept this transaction as valid. This malicious node can later release these silently mined blocks, and other nodes will accept this as the new 'correct chain' since it is longer. This will cause the original transaction to effectively dissappear, and nodes will recognize the funds as being sent to the address from the new chain instead. This is known as a 'double spend' attack.

Most bigger cryptocurrencies have sufficient mining capacity behind them, making it extremely expensive to acquire the necessary hardware to pull an attack like this off. Smaller cryptocurrencies have less hashing power securing the network, making it possible to simply rent hashing power from miners on a service like Nicehash for a few hours. This significantly reduces the capital costs of an attack.