What Is a 51% Assault?
A 51% assault is when an individual, group, or entity positive factors management of 51% of a blockchain’s hashing energy, that means they’ve management over sure points of the undertaking.
The tactic during which that is obtained is totally different for every consensus mechanism.
On a proof-of-work blockchain (comparable to Bitcoin), this could be performed by buying management of the community’s mining capabilities.
Alternatively, with a proof-of-stake blockchain (comparable to Cardano), this could be performed by controlling 51% of the staked tokens.
The blockchain is a distributed ledger, that means it’s decentralized.
Nevertheless, as quickly as an entity has greater than half of the hashing energy over the community, it’s inclined to a 51% assault.
How Does 51% Occur on a Technical Degree?
If a proof-of-work community is introduced with two conflicting chains, the community will select to go along with the longest chain.
It’s because the extra transactions it has efficiently accomplished, the extra probably it’s that it’s a very good actor.
Acquiring 51% of the hashing energy means you could mine sooner than the remainder of the miners.
Which means 51% of attackers can rapidly create the longest chain after which act maliciously. The community has no alternative however to decide on the attacker’s chain, because it’ll be the longest.
Typically, you’ll discover that an attacker is not going to announce their blocks to the blockchain immediately. As an alternative, they’ll mine privately to create their very own blockchain. That is to allow them to get the longest chain earlier than manipulating the general public blockchain.
They may spend their cash on the general public community (normally for real-world belongings that may’t be revoked) whereas excluding these transactions from their very own model of the blockchain — making a double spend drawback.
After a time frame, the attacker will announce their model of the blockchain to the community, and it’ll should be accepted attributable to it being longer than some other chain.
That is how a 51% assault occurs on a proof-of-work blockchain. This course of could also be totally different when coping with different consensus mechanisms.
What May a 51% Assault Consequence In?
As soon as an entity has management of 51% of the community, it may well do a number of malicious issues that can disturb the blockchain for all contributors.
Modify Transactions
As soon as the aggressor has 51% of the hashing energy, they may modify transactions which are validated by the community’s nodes. This might be, for instance, altering the quantity despatched and even canceling a cost solely.
Reverse Transactions
Transactions that happen whereas the attacker is in energy may also be reversed, inflicting a double spend drawback (one of many causes Bitcoin was created); thus, doubling the attacker’s cash.
Mining Monopoly
A mining monopoly may additionally happen on account of a 51% assault.
This might occur when the attacker blocks all transactions from a miner (or group of miners) in their very own non-public community earlier than broadcasting their very own model to the community. Which means the attacker can basically censor miners off of the community till they’re the one miner left — making a monopoly.
Sadly, this could imply the blockchain is now centralized, within the arms of a nasty actor, whereas the earlier miner’s rewards stop to exist.
What Cannot 51% Attackers Do?
They could have a variety of energy, however they are not God. 51% of attackers are restricted in some methods.
Transactions Earlier than They Are In Energy
Regardless of with the ability to modify, stop, and reverse transactions throughout their reign, they can not delete or modify transactions made earlier than they get management.
Stop Broadcasting to the Blockchain
The attacker can not stop somebody from broadcasting to the blockchain.
It’s because miners, stakers, validators, and so on. (which the attacker will management) don’t broadcast to the blockchain. As an alternative, they’re those who approve or deny these transactions.
Steal Belongings
Attackers won’t be able to steal belongings from wallets they do not management, as they can not broadcast the transaction to the blockchain.
Change the Community’s Protocol Guidelines
Issues like adjusting block rewards, token quantities, and consensus mechanisms are hard-wired into the blockchain’s system. Historically, these points are addressed by a mushy or arduous fork. A 51% attacker can not pressure by means of a fork.
If an attacker makes an attempt to pressure a fork, they’ll merely isolate themselves on the blockchain, as no different node will attain a consensus with them.
Try our article on forks here.
How Do Networks Defend Themselves From a 51% Assault?
After all, no blockchain needs to be the topic to a 51% assault, in order that they make use of a number of methods to guard themselves.
Financially Unviable
The system that proof-of-work makes use of to discourage customers from doing that is by making it financially unviable for the attacker to take action. To ensure that somebody to acquire 51% of the hashing energy of a giant proof-of-stake blockchain, they might require an insane quantity of computing energy and, in flip, some huge cash.
This, after all, scales with the scale of the community, that means smaller blockchains are extra inclined to those assaults.
Proof-Of-Stake
It’s simpler to realize 51% of the hashing energy on a small proof-of-work blockchain. Proof-of-stake may help mitigate this threat, because it requires the richest stakers to place their cash on the road. Which means they might lose their tokens in the event that they had been caught being a nasty actor.
For extra on consensus mechanisms, learn our article on the subject here.
Within the delegated proof-of-stake consensus mechanism, validators are sometimes voted in by the neighborhood. Which means if half of the validators on the community began appearing maliciously, the neighborhood may rapidly undelegated their tokens and take away them from the community.
Promotion of Decentralization
Merely, the easiest way to guard your self from a 51% assault is by being as decentralized as potential.
Promotion of decentralization can come from the crew behind the event of a blockchain — e.g., turning down funding from huge firms that need giant hashing energy — or from the neighborhood by merely establishing nodes themselves.
Has It Ever Occurred?
We have by no means seen a profitable 51% assault on Bitcoin or Ethereum, however we have now seen some smaller tasks fall sufferer to this assault.
Bitcoin Gold
When this undertaking suffered a 51% assault, it was the twenty sixth largest cryptocurrency by market cap.
The attacker secured over 51% of the hashing energy, and over a interval of days, 18 million USD of Bitcoin Gold was stolen by means of the attacker’s double-spending.
Verge
Privateness coin, Verge, fell sufferer to a 51% assault in 2018, which resulted in 1.7 million USD being stolen. This got here solely a month after one other 51% assault, which worn out 22% of the token’s worth on the time.
In response to each 51% assaults, the Verge crew carried out a tough fork to try to repair the exploit the attacker used.
Are 51% Assaults the Finish of Cryptocurrencies?
Each of the cash above are nonetheless alive however are considerably smaller than they had been previous to the assault. Bitcoin Gold, for instance, has fallen from being the twenty sixth largest crypto to being simply outdoors the highest 100.
Though the assaults did not end result within the tasks instantly retiring, they did significantly hurt their value, progress, and fame.
Nevertheless, Vitalik Buterin suggests {that a} 51% assault would “not be deadly” for Ethereum 2.0. Stating that they may assault solely as soon as earlier than they’re faraway from the community. He then pointed to this not being the case on a proof-of-work system, which might be exploited again and again by the identical entity throughout a 51% assault.
Will a 51% Assault Ever Occur to Bitcoin?
Theoretically, it may occur. Nevertheless, it’s not possible.
Though we beforehand talked about that proof-of-work is much less safe than proof-of-stake, this largely applies to smaller proof-of-work networks.
The Bitcoin community is so giant that with the intention to receive 51% of the hashing energy, you would want to spend just over 15 billion USD.
Not solely does this turn out to be financially unviable, but it surely additionally minimizes the variety of potential attackers to a small group of billionaires that would afford this kind of funding.
What Is a 34% Assault?
A 34% assault poses the identical risk as a 51% assault does. Nevertheless, it requires rather a lot much less hashing fee to take action.
This assault makes use of Tangle, a distributed ledger that some cryptocurrencies use to wrongfully approve or disapprove a transaction, whereas solely needing 34% of the hashing energy.
Conclusion
The 51% assault is an exploit that assaults each the safety and decentralization of a cryptocurrency. When efficiently pulled off, it can lead to hundreds of thousands of {dollars} being stolen and the fame of a undertaking plummeting.
As a result of sheer quantity of assets required to carry out such an assault, it’s unlikely that we’ll see the largest cryptocurrencies fall sufferer to a 51% assault. That being mentioned, you’ll be able to by no means say by no means — particularly within the blockchain world.
This text is part of the Hashnode Web3 blog, the place a crew of curated writers are bringing out new assets that can assist you uncover the universe of web3. Test us out for extra on NFTs, DAOs, blockchains, and the decentralized future.