paint-brush
A Technical Q&A on Network Partition Attacksby@ricc
874 reads
874 reads

A Technical Q&A on Network Partition Attacks

by ricc11mJuly 23rd, 2020
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

A Technical Q&A on Network Partition Attacks on Bitcoin and its Proof-of-Stake algorithms. Bitcoin is prone to many different types of attack. Bitcoin is surprisingly centralized from an Internet routing perspective: 20% of the Bitcoin nodes are hosted in less than 100 IP prefixes. Any malicious ISP with access to the Internet routing infrastructure can perform this attack which starts to be effective after only few minutes. Any ISP transiting Bitcoin traffic can delay the propagation of mined blocks (for up to 20 minutes), in a stealth way, even if she sees one direction of the traffic.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail

Coins Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - A Technical Q&A on Network Partition Attacks
ricc HackerNoon profile picture
ricc

ricc

@ricc

crypto enthusiast

About @ricc
LEARN MORE ABOUT @RICC'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

ricc HackerNoon profile picture
ricc@ricc
crypto enthusiast

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite