(IJCH) 51% Attack? Great Firewall of China? Yeah sure. What about Segmentation?

in #qurator4 years ago (edited)

pexels-media-5698696-1.jpeg

Snippet: "All who think it just takes a 51% attack to cripple a blockchain are severely misinformed. Because of its notoriety, the Great Firewall of China is less of a threat than a segmentation attack and subsequent majority control."

image by pexel

IJCH - Inside JaiChai's Head (Meaning: My Warped, Personal Opinions and Musings)

image

image source

From the Author:

Salutations.

I am JaiChai.

And if I haven't had the pleasure of meeting you before, I'm delighted to make your acquaintance now.

4i88GgaV8qiFU89taP2MgKXzwntUGAvkoQiKU7VxyD37q97aiDcUYBkr495R2xZPSNtzf9UtrTqGZadBRpv5pBNq4FZJuS8UPNRGZ7PPPdZryU173tkhnug6pM.gif

image source

For my returning online friends, "It's always great to see you again!

51% Attack? Great Firewall of China? Yeah sure. What about Segmentation?

images (16).jpeg

image by frbatlanta

All who think it just takes a 51% attack to cripple a blockchain are severely misinformed.

Here's just a few ways to do it: Sybil attack, Packet sniffing, Denial of Service (DoS) attacks - Crypto Kitties and Etherium, Influencing a clock drift against a target (a factor in yesterday's $8 million USD worth of NXM wallet theft from Hugh Karp - NEXUS MUTUAL CEO), Camouflaged Illegal blockchain content, Segmentation, attacking everyone on the net, Intentionally dropping transactions, The Finney Attack, Rival or malicious client code, Instigating unauthorized coin destruction/token burn, Creating millions of addresses, Hash rate collusion, Making "valid", low difficulty blocks.

Today's Topic: Segmentation

1608023949247.jpg

image by pexel

A segmentation attack and subsequent majority control is a major threat because it's done covertly and uses the "divide and conquer" strategy.

A couple of rough analogies are: 1) the Gerrymandered electoral college in U. S. politics and 2) the process behind the scenes of a hostile corporate takeover.

In both cases, when someone finally notices something's fishy, the game is already over.

Here's a simplified explanation of the process:

  1. The Bad Guy (TBG) populates the network with IP addresses under his control.

  2. When one of them gets a packet, TBG can see if it was received near the authentic send time. If viewed repeatedly, TBG now knows this unique sender.

  3. When that sender initiates another transaction, TBG knows and can do whatever malicious things he desires before the sender gets the first confirmation. TBG could pose as the sender to receive or to attack the network.

Which brings me to Layer 2, Off-Chain solutions.

images (15).jpeg

Image by OpenPR

Layer 2, Off-Chain solutions (e.g., Lightning and Raiden Networks), make it easy to create little fiefdoms
with one powerfully centralized player.

1608024244880.jpg

image by pixabay

Let's say, King JaiChai IX of the Royal Sidechain of New Hawaii has but one obligation to the main chain - broadcasting the beginning and end of transactions going through his kingdom. The rest (majority) of the time, whatever goes on in JaiChai Land is virtually invisible.

1608024333412_copy_600x675.jpg

image by pixabay

"King JaiChai IX and his fellow King cohorts will seize any opportunity to fatten their Royal Treasuries with "donations" from supporters - foreign or domestic."

1608024319466.jpg

image by pixabay

Finally rambled to this story's main issue:

"Hope someone bothers to peek inside a few of these sidechains instead of simply monitoring Global Hash rates with the other billion watchers."

By JaiChai

"Really Appreciate You Stopping By. Truly hope to see you again!"

And if you liked my post, kindly Upvote, Comment and Follow.

Here's your TORUM invitation!

About the Author

image
Image by Author

Believing that school was too boring, he dropped out of High School early; only to earn an AA, BS and MBA in less than 4 years much later in life – while working full-time as a Navy/Marine Corps Medic.

In spite of a fear of heights and deep water, he performed high altitude, free-fall parachute jumps and hazardous diving ops in deep, open ocean water.

image
Image by Author

After 24 years of active duty, he retired in Asia.

Since then, he's been a full-time, single papa and actively pursuing his varied passions (Writing, Disruptive Technology, Computer Science and Cryptocurrency - plus more hobbies too boring or bizarre for most folk).

He lives on an island paradise with his girlfriend, teenage daughter and two dogs.

image

Image by Author

"My mind was a terrible thing to waste..." - JaiChai

JaiChai 12-16-2020. Simultaneous multi-site submissions posted. All rights reserved.

Coin Marketplace

STEEM 0.17
TRX 0.24
JST 0.034
BTC 96648.24
ETH 2769.90
SBD 0.64