{"id":2679,"date":"2023-01-13T21:26:57","date_gmt":"2023-01-13T21:26:57","guid":{"rendered":"https:\/\/nft.runfyers.com\/index.php\/2023\/01\/13\/blockchain-51-attacks-what-to-know-to-stay-safe\/"},"modified":"2023-01-13T21:26:57","modified_gmt":"2023-01-13T21:26:57","slug":"blockchain-51-attacks-what-to-know-to-stay-safe","status":"publish","type":"post","link":"https:\/\/nft.runfyers.com\/index.php\/2023\/01\/13\/blockchain-51-attacks-what-to-know-to-stay-safe\/","title":{"rendered":"Blockchain 51% Attacks: What to Know to Stay Safe"},"content":{"rendered":"<p><\/p>\n<div>\n<p class=\"has-drop-cap\">While undoubtedly complex and necessary for the world of crypto and NFTs, the ideas that underpin and connect to <a href=\"https:\/\/nftnow.com\/guides\/blockchain-101-all-the-basics-explained\/\" target=\"_blank\" rel=\"noreferrer noopener\">blockchain technology<\/a> are relatively simple to understand. One of its most important concepts is the so-called \u201c51 percent attack:\u201d an almost unrivaled threat to decentralized technology (and the crypto industry it supports). To understand what that is and its potential wide-reaching implications for Web3, we need to look at the fundamentals of the blockchain itself.<\/p>\n<p>The blockchain is a distributed digital database that moves and tracks data in blocks that link together to form a chain-like record of information flow. The important thing to know here is that blockchain systems are managed by a network of users and computers called nodes, which collectively validate transactions in place of a third party like a bank or a centralized data server controlled by a Big Tech company.<\/p>\n<h2>But what\u2019s a 51 percent attack?\u00a0<\/h2>\n<p>In theory, the number of validating nodes in a blockchain system corresponds to the security of that network. To successfully hack the system, a group or an individual would need to take control of the majority of nodes in the system \u2014 51 percent of them \u2014\u00a0to alter the blockchain record and forge transactions involving crypto and NFTs, potentially resulting in the loss of <a href=\"https:\/\/nftnow.com\/features\/the-worst-crypto-and-nft-moments-of-2022\/\" target=\"_blank\" rel=\"noreferrer noopener\">countless millions<\/a> worth of digital assets. In essence, then, a 51 percent attack allows bad actors to hijack the blockchain network, giving them the ability to manipulate transactions in the network with disastrous financial effects.<\/p>\n<p>This could occur through the collusion of groups and individuals that control the nodes or through hackers taking control of them. The greater the number of nodes, the more difficult this is to do. The Ethereum blockchain reportedly has <a href=\"https:\/\/www.binance.com\/en\/news\/top\/7214655\" target=\"_blank\" rel=\"noreferrer noopener\">hundreds of thousands of validators<\/a> in its network, for example, while other chains have far fewer.<\/p>\n<h2>Examples of 51 percent attacks<\/h2>\n<p>In March 2022, hackers with ties to the North Korean government successfully gained control of five of nine of the Ethereum-linked sidechain Ronin\u2019s validating nodes on the popular play-to-earn game blockchain-based game <a href=\"https:\/\/nftnow.com\/news\/axie-infinity-just-restarted-transactions-after-615-million-hack\/\" target=\"_blank\" rel=\"noreferrer noopener\">Axie Infinity<\/a>. The hackers forged withdrawals from the network that amounted to <a href=\"https:\/\/www.coindesk.com\/tech\/2022\/03\/29\/axie-infinitys-ronin-network-suffers-625m-exploit\/\" target=\"_blank\" rel=\"noreferrer noopener\">roughly $625 million<\/a>, making it the largest hack in that network\u2019s history.\u00a0 When the Ronin team realized what had happened, they took a centralized step and paused the blockchain network entirely for months before restarting transactions in late June.<\/p>\n<p>Another <a href=\"https:\/\/twitter.com\/bitcoingold\/status\/1221450315825807363\" target=\"_blank\" rel=\"noreferrer noopener\">51 percent attack<\/a> occurred in 2020 when hackers took control of Bitcoin Gold, a small crypto token that <a href=\"https:\/\/www.forbes.com\/sites\/billybambrough\/2020\/01\/28\/bitcoin-rival-suffers-devastating-attack\/?sh=37a4a915cb73\" target=\"_blank\" rel=\"noreferrer noopener\">split from the Bitcoin blockchain<\/a> in 2017. The hackers were able to double-spend over $72,000 worth of the cryptocurrency. Double spending is when a cryptocurrency is used twice or more, allowing the individual who initiated the transaction to reclaim their spent tokens.<\/p>\n<h2>Just how likely is a 51 percent attack?<\/h2>\n<p>Vulnerability to this kind of attack directly correlates to the network size: the bigger the blockchain, the more secure it is. For systems running on energy-intensive proof-of-work (PoW) consensus mechanisms (like Bitcoin), the computing power required to pull off a 51 percent attack is massive and decreases their likelihood; it\u2019s simply not worth the hackers\u2019 time and money to even attempt to do so.<\/p>\n<p>If they can pull it off, however, there is no way to revoke the physical hardware enabling them to attack the system, meaning they could continue to do this until network administrators initiate a \u201chard fork.\u201d A hard fork is a significant change to a blockchain\u2019s protocol (its basic set of rules) that branches it into two now incompatible versions of itself. Such events are often the point of origin for new cryptocurrencies, as was the case with Bitcoin Gold.<\/p>\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><figcaption>Hard fork visualization. Credit: nft now<\/figcaption><\/figure>\n<\/div>\n<p>But there are ways to disincentivize 51 percent attacks. Proof-of-stake (PoS) consensus mechanisms, like the one the Ethereum blockchain runs on, are exponentially less energy-intense than PoW-operated networks. These rely on validators putting up (staking) an amount of cryptocurrency to be accepted as a validating node. In the case of Ethereum, that\u2019s a hefty 32 ETH. In theory, if enough validators in a PoS system colluded, they could take control of the network. Still, even if this occurred, Ethereum administrators could \u201cslash\u201d this staked ETH, meaning the violating nodes would simultaneously lose their investment and their ability to attack again.<\/p>\n<p>Ethereum Co-Founder Vitalik Buterin has addressed this issue <a href=\"http:\/\/er.com\/vitalikbuterin\/status\/1301298086027821056\" target=\"_blank\" rel=\"noreferrer noopener\">several times<\/a> over the years, claiming that, while undesirable, a 51 percent attack wouldn\u2019t be fatal to its blockchain.\u00a0<\/p>\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\">\n<div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">We need to get past the myth that it&#8217;s *fatal* if one entity gets enough to 51% attack PoS. The reality is they could attack *once*, and then they either get slashed or (if censorship attack) soft-forked away and inactivity-leaked, and they lose their coins so can&#8217;t attack again. <a href=\"https:\/\/t.co\/utash1hUDU\" target=\"_blank\">https:\/\/t.co\/utash1hUDU<\/a><\/p>\n<p>\u2014 vitalik.eth (@VitalikButerin) <a href=\"https:\/\/twitter.com\/VitalikButerin\/status\/1301298086027821056?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">September 2, 2020<\/a><\/p><\/blockquote>\n<\/div>\n<\/figure>\n<h2 id=\"h-the-decentralization-debate\">The decentralization debate<\/h2>\n<p>In the days before <a href=\"https:\/\/nftnow.com\/features\/ethereum-merge-heres-what-to-expect-from-the-groundbreaking-move\/\" target=\"_blank\" rel=\"noreferrer noopener\">Ethereum\u2019s merge<\/a> to the much more <a href=\"https:\/\/nftnow.com\/features\/nfts-and-the-environment-why-the-anger-is-unjustified\/\" target=\"_blank\" rel=\"noreferrer noopener\">energy-efficient<\/a> PoS consensus system it now runs on, Buterin <a href=\"https:\/\/twitter.com\/vitalikbuterin\/status\/1185750386772066304\" target=\"_blank\" rel=\"noreferrer noopener\">posted a Twitter poll<\/a> in which he asked how long people would want to wait before they supported \u201cextra-protocol\u201d intervention. The idea was simple: would the community support a centralized authority stepping in and making a judgment call for the entire blockchain in the event of extreme circumstances?<\/p>\n<figure class=\"wp-block-embed is-type-rich is-provider-twitter wp-block-embed-twitter\">\n<div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">How many blocks would a 51% attack need to revert for you to support extra-protocol intervention (ie. a soft-fork) that declares the attack chain illegitimate so that users and clients ignore it?<\/p>\n<p>\u2014 vitalik.eth (@VitalikButerin) <a href=\"https:\/\/twitter.com\/VitalikButerin\/status\/1185750386772066304?ref_src=twsrc%5Etfw\" target=\"_blank\" rel=\"noopener\">October 20, 2019<\/a><\/p><\/blockquote>\n<\/div>\n<\/figure>\n<p>The question isn\u2019t rhetorical, either. Bitcoin isn\u2019t the only blockchain that was forced to hard fork in the event of an attack. In 2016, Ethereum instituted a hard fork after <a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2022-02-22\/attacker-behind-record-2016-crypto-hack-might-have-been-found\" target=\"_blank\" rel=\"noreferrer noopener\">attackers exploited flaws<\/a> in an application running on the blockchain, causing the system\u2019s administrators to roll back the transactions related to the exploit to return users\u2019 funds to them.<\/p>\n<p>Such centralized actions are the antithesis of the very concept of blockchain technology: While the largest single group of respondents to Buterin\u2019s poll supported the idea of centralized intervention, the thought of such action sits uneasily with a significant portion of the Web3 community, as evidenced by the comments below the same poll. However, for the time being, they remain an unfortunate necessity to ensure the stability of these systems in times of extreme need. Regardless, they remain a controversial center of discussion in NFT and crypto circles. Much like the discussion surrounding <a href=\"https:\/\/nftnow.com\/features\/heres-why-the-path-to-decentralized-marketplaces-wont-be-linear\/\" target=\"_blank\" rel=\"noreferrer noopener\">decentralized Web3 marketplaces<\/a>, it may be that decentralization by centralized means is the best, albeit paradoxical, path forward.<\/p>\n<\/p><\/div>\n<p><script async src=\"\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><br \/>\n<br \/><a href=\"https:\/\/nftnow.com\/guides\/blockchain-51-attacks-what-to-know-to-stay-safe\/\" target=\"_blank\" rel=\"noopener\">Source link <\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>While undoubtedly complex and necessary for the world of crypto and NFTs, the ideas that underpin and connect to blockchain technology are relatively simple to understand. One of its most important concepts is the so-called \u201c51 percent attack:\u201d an almost unrivaled threat to decentralized technology (and the crypto industry it supports). To understand what that [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2680,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true},"categories":[10],"tags":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/nftnow.com\/wp-content\/uploads\/2023\/01\/51-Percent-Attack-Featured.png","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/nft.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts\/2679"}],"collection":[{"href":"https:\/\/nft.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nft.runfyers.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nft.runfyers.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nft.runfyers.com\/index.php\/wp-json\/wp\/v2\/comments?post=2679"}],"version-history":[{"count":0,"href":"https:\/\/nft.runfyers.com\/index.php\/wp-json\/wp\/v2\/posts\/2679\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nft.runfyers.com\/index.php\/wp-json\/wp\/v2\/media\/2680"}],"wp:attachment":[{"href":"https:\/\/nft.runfyers.com\/index.php\/wp-json\/wp\/v2\/media?parent=2679"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nft.runfyers.com\/index.php\/wp-json\/wp\/v2\/categories?post=2679"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nft.runfyers.com\/index.php\/wp-json\/wp\/v2\/tags?post=2679"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}