A Technical Q&A on Network Partition Attacksby@ricc
763 reads

A Technical Q&A on Network Partition Attacks

July 23rd 2020
11m
by @ricc 763 reads
tldt arrow
Read on Terminal Reader
Read this story w/o Javascript

Too Long; Didn't Read

A Technical Q&A on Network Partition Attacks on Bitcoin and its Proof-of-Stake algorithms. Bitcoin is prone to many different types of attack. Bitcoin is surprisingly centralized from an Internet routing perspective: 20% of the Bitcoin nodes are hosted in less than 100 IP prefixes. Any malicious ISP with access to the Internet routing infrastructure can perform this attack which starts to be effective after only few minutes. Any ISP transiting Bitcoin traffic can delay the propagation of mined blocks (for up to 20 minutes), in a stealth way, even if she sees one direction of the traffic.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail

Coins Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - A Technical Q&A on Network Partition Attacks
ricc HackerNoon profile picture

@ricc

ricc


Receive Stories from @ricc

react to story with heart

RELATED STORIES

L O A D I N G
. . . comments & more!
Hackernoon hq - po box 2206, edwards, colorado 81632, usa