The Bitcoin network was inconvenienced but faces no mortal danger, experts say, following the latest attacks.
The Bitcoin network was inconvenienced but faces no mortal danger, experts say, following the latest attacks.
Unlike the so-called spam attacks or stress tests which were common over the summer, the recent "malleability attack" was relatively easy to carry out and cost its perpetrator(s) next to nothing.
The attack involves the and modification and rebroadcasting of legitimate pending Bitcoin transactions that have yet to be confirmed into the next block by the mining network. The mass attempt of respending the bitcoins, while obviously illegitimate to an observer, clogs the transaction queue. The network must decide which transactions are authentic and discard those that are bogus, thereby delaying the confirmation process.
Several Bitcoin businesses and wallet services warned users that confirmation times would be over an hour instead of the typical average of several minutes. Users were warned not to rely on "zero-confirmation" transactions during the period. At one point, as many as 80% of the pending transactions were bogus. While it is common for business owners to rely on zero-confirmation transactions during peaceful times, they were warned not to during the attacks.
space
The malleability attack can be carried out with a script consisting of only "100 or so lines of code", at no cost, according to one claiming to have perpetrated the attacks, speaking to Motherboard.
In contrast, the summer stress tests cost thousands of dollars in transaction fees due to the excessively large data sizes. These transactions were legitimate and confirmed by the network; their sole purpose was to clog the transaction queue with artificially high priority transactions, which miners will process first because of the higher transaction fees. These attacks/tests were ostensibly carried out to demonstrate the unsustainability of Bitcoin under its current block size limitations.
"Breaking Bitcoin"
Someone claiming to have carried out the malleability attacks, working under the alias 'Alister Maclin', seemingly verified his claims when the network clogged and cleared at the prescribed times he predicted.
He said that he "broke Bitcoin", which can mean different things to different people. Some, taking exception to the claim and Medium's post, have passionately pointed out that no fraudulent transactions were processed and that the network returns to normal once the attacks subside. While it is confusing and concerning to view multiple conflicting transactions, especially to novice users, all those that are legitimate are eventually confirmed.
The attacks can definitely cause inconvenience, and can be perpetrated by anyone capable and in the right mood. Maclin indicated several grievances with the way Bitcoin is managed, and said that he may strike again.
The events also demonstrate the network's susceptibility to bad actors and capacity constraints, challenging the notion of its suitability for mainstream use as a worldwide currency or as a backbone for securities trading and fiat currency transfers. In addition to the malleability issue, Bitcoin's architecture is susceptible to block size limitations, and theoretically, 51% attacks and double spending.
Developers have been working on a BIP62 (Bitcoin improvement proposal #62) that would address the malleability issue, although "complexities" have been reported in the implementation.
The Bitcoin network was inconvenienced but faces no mortal danger, experts say, following the latest attacks.
Unlike the so-called spam attacks or stress tests which were common over the summer, the recent "malleability attack" was relatively easy to carry out and cost its perpetrator(s) next to nothing.
The attack involves the and modification and rebroadcasting of legitimate pending Bitcoin transactions that have yet to be confirmed into the next block by the mining network. The mass attempt of respending the bitcoins, while obviously illegitimate to an observer, clogs the transaction queue. The network must decide which transactions are authentic and discard those that are bogus, thereby delaying the confirmation process.
Several Bitcoin businesses and wallet services warned users that confirmation times would be over an hour instead of the typical average of several minutes. Users were warned not to rely on "zero-confirmation" transactions during the period. At one point, as many as 80% of the pending transactions were bogus. While it is common for business owners to rely on zero-confirmation transactions during peaceful times, they were warned not to during the attacks.
space
The malleability attack can be carried out with a script consisting of only "100 or so lines of code", at no cost, according to one claiming to have perpetrated the attacks, speaking to Motherboard.
In contrast, the summer stress tests cost thousands of dollars in transaction fees due to the excessively large data sizes. These transactions were legitimate and confirmed by the network; their sole purpose was to clog the transaction queue with artificially high priority transactions, which miners will process first because of the higher transaction fees. These attacks/tests were ostensibly carried out to demonstrate the unsustainability of Bitcoin under its current block size limitations.
"Breaking Bitcoin"
Someone claiming to have carried out the malleability attacks, working under the alias 'Alister Maclin', seemingly verified his claims when the network clogged and cleared at the prescribed times he predicted.
He said that he "broke Bitcoin", which can mean different things to different people. Some, taking exception to the claim and Medium's post, have passionately pointed out that no fraudulent transactions were processed and that the network returns to normal once the attacks subside. While it is confusing and concerning to view multiple conflicting transactions, especially to novice users, all those that are legitimate are eventually confirmed.
The attacks can definitely cause inconvenience, and can be perpetrated by anyone capable and in the right mood. Maclin indicated several grievances with the way Bitcoin is managed, and said that he may strike again.
The events also demonstrate the network's susceptibility to bad actors and capacity constraints, challenging the notion of its suitability for mainstream use as a worldwide currency or as a backbone for securities trading and fiat currency transfers. In addition to the malleability issue, Bitcoin's architecture is susceptible to block size limitations, and theoretically, 51% attacks and double spending.
Developers have been working on a BIP62 (Bitcoin improvement proposal #62) that would address the malleability issue, although "complexities" have been reported in the implementation.
The Role of PAMM, MAM & Copy Trading in Business Growth Strategies | Webinar
The Role of PAMM, MAM & Copy Trading in Business Growth Strategies | Webinar
The copy trading market is projected to double in size, growing from $2.2 billion to $4 billion by the end of this decade. In light of this, brokers and financial institutions are increasingly adopting PAMM, MAM, and Copy Trading solutions to scale operations and drive profitability. In this insightful webinar, Sergey Ryzhavin, Product Owner at B2COPY, outlines the advanced features of the B2COPY platform, showcasing how it enhances Copy Trading, PAMM, and MAM performance. Sergey also explores strategies for using these tools to attract new clients, improve customer engagement, and create additional revenue streams.
π£ Stay updated with the latest in finance and trading!
Follow Finance Magnates for news, insights, and event updates across our social media platforms. Connect with us today:
π LinkedIn: https://www.linkedin.com/company/financemagnates/
π Facebook: https://www.facebook.com/financemagnates/
πΈ Instagram: https://www.instagram.com/financemagnates_official
π¦ X (Twitter): https://twitter.com/financemagnates/
π‘ RSS Feed: https://www.financemagnates.com/feed/
βΆοΈ Telegram: https://t.me/financemagnatesnews
Don't miss out on our latest videos, interviews, and event coverage.
π Subscribe to our YouTube channel for more!π
The copy trading market is projected to double in size, growing from $2.2 billion to $4 billion by the end of this decade. In light of this, brokers and financial institutions are increasingly adopting PAMM, MAM, and Copy Trading solutions to scale operations and drive profitability. In this insightful webinar, Sergey Ryzhavin, Product Owner at B2COPY, outlines the advanced features of the B2COPY platform, showcasing how it enhances Copy Trading, PAMM, and MAM performance. Sergey also explores strategies for using these tools to attract new clients, improve customer engagement, and create additional revenue streams.
π£ Stay updated with the latest in finance and trading!
Follow Finance Magnates for news, insights, and event updates across our social media platforms. Connect with us today:
π LinkedIn: https://www.linkedin.com/company/financemagnates/
π Facebook: https://www.facebook.com/financemagnates/
πΈ Instagram: https://www.instagram.com/financemagnates_official
π¦ X (Twitter): https://twitter.com/financemagnates/
π‘ RSS Feed: https://www.financemagnates.com/feed/
βΆοΈ Telegram: https://t.me/financemagnatesnews
Don't miss out on our latest videos, interviews, and event coverage.
π Subscribe to our YouTube channel for more!π
Join us at FMLS:24 to connect with global institutional brokers. Secure your spot today! #fmls24
Join us at FMLS:24 to connect with global institutional brokers. Secure your spot today! #fmls24
π Explore cutting-edge solutions and connect with fintech leaders at FMLS:24!
π Explore cutting-edge solutions and connect with fintech leaders at FMLS:24!
π€ Meet industry leaders at the premier event for brokers β FMLS:24. Secure your spot today!
π€ Meet industry leaders at the premier event for brokers β FMLS:24. Secure your spot today!