Hacker News new | past | comments | ask | show | jobs | submit login

It wouldn't necessarily be done for because you can't steal coins with a 51% attack. You can double spend and block transactions, which is not the end of the world.



The distinction between "steal coins" and "double spend" is academic at best, though. In practice, in a double spend you are either lucky to be getting "free coins" stolen from deflation/inflation or the double spend is caught, unwound, and someone is designated the "loser" that lost money in the transaction. Either way meets many practical user definitions of "stolen coins".


You don't have the power to cause inflation. There is a material difference between stealing coins and double spending. Stealing coins implies you can rewrite anyone's balance to be your own balance.

Double spending requires having counterparty, confirming a transaction with that counterparty, and then re-writing history to eliminate the transaction that the counterparty accepted. Coins that aren't in motion during the 51% attack can't be stolen, and coins that are in motion but aren't being sent from the attacker also can't be stolen.


If someone can double spend or block transactions, that's pretty much the end of the network if no-one can do anything to it.


But you can do something against it - wait. Basically a double-spend in 2 concurrent latest blocks is doable. N blocks down significantly harder. So the more valuable the transaction, the longer you want to wait to make sure it's not going to be a double-spend.


Additionally, we can also detect deep double-spends very easily!

When a double-spend occurs, usually it's from a deep chain reorg. This is what people usually refer to as a double-spend attack, not the kind of reorg where it only affects a few of the top blocks (which isn't uncommon). The latter occur relatively frequently due to the nature of Proof-of-Work being essentially a race.

Consensus mechanisms can detect when a sudden "deep" reorg occurs, e.g. a sudden reorg of 200 blocks that we didn't previously expect to be reordered. When this happens, it's relatively safe to say that this is a double-spend attack and we can disregard the attacker's chain. There's variations of this that additionally add things like "checkpointing" wherein reorgs beyond a certain block depth (the "checkpoint") are impossible at the consensus level.

There's a lot to critique about blockchain tech, but miner centralization is a relatively dated concern. Yes, it's a concern for many blockchains, but for the major Proof-of-Work chains (Bitcoin, Ethereum), it's not an issue anymore.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: