Blockchain Security Introductory Notes (4)

avatar
慢雾科技
5 years ago
This article is approximately 767 words,and reading the entire article takes about 1 minutes
SlowMist launched a series of blockchain security introductory notes, introducing ten terms related to blockchain security, so that novices can adapt to the security attack and defense world of blockchain crisis more quickly

Blockchain Security Introductory Notes (4)

Blockchain Security Introductory Notes (3) | SlowMist Science Popularization

Series review:

Blockchain Security Introductory Notes (1) | SlowMist Science Popularization

Blockchain Security Introductory Notes (2) | SlowMist Science Popularization

Blockchain Security Introductory Notes (3) | SlowMist Science Popularization

Multi-sig Multi-sig

Multi-sig (Multi-sig) refers to operations that require multiple signatures (these signatures are generated by different private keys). This can be used to provide additional security, as even the loss of a single private key will not allow an attacker to gain access to the account, multiple trusted parties must approve the update at the same time, otherwise it will not work.

first level title

Double Spend Attack Double Spend Attack

secondary title

1. Race Attack

secondary title

2. Finney Attack

secondary title

3. Vector76 attack

Vector76 Attack is also known as one-time confirmation attack, that is, the transaction can still be rolled back after being confirmed once. It is a combination of Finney Attack and Race Attack.

The attacker creates two nodes, node A connects to the merchant node, and node B connects to other nodes in the blockchain network. Then, the attacker uses the same token to initiate two transactions, one transaction is sent to the merchant address, we call it transaction 1; one transaction is sent to his own wallet address, we call it transaction 2. Like the Race Attack mentioned above, the attacker added a higher miners fee to transaction 2 to increase the miners packaging probability. At this time, the attacker did not broadcast these two transactions to the network.

Then, the attacker starts mining on the branch where transaction 1 is located, which we name as branch 1. After the attacker dug up the block, he did not broadcast it, but did two things at the same time: send transaction 1 on node A, and send transaction 2 on node B.

Since node A is only connected to the merchant node, when the merchant node wants to pass transaction 1 to other peer nodes, node B, which is connected to more nodes, has broadcast transaction 2 to most nodes in the network. Therefore, in terms of probability, transaction 2 is more likely to be considered valid by the network, and transaction 1 is considered invalid.

After transaction 2 is considered valid, the attacker immediately broadcasts the block he dug on branch 1 to the network. At this time, the merchant who accepts payment after one confirmation will confirm that the transaction is successful, and then the attacker can immediately cash out and transfer assets.

secondary title

4. 51% attack

The attacker occupies more than 50% of the computing power of the entire network. During the period when the attacker controls the computing power, he can create a new chain with a height greater than the original chain. Then the transaction in the old chain will be rolled back, and the attacker can use the same Token to send a new transaction to the new chain.

Blockchain Security Introductory Notes (4)

At present, most of the attack methods of public chain security incidents are 51% attacks. As of the date of publication, the losses caused by the attackers mastering a large amount of computing power to launch 51% attacks totaled 19,820,000 US dollars. On January 6, 2019, the slow fog area issued an early warning51% attack on the ETC networkfirst level title

Soft fork Soft-fork

first level title

Hard fork Hard-fork

Hard fork (Hard-fork) is a permanent divergence in the blockchain. After the release of the new consensus rules, the upgraded nodes cannot verify the blocks generated by the non-upgraded nodes, and the non-upgraded nodes cannot verify the blocks generated by the upgraded nodes. Blocks, that is, the old and new nodes are incompatible with each other. Usually, a hard fork will occur. The original normal chain is divided into two chains (the upgraded chain and the non-upgraded chain, and the two chains are mutually incompatible. compatible).

The more famous hard fork event in history is The DAO event. As a well-known project on Ethereum, funds were transferred by hackers due to a loophole in the smart contract. Hackers stole ETH worth about 60 million US dollars at the time, making this project suffered huge losses. In order to make up for this loss, in July 2016, the Ethereum team modified the Ethereum contract code to implement a hard fork, and forcibly transferred all funds of The DAO and its sub-DAOs to a specific refund contract at the 1920000th block address, and then take back the coins on the DAO contract controlled by the hacker. However, this modification was rejected by some miners, thus forming two chains, one is the original chain (Ethereum Classic, ETC), and the other is the new forked chain (ETH), each of which represents the consensus and values ​​of different communities.

Original article, author:慢雾科技。Reprint/Content Collaboration/For Reporting, Please Contact report@odaily.email;Illegal reprinting must be punished by law.

ODAILY reminds readers to establish correct monetary and investment concepts, rationally view blockchain, and effectively improve risk awareness; We can actively report and report any illegal or criminal clues discovered to relevant departments.

Recommended Reading
Editor’s Picks