More On: eth
Who is worse for your wealth, politicians or billionaires?
Why Jim Cramer suggests purchasing bitcoin or ethereum, with one exception
Official death certificate revealed Queen Elizabeth IIβs cause of death
After losing, the women's basketball team from Mali gets into a fight
Meghan Markle didn't know how to act around the Crown Jewels
On Friday, Ethereum (ETH) rose by more than 9% to a new high. This was a few days after the network had successfully undergone the Altair upgrade.
ETH, the native token of the second-largest blockchain by market cap, soared to $4,415 and thus surpassed its previous all-time high. Needless to say, various analysts have expressed varying levels of optimism about this flagship token.
It saw recent upgrades such as Berlin, London, and Altair on its way to becoming a proof-of-stake (PoS) network. However, according to a recently submitted white paper, there are some points to consider regarding this upgrade. On a "proof-of-work Ethereum" blockchain, there are three attack vectors, according to the report.
Computer scientists from Stanford University and the Ethereum Foundation believe that specific types of attacks on Ethereum are possible. Tuur Demeester, a Bitcoin enthusiast, shared the aforementioned paper to emphasize the same. It shed light on two key aspects: "short-term reorganizations" and "adversarial network delay."
Quotes from ETH 2.0 attacks paper, via @KyleLogiks:
— Tuur Demeester (@TuurDemeester) October 30, 2021
“With 99.6% probability an adversary with .09% stake can execute a 1-record for any given day”
“Under adversarial network delay, an adversary can perform a 10-reorg by merely controlling 19 validators”https://t.co/HGazdB0acV pic.twitter.com/MsZoyUGdev
The first two types of attacks were covered in the paper "Three Attacks on Proof-of-Stake Ethereum," and now comes the third. "By combining techniques from both refined attacks, we obtain a third attack that allows an adversary with vanishingly small stake and no control over network message propagation (assuming instead probabilistic message propagation) to cause even long-range consensus chain reorganizations," according to the paper.
Furthermore,
“Honest-but-rational or ideologically motivated validators could use this attack to increase their profits or stall the protocol, threatening incentive alignment and security of PoS Ethereum. The attack can also lead to destabilization of consensus from congestion in vote processing.”
The attack could also result in "destabilization of consensus due to congestion in vote processing," according to the paper's authors. In addition, Bram Cohen, the creator of BitTorrent and the founder of the Chia project, shared a similar insight.
He tweeted,
“Some issues with ETH2 consensus, we obtain a third attack which allows an adversary with vanishingly small fraction of stake to cause even long-range consensus chain reorganizations”
Needless to say, he was quickly chastised by various pro-ETH supporters. For example, this ETH supporter stated,
Some issues with ETH2 consensus "we obtain a third attack which allows an adversary with vanishingly small fraction of stake to cause even long-range consensus chain reorganizations" https://t.co/Vz3KG3ai1W
— Bram Cohenπ± (@bramcohen) October 30, 2021