What Is a 51% Assault?
A 51% assault is when an individual, group, or entity positive factors management of 51% of a blockchain’s hashing energy, which means they’ve management over sure facets of the undertaking.
The tactic by which that is obtained is completely different for every consensus mechanism.
On a proof-of-work blockchain (equivalent to Bitcoin), this is able to be achieved by buying management of the community’s mining capabilities.
Then again, with a proof-of-stake blockchain (equivalent to Cardano), this is able to be achieved by controlling 51% of the staked tokens.
The blockchain is a distributed ledger, which means it’s decentralized.
Nonetheless, as quickly as an entity has greater than half of the hashing energy over the community, it’s inclined to a 51% assault.
How Does 51% Occur on a Technical Stage?
If a proof-of-work community is introduced with two conflicting chains, the community will select to go together with the longest chain.
It’s because the extra transactions it has efficiently accomplished, the extra doubtless it’s that it’s a very good actor.
Acquiring 51% of the hashing energy means you could mine quicker than the remainder of the miners.
Which means that 51% of attackers can rapidly create the longest chain after which act maliciously. The community has no alternative however to decide on the attacker’s chain, because it’ll be the longest.
Typically, you’ll discover that an attacker is not going to announce their blocks to the blockchain right away. As a substitute, they’ll mine privately to create their very own blockchain. That is to allow them to get the longest chain earlier than manipulating the general public blockchain.
They may spend their cash on the general public community (normally for real-world property that may’t be revoked) whereas excluding these transactions from their very own model of the blockchain — making a double spend drawback.
After a time period, the attacker will announce their model of the blockchain to the community, and it’ll must be accepted attributable to it being longer than some other chain.
That is how a 51% assault occurs on a proof-of-work blockchain. This course of could also be completely different when coping with different consensus mechanisms.
What Might a 51% Assault Outcome In?
As soon as an entity has management of 51% of the community, it might do a number of malicious issues that may disturb the blockchain for all members.
Modify Transactions
As soon as the aggressor has 51% of the hashing energy, they might modify transactions which might be validated by the community’s nodes. This might be, for instance, altering the quantity despatched and even canceling a cost solely.
Reverse Transactions
Transactions that happen whereas the attacker is in energy may also be reversed, inflicting a double spend drawback (one of many causes Bitcoin was created); thus, doubling the attacker’s cash.
Mining Monopoly
A mining monopoly might additionally happen on account of a 51% assault.
This might occur when the attacker blocks all transactions from a miner (or group of miners) in their very own personal community earlier than broadcasting their very own model to the community. Which means that the attacker can basically censor miners off of the community till they’re the one miner left — making a monopoly.
Sadly, this is able to imply the blockchain is now centralized, within the arms of a foul actor, whereas the earlier miner’s rewards stop to exist.
What Cannot 51% Attackers Do?
They could have a variety of energy, however they don’t seem to be God. 51% of attackers are restricted in some methods.
Transactions Earlier than They Are In Energy
Regardless of with the ability to modify, forestall, and reverse transactions throughout their reign, they can not delete or modify transactions made earlier than they get management.
Stop Broadcasting to the Blockchain
The attacker can not forestall somebody from broadcasting to the blockchain.
It’s because miners, stakers, validators, and so forth. (which the attacker will management) don’t broadcast to the blockchain. As a substitute, they’re those who approve or deny these transactions.
Steal Property
Attackers will be unable to steal property from wallets they do not management, as they can not broadcast the transaction to the blockchain.
Change the Community’s Protocol Guidelines
Issues like adjusting block rewards, token quantities, and consensus mechanisms are hard-wired into the blockchain’s system. Historically, these points are addressed by a delicate or arduous fork. A 51% attacker can not power by means of a fork.
If an attacker makes an attempt to power a fork, they’ll merely isolate themselves on the blockchain, as no different node will attain a consensus with them.
Take a look at our article on forks here.
How Do Networks Shield Themselves From a 51% Assault?
After all, no blockchain desires to be the topic to a 51% assault, so that they make use of a number of strategies to guard themselves.
Financially Unviable
The system that proof-of-work makes use of to discourage customers from doing that is by making it financially unviable for the attacker to take action. To ensure that somebody to acquire 51% of the hashing energy of a big proof-of-stake blockchain, they might require an insane quantity of computing energy and, in flip, some huge cash.
This, after all, scales with the dimensions of the community, which means smaller blockchains are extra inclined to those assaults.
Proof-Of-Stake
It’s simpler to realize 51% of the hashing energy on a small proof-of-work blockchain. Proof-of-stake can assist mitigate this danger, because it requires the richest stakers to place their cash on the road. Which means that they might lose their tokens in the event that they have been caught being a foul actor.
For extra on consensus mechanisms, learn our article on the subject here.
Within the delegated proof-of-stake consensus mechanism, validators are sometimes voted in by the neighborhood. Which means that if half of the validators on the community began appearing maliciously, the neighborhood might rapidly undelegated their tokens and take away them from the community.
Promotion of Decentralization
Merely, one of the simplest ways to guard your self from a 51% assault is by being as decentralized as potential.
Promotion of decentralization can come from the workforce behind the event of a blockchain — e.g., turning down funding from large corporations that need giant hashing energy — or from the neighborhood by merely establishing nodes themselves.
Has It Ever Occurred?
We have by no means seen a profitable 51% assault on Bitcoin or Ethereum, however now we have seen some smaller tasks fall sufferer to this assault.
Bitcoin Gold
When this undertaking suffered a 51% assault, it was the twenty sixth greatest cryptocurrency by market cap.
The attacker secured over 51% of the hashing energy, and over a interval of days, 18 million USD of Bitcoin Gold was stolen by means of the attacker’s double-spending.
Verge
Privateness coin, Verge, fell sufferer to a 51% assault in 2018, which resulted in 1.7 million USD being stolen. This got here solely a month after one other 51% assault, which worn out 22% of the token’s worth on the time.
In response to each 51% assaults, the Verge workforce carried out a tough fork to try to repair the exploit the attacker used.
Are 51% Assaults the Finish of Cryptocurrencies?
Each of the cash above are nonetheless alive however are considerably smaller than they have been previous to the assault. Bitcoin Gold, for instance, has fallen from being the twenty sixth greatest crypto to being simply exterior the highest 100.
Though the assaults did not outcome within the tasks instantly retiring, they did significantly hurt their value, progress, and repute.
Nonetheless, Vitalik Buterin suggests {that a} 51% assault would “not be deadly” for Ethereum 2.0. Stating that they might assault solely as soon as earlier than they’re faraway from the community. He then pointed to this not being the case on a proof-of-work system, which might be exploited again and again by the identical entity throughout a 51% assault.
Will a 51% Assault Ever Occur to Bitcoin?
Theoretically, it might occur. Nonetheless, it’s not possible.
Though we beforehand talked about that proof-of-work is much less safe than proof-of-stake, this largely applies to smaller proof-of-work networks.
The Bitcoin community is so giant that so as to receive 51% of the hashing energy, you would wish to spend just over 15 billion USD.
Not solely does this grow to be financially unviable, but it surely additionally minimizes the variety of potential attackers to a small group of billionaires that might afford this kind of funding.
What Is a 34% Assault?
A 34% assault poses the identical menace as a 51% assault does. Nonetheless, it requires rather a lot much less hashing fee to take action.
This assault makes use of Tangle, a distributed ledger that some cryptocurrencies use to wrongfully approve or disapprove a transaction, whereas solely needing 34% of the hashing energy.
Conclusion
The 51% assault is an exploit that assaults each the safety and decentralization of a cryptocurrency. When efficiently pulled off, it may end up in thousands and thousands of {dollars} being stolen and the repute of a undertaking plummeting.
As a result of sheer quantity of assets required to carry out such an assault, it’s unlikely that we’ll see the largest cryptocurrencies fall sufferer to a 51% assault. That being stated, you possibly can by no means say by no means — particularly within the blockchain world.
This text is part of the Hashnode Web3 blog, the place a workforce of curated writers are bringing out new assets that will help you uncover the universe of web3. Examine us out for extra on NFTs, DAOs, blockchains, and the decentralized future.