Tag: attack

34 What is a Finney attack? 2012-10-03T09:03:21.703

26 What is a double spend? 2012-10-05T12:20:32.830

21 Have any SPV users lost money because they accepted forged bitcoins? 2015-05-31T20:05:04.640

21 51% attack - apparently very easy? refering to CZ's "rollback btc chain" - How to make sure such corruptible scenario can never happen so easily? 2019-05-10T21:51:34.903

17 What are the risks of using Strongcoin.com as an online wallet? 2011-12-15T02:52:50.360

16 What can be done about the no-transaction block relayer (currently 71.123.170.150)? 2012-03-31T16:21:56.437

16 What is a block withholding attack? 2012-10-03T09:08:25.223

15 Attacking Bitcoin with a supercomputer 2017-10-02T00:44:21.713

15 Why do we call it a 51% attack instead of a 50% attack? 2018-06-20T21:17:36.433

14 bitcoins from the future 2012-07-25T22:45:39.427

11 Flaw in Bitcoin protocol regarding incentives to share transactions 2011-11-16T01:00:02.400

11 How much would it cost for a government to undermine Bitcoins? 2012-10-07T11:14:41.410

11 DDoS on big mining pools: a quick way to 51%? 2013-04-16T19:55:28.837

11 What are the potential attacks against ECDSA that would be possible if we used raw public keys as addresses? 2020-04-05T10:47:09.357

10 Which blocks get to be checkpoints? 2012-03-08T14:51:49.913

10 Does the protocol ensures that private keys are unique? 2012-06-18T03:17:14.263

10 What is the Ripple equivalent of the "51% attack?" 2013-04-24T21:34:06.953

10 Wouldn't the "malleable transaction" attack be foiled by common sense? 2014-02-13T03:57:47.087

10 Why can't mining pools provide fake transactions within the generated blocks? 2018-06-11T04:00:16.347

9 How can I assure my consumers they are actually paying the correct person? (prevent MITM attacks) 2012-09-27T17:01:50.963

9 Why do pools get so often DDoS attacked? 2013-05-14T19:45:35.703

9 Attack the network by temporarily adding hash power? 2016-06-19T16:55:47.557

9 Miner modifies unconfirmed transactions and put it into the block 2018-03-13T15:21:04.750

9 Why does Bitcoin no longer have checkpoints? 2018-05-30T22:57:19.683

8 Would any of the current botnets be able to launch and sustain a 51% attack? 2011-11-12T11:11:00.760

8 What is the story behind the "Linode problem"? 2012-05-10T23:46:43.950

8 Could a mining pool attack Satoshi Dice? 2013-02-09T00:09:29.730

8 When to worry about 1-confirmation payments 2014-11-17T00:24:55.793

8 Which release fixed CVE-2010-5141 (attacker can spend any coin) 2015-05-14T19:21:03.437

8 What prevents similar time-warp attacks in Bitcoin as happened to Verge? 2018-05-22T22:08:29.313

7 Do no-fee transaction represent a greater risk if the product is delivered instantly? 2011-11-03T11:24:46.647

7 What nodes are best for lessening the risk of loss from a race attack 2012-06-15T03:39:00.530

7 What if some group of people start sending small transactions from wallet to wallet just to make the blockchain bigger? 2014-12-20T22:25:59.930

6 What is the maximum number of signature check operations a transaction script can request? 2011-10-31T15:40:29.850

6 What does a double spend look like? 2012-05-29T17:05:00.530

6 What stops miners/nodes lying about what time a block was mined? 2012-10-17T05:45:29.557

6 Could miners steal money? 2013-02-06T02:51:07.237

6 Is it possible to spam the bitcoin network with 'dust'? 2013-11-20T10:33:34.723

6 What is time warp attack and how does it work in general? 2018-06-02T17:25:00.590

5 How to perform a double spend attack in websites that accept transactions with 0 confirmations? 2011-11-03T13:39:14.293

5 Current block vs whole block chain attack 2011-12-19T17:25:01.923

5 How can I find well-connected nodes? 2012-06-20T18:25:21.227

5 Isn't bribe smearing possible because no payee signature is required? 2014-01-28T02:07:29.913

5 Understanding a Bitcoin Double Spending Transaction by Performing one on yourself 2016-12-26T16:29:02.323

5 Can corrupted unspent transaction outputs list leading to higher than expected fee be seen as an actual threat? 2018-06-14T22:42:41.497

4 I'm developing on the Test network. Are there any "rules" or communication methods I should adopt? 2012-12-17T17:58:23.660

4 Can someone saturate the network? 2013-04-07T19:36:37.743

4 Is there a real threat of so called ">50% attack"? 2013-12-16T08:43:50.277

4 What happens if I fork an older block chain and rejoin the network later? 2014-03-06T13:26:59.610

4 How many bitcoins would it require for a sustained DOS attack on bitcoin network? 2015-06-01T13:27:04.993

4 Probabilty of a Race Attack in time t with hashing power q 2015-11-30T09:39:25.233

4 How does a time warp attack work? 2016-09-10T01:29:36.897

4 How to make PoS system work? 2017-01-27T13:12:10.160

4 Why is attacker revenue in the selfish mining disproportional to its hash-power? 2017-04-28T19:26:55.757

4 Attack vectors for difficulty retargeting with BCH and BTC? 2017-11-13T21:06:45.693

4 How does the Bitcoin network deal with bad actors? 2017-12-05T03:11:47.177

4 POW based blockchains systems Majority Attack 2018-01-08T18:49:48.150

4 Serialized transaction bigger than the actual transaction object? CVE-2013-4627 2019-01-08T17:13:07.060

4 Malicious full nodes causing denial of service attacks 2019-04-07T18:36:45.037

4 Name of attack where you pay a high fee to block others 2020-07-14T18:46:44.717

3 Is an attack on a local bitcoind via an img or embedded flash viable? 2012-04-23T22:33:11.460

3 How do mining pool payout methods affect the cost of executing a block withholding attack? 2012-10-03T09:31:00.077

3 Developments to prevent 51% hack 2013-03-25T15:26:37.940

3 Could the target become unreachable? 2013-04-24T07:46:19.507

3 What happens if Bitcoin itself is obsoleted by another digital currency? 2013-08-30T21:17:25.420

3 Attack on bitcoin network with modified client? 2013-09-20T16:17:44.750

3 What attacks are possible with a malicious bootstrap.dat? 2013-12-04T16:47:35.653

3 How does namecoin and other merge-mined coins prevent pre-mine attacks? 2014-04-08T04:09:55.930

3 How safe is bitcoin with regard to a random address generation attack? 2014-12-17T03:38:39.520

3 Is the scriptPubKey of a previously unseen transaction in an incoming block checked? If so, where? 2015-10-24T17:40:09.293

3 How does a node compare two blockchains? 2016-05-29T09:02:40.993

3 70% of nodes accept Bloom filters, despite DoS attack vector? 2016-07-18T20:22:54.187

3 How exactly are Bitcoin's consensus rules enforced? 2017-11-01T15:48:19.817

3 51% attack clarification 2017-11-15T19:14:06.930

3 What prevents rewriting the history of a chain with a different difficulty? 2017-12-21T20:15:16.670

3 How does headers-first prevent fill-disk attack? 2018-06-07T11:19:12.157

3 Why was this transaction accepted? 2018-09-27T09:01:08.567

3 Bitcoin is attacked by China miners by screwing with the network, what will Bitcoin do? 2018-10-10T14:47:23.450

3 To what extent does asymmetric cryptography secure bitcoin transactions? 2019-07-20T08:25:47.237

2 How would one inject a blockchain fork to the Bitcoin network? 2012-02-27T13:20:17.040

2 What is the story behind MyBitcoin? 2012-04-28T19:51:54.400

2 Specifics on "Race Double Spending Attacks"? 2014-03-29T10:10:09.107

2 How can one simulate and analyze attacks on the Bitcoin network? 2015-02-16T06:28:30.683

2 Can a malicious majority miner rewrite history? 2015-10-14T10:42:27.890

2 What is protecting the mempool from being DDOSd? 2017-02-07T09:48:18.600

2 What can an attacker who controls majority or all of the full nodes do? 2017-10-25T14:10:44.400

2 What happens if 1-way functions no longer exist? 2017-10-25T14:37:00.397

2 Can a bad actor omit an unspent address from a pruned chain? 2017-12-02T22:44:45.310

2 Is this man-in-the-middle double-spending attack against Bitcoin viable? 2018-02-16T14:34:37.190

2 Hypothetical Scenario - Address collision with address with already confirmed outgoing transaction 2018-06-19T23:28:41.007

2 Is there a limit to how many blocks can be rolled back from a 51% attack? 2018-07-29T22:52:52.573

2 attack bitcoin through writing data directly into output's scriptPubKeys 2018-09-21T19:05:36.400

2 Can a malicious Internet Service provider launch a double spend attack? 2019-06-05T15:13:24.267

2 Is this a collision attack or a 2nd-preimage attack? 2019-06-22T20:20:49.233

2 Probability an honest node finds the next block vs. probability the attacker finds the next block 2019-08-02T17:03:57.890

2 Is history reversal a concern if the absence of attackers is assumed? 2020-07-11T14:01:21.073

2 Which opcodes where disabled by Satoshi Nakamoto for cve 2010 5137 2020-09-18T11:00:36.307

1 Government disrupting reception of bitcoins. Is it possible? 2013-05-27T17:05:16.900

1 Would it be feasible to attack the bitcoin network by buying and deleting large amounts of bitcoin? 2013-10-05T09:44:58.457