example.com
Verify you are human by completing the action below.
A common mistake that new cryptocurrency<\/a> investors make is to confuse the hacking of a blockchain<\/a> with that of a digital exchange. Whereas unfortunately centralized digital exchanges get hacked<\/a> more than they should, decentralized blockchain hacks are very rare, as they are hard to achieve and provide little incentive to carry out.<\/p>\n In this post, we look at what makes blockchains \u2014 as applied in the cryptocurrency sector \u2014 impervious to security breaches.<\/p>\n The blockchains behind most cryptocurrencies are peer-to-peer (P2P)<\/a>, open-source<\/a> and public, allowing everyone with the right equipment and knowledge to peek in under the hood. This is important to foster transparency and attract buyers.<\/p>\n A blockchain comprises different technological mechanisms working together towards a common goal. For instance, there are consensus mechanisms such as proof of work (PoW)<\/a> and proof of stake (PoS)<\/a> that protect the network by mitigating cyber-attacks from hackers.<\/p>\n A blockchain\u2019s decentralized nature means that its network is distributed across multiple computers known as nodes. This eliminates a single point of failure. In other words, there is no way to \u201ccut the head off the snake\u201d \u2014 because there isn\u2019t any head.<\/p>\n The architecture of a blockchain determines how the nodes cooperate in verifying a transaction before being committed to the protocol. In the case of Bitcoin<\/a> and other PoW systems like Bitcoin Cash<\/a>, a minimum of 51% of the nodes must agree to the transaction before commitment.<\/p>\n Each transaction is called a block, and the interconnection of several transactions becomes a blockchain. Notably, a block has cryptographic elements that make it unique. A network’s hashing algorithm determines the details. For example, the Bitcoin blockchain uses the double SHA-256 hash function, which takes transaction data and hashes\/compresses it into a 256-bit hash.<\/p>\n By making it hard to reverse the hashed value, a transaction becomes inflexible. Each block in a chain contains a specific set of data from the previous block. Therefore, even if a malicious actor reverse-engineers the hash, the resultant block would be out of sync with the rest of the blocks since it will have a different hash output, thus causing the system to reject it.<\/p>\n The longer a blockchain exists and the more new users it attracts, the less likely it is to suffer a 51% attack<\/a> due to its growing hash power.<\/p>\n This becomes prohibitively expensive at a certain point. Therefore, considering the size of established blockchains like Ethereum and Bitcoin<\/a>, such a scenario is nearly impossible.<\/p>\n Another reason why it’s even harder to hack a blockchain is that in case the block being re-hashed is at the middle of the chain, the attacker would have to re-hash previous blocks to align their historical stamp with the new block.<\/p>\n For Bitcoin, this is only possible with the next generation of quantum computing, which currently doesn\u2019t exist. And even when it does, who\u2019s to say there won\u2019t be a blockchain-based quantum defense mechanism to mitigate quantum attacks?<\/p>\n In PoS-based systems, stakes determine the strength of the network. To elaborate, this means those users who have delegated or actively locked their native blockchain assets to participate in transaction processing and finding new blocks. On such systems, an attack occurs when a hacker controls a majority of the stake.<\/p>\n This is possible when the hacker accumulates over 51% of all coins in circulation. For reputable networks like the evolving Ethereum 2.0<\/a> platform, this is all but impossible. Imagine trying to find the funds to buy up 51% of ETH\u2019s current $68 billion market cap!<\/p>\n You can\u2019t orchestrate a stealth 51% attack without creating too much scarcity, as your purchasing of coins will make the available ones skyrocket in value to incredibly high levels. Conversely, when the blockchain participants find out you own a majority of the coins, they will likely sell their holdings, thereby crashing the market with excess supply. So you\u2019ll end up buying high, and selling low!<\/p>\n Good question. It boils down to the strength of a network. Notable 51% attack victims include Ethereum Classic, Bitcoin Gold<\/a>, Electroneum<\/a>, and most recently Grin<\/a>. The Ethereum Classic<\/a> network uses the PoW consensus<\/a> algorithm. Although Bitcoin uses the same algorithm, ETC has a much lower number of nodes and miners securing the system. Thus, it has lesser processing power, making it easier for an attacker to take control.<\/p>\n ETC has a hash rate<\/a> of 1.6 tera hash per second, while Bitcoin’s stands at 117.9 exa hashes per second.<\/p>\n So far, nobody has single-handedly hacked a blockchain. Instead, it’s usually a group of malicious actors or the core dev team that collaborate to breach a blockchain’s security. However, as blockchain platforms get stronger through an increase of nodes or stakers, the possibility of hacking a decentralized network is increasingly moving towards zero.<\/p>\n In addition, newer blockchain systems use academically-proven techniques that would need highly-specialized quantum computers to hack.<\/p>\n To sum it all up \u2014 if you ever hear someone saying that a \u201cblockchain was hacked!\u201d you now have the tools to (politely) correct them and send them on their way.<\/p>\n<\/span>What Makes a Blockchain Withstand Hacks?<\/span><\/h2>\n
<\/span>Decentralized and Open-Source Protocols<\/span><\/h3>\n
<\/span>Hashing Algorithm<\/strong><\/span><\/h3>\n
<\/p>\n<\/span>51% Attacks Are Improbable<\/span><\/h3>\n
<\/span>What About Quantum Computing?<\/span><\/h3>\n
<\/span>PoS-Based Hacks<\/span><\/h3>\n
<\/span>Economics of a 51%<\/span><\/h3>\n
<\/span>How Do Blockchains (Rarely) Get Hacked Then? Answer: Hash Rate<\/span><\/h3>\n
<\/p>\n<\/span>The Future of Blockchain Hacks<\/span><\/h3>\n