A new scientific paper describes 3 attack methods for an Ethereum POS Chain-Bitcoin messages
A new scientific paper describes 3 attack methods for an Ethereum POS Chain-Bitcoin messages

After the altair upgrade in the Ethereum network, the native cryptocurrency of the protocol reached a new all-time high. Altair is the next step for the Proof-of-Stake (POS) crossing of the Ethereum network. However, a recently submitted white paper explains that a group of computer scientists from Stanford University and the Ethereum Foundation assume that there are three attack vectors "On" [A] Proof-of-Stake Ethereum "Blockchain.
The 3 attacks against Ethereum thesis aims to describe a proof-of-stake problem based on evidence
The Ethereum network currently has a proof-of-work (Pow) consensus mechanism and over time the protocol plans to go completely into a proof-of-stake (POS) network. The latest upgrades such as Berlin, London and Altair were used to facilitate the transition to the POS target. Only recently, after the introduction of Alair, the price per ether scored up and reached a new all -time high (ATH) of $ 4,467 per unit.
At the same time, the network transfer fees have also increased significantly for the Average ether transaction on Saturday morning. In addition, on Saturday morning in the USA, vertical trends from Twitter point to the term "ETH 2.0" began in trend . Some of the people who have published a new white paper about the eth 2.0 upgrade, which wrote from computer scientists from Stanford University and the Ethereum Foundation was.
The btc supporter tuur demeester shared the newspaper on Saturday and two quotes from the newspaper, which theorize how an opponent can attack the chain. The paper entitled "Three Attacks on Proof-of-Stake Ethereum" was submitted on October 19th.
quotes of eth . href = "https://twitter.com/kylelogiks?ref_src=twsrc%5etfw" Rel = "noopener">@kylelogiks :
"With a probability of 99.6 %, an opponent with 0.09 % use can carry out a 1 record for a certain day"
"In the event of an opposing network delay, an opponent can carry out an opponent by only checking 19 validators" https://t.co/hgazdb0acv target = "_ blank" href = "https://t.co/mszoyugdev" rel = "noopener"> pic.twitter.com/mszoyugdev
- Tuur Demeester (@tudemeester) 30. October 2021
The white paper was written by Caspar Schwarz-Schilling, Barnabé Monnot, Aditya Asgaonkar, Ertem Nusret Tas and David Tse. The white paper essentially shows that two Ethereum network attacks have recently been presented and the authors of the paper refined the techniques.
In addition to the refinement of the first two, which theoretically create "short -haul resources" and an "opposing network delay", the computer scientists developed a
"By combining techniques from both refined attacks, we get a third attack that enables an opponent with a vanishingly small proportion of use and no control over the spread of network messages (instead of perceiving probabilistic news spread), even bringing far -reaching reorganizations of the consensus chain," says the author's note. The three attacks on eth POPALLE adds: honest, but rational or ideologically motivated validators could use this attack to increase their profits or block the minutes, which threatens the incentive and the security of POS Ethereum. The attack can also lead to a destabilization of the consensus through traffic jams in coordination processing. In the meantime, Ethereum network critics used the paper to show the possible weak points in connection with these attacks if the network passes into a complete POS system. The founder of the chia project and the creator of Bittorrent, Bram Cohen, also Saturday. Some problems with the ETH2 consensus "We get a third attack that enables an opponent with a vanishingly small proportion of the proportion to even bring about far-reaching reorganizations of the consensus" https://t.co/vz3kg3ai1w - Bram Cohen🌱 (@Bramcohen) 30. October 2021 A chia supporter replied and tells us again in a year. Chia has reached ETH . The Ethereum Attack Paper offers a possible method of attack against an Ethereum POS chain, but also offers solutions. The authors of the paper believe that the attacks offer malicious actors incentives. "Our attacks also allow a priori malicious actors who may be ideologically motivated to delay consensus decisions and even completely prevent them in some cases," conclude the authors of the paper. "The refined attack by Section 4.2 gives the opponent a tool to do that, even if the opponent cannot control the delays in the news expansion (which is instead likely to be assumed)." What do you think of the recently published paper for three attacks on an Ethereum POS system? Let us know your opinion on this topic in the comments below. Bedy verification : Shutterstock, Pixabay, Wiki Commons White paper states that attacks “Apriori-Bös-like actors also enable consensus decisions to be completely blocked”