Buddha department fries money
Weak be expected to fall is done not have
On June 11 late night, everybody is enmeshed in good dreamland, since bit money confronted a few moons the biggest steep fall. . .
The issue comes so that be without omen, like moldering suddenly like Baidu map. .
Everybody so staring at purse look on in despair, the old leek with psychological good quality, decision turn a blind eye to; Had not seen the new leek of great storms, be about to cry without the tear.
So, what job to produce after all?
This is the announcement that Coinrail of one wife and children bourse issues Korea, roughly the meaning is: Feel embarrassed, we got the hacker is atttacked, before removing trouble, all trading that will be frozen with asset, and cannot undertake announcement to investigating plan, lest obstruct constabulary investigation,work.
This bourse dare not keep specific loss inside announcement, very fast nevertheless by media exposure a De Chaotian, coinrail this at least loss the digital money of 40 million dollar, included Tron, Aston X, NPXS, Dent to meet with a vicious person manipulating sb or sth from behind the scenes. .
It is bourse.
Still remember this year March, how did money also produce a hacker to atttack incident, the hacker was to intend money of a few VIA first, at the same time purloin a large number of machines trade the Zhang date of the user, bought the bit money all of those users VIA currency of the hacker, pushing VIA to go up directly 100 times, original hacker should take the bit money that trades to leave, was barred fall by the risk early-warning that money installs nevertheless. .
Finally, the hacker fails to raise those bit money, but the user that how money was forced to buy currency of one caboodle VIA to those is helpless also, this incident caused fictitious currency market to steep fall greatly as much. .
Talking art
Do you think such hackers cannot gain?
Does futures contract understand? Buy empty sit back and wait to reap.
Yes, since wall street after allowing bit currency futures to trade, even if bit money steeps fall, organic also meeting made money. .
And, this year, think the money that allows you steeps fall, the method is really too much, one not careful can become again leek. .
Previously, everybody is right the advantage very familiar with sth of area piece catenary, whatever one speaks goes to a center changing, cannot distort, safe. .
Area of simple and easy edition piece catenary
A bit flaw does not have these saying fictitious moneys that seemed to use area piece chain same. (certain money uses area piece catenary to return two say. . )
Actually, these fictitious moneys are not impeccable, once be found weakness, await everybody, drop only drop.
Difference judges gentleman to once had explained technology of area piece catenary carefully (deferent door) , those who mentioned security of area piece catenary is the a bit most important: Every brushstroke trades to a lot of node that dig mine can be recorded, atttack these node that dig mine at the same time, distort trading is too difficult really.
World miner distributings
Yes, for the fictitious money that to bit money and aether lane this kind of body measures too difficult.
Because their collier spreads all over world each district, mine machine scatters in different network, every time is calculated the computational power that area piece wants to use up magnanimity, do at the same time calm they are almost impossible.
But, have a lot of other little money is planted, calculate force to do not have so giant, happen the 51% above that you controlled a certain fictitious money to dig mine to calculate force, so you want to distort a record simply easy to do ~
Resemble by last month, bit money gold (Bitcoin Gold, abbreviation BTG) incurred 51% charge calculating force.
ZenCash also got 51% attack calculating force
After the market digging mine that this hacker gets on in the net bought those who exceed above of this money half to calculate force, he began the operation stealthily. .
Cite a case, one have 100 colliers to staring at Xiaoming's trading in all, but Xiaoming bribe among them 51 people.
He prepares two in purse 5 money, he first 5 money are taken replace purse, let that 51 individual records issued his to give his 5.
Those 51 people had been not recorded, xiaoming takes these 5 money again with small red do trade, give small red 5 money are soft, small red pay treasure to turn Zhang gives Xiaoming 5, not Guo Xiaogong turns after Zhang, xiaoming is being taken small red 5 money that still are put into purse without there's still time runninged, remained 49 people to record Xiaoming as a child red over there took 5 soft.
Next Xiaoming launchs attack, let the person of his bribe, point to at the same time admit a moment ago 5 are he turn to oneself only, is not as a child red over there those who take. .
Because of a few obedient and most principle, remain those 49 people not to say to pass 51 people, be forced to identify Song, admit that 51 the individual's views, such Xiaoming was covered for nothing small red pay treasure 5 cash. .
This process is the process of hacker attack BTG, xiaoming is a hacker, small red it is bourse, the hacker used add of add of this method land to cover at least 375963 BTG from bourse, cover interest 35 million beautiful knife. .
Actually, of BTG calculate force already very big, its dimensions ever was discharged in fictitious money advanced 30, however it fails to had escaped as before 51% attack. .
Visible, want to enough interest is driven only, the camp calculating force that once thought is not a problem.
And, as machine of large ASIC mine come out, want to achieve 51% consider force more easy, after estimation, this kind of attack will be increasing, more and more frequent. .
Nevertheless hackers do it, also want to weigh in the hand the capital cost that issues oneself likely, the doorsill jumps over safety higher.
Abroad has a netizen estimation the attack cost that leaves all sorts of fictitious moneys, a little fictitious money considers force honest too little, attack almost 0 cost. . (those who have fun at is OK see Https://www.crypto51.app/ )
Emmm, the value of these money is average nevertheless not tall also, hackers also may not look, so the most dangerous is those value very tall, but cost of attack calculating force low fictitious money. .
Still be that adage, the technology of area piece catenary is a good technology, there can be very marvellous application on a lot of setting, but it is not perfect, will simple definition is area piece catenary the tool that send money is more funny.
Of one mind is wanting to buy money to make money, how may in the end become leek do not know. .
"Wild baked wheaten cake is endless, spring breeze is blown be born again "