paint-brush
Breaking Down Eclipse Attacks on a Blockchainby@talktomaruf
371 reads
371 reads

Breaking Down Eclipse Attacks on a Blockchain

by Abubakar Maruf7mJune 27th, 2022
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Generally, cyber-attacks usually bank on loopholes or vulnerabilities in the security architecture of an ecosystem. Attackers sometimes aim to prove the vulnerabilities in the security of the victims or steal vital information to blackmail victims. What is prominent to most cyber-attacks is that they are usually mounted for financial gains. Blockchain technology is a novel technology that is used to record on-chain transactions in blocks that are concatenated after being verified by miners. Due to its DLT–Decentralized/Distributed ledger Technology—feature, the technology has been widely adopted and utilized by several industries, including finance, healthcare, and logistics. The financial use case of the blockchain brought it to the limelight, which in turn makes it a subject of numerous attacks theoretically.

Company Mentioned

Mention Thumbnail
featured image - Breaking Down Eclipse Attacks on a Blockchain
Abubakar Maruf HackerNoon profile picture
Abubakar Maruf

Abubakar Maruf

@talktomaruf

Technical writer and enthusiast for everything blockchain

Learn More
LEARN MORE ABOUT @TALKTOMARUF'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

Abubakar Maruf HackerNoon profile picture
Abubakar Maruf@talktomaruf
Technical writer and enthusiast for everything blockchain

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite