ETH hits a record high, but some people find that PoS chains have three ways to be attacked

Financial golden block chain November 3 hearing   from Ethernet Square after the network upgrade Altair (Altair Square Ethernet network is part of the proof of interest (PoS) transition plan), native encryption currency price of the agreement was rushed to a record high, On the evening of November 2, ETH rushed to a high of $4,500. However, a recent white paper submitted by computer scientists from Stanford University and the Ethereum Foundation mentioned: There are three ways of being attacked on the Ethereum PoS chain. This paper on the three attacks against Ethereum, passed Evidence, which describes the issue of proof of interest.


At this stage, the Ethereum network has a Proof of Work (PoW) consensus mechanism. It is expected that in the near future, the Ethereum protocol will plan to completely transition to a Proof of Stake (PoS) network. Recently, Berlin and London have carried out Altair upgrades, the purpose is to smoothly transition to the proof-of-stake network. At the same time, the average cost of destroying each Ethereum exchange has also risen sharply, once soaring to $50. Not only that, last Saturday morning, a hot search on Twitter (US vertical trends) showed that the term “ETH 2.0” began to become popular, and some of them discussed the ETH 2.0 upgrade shared an article on Twitter by Stanford University A new white paper written by computer scientists from the Ethereum Foundation.

Bitcoin supporter Tuur Demeester shared this article and two sentences quoted in the article on Saturday, which theoretically analyzed how opponents attacked the Ethereum PoS chain. The paper titled “Three Attacks on Ethereum Proof of Stake” was published on October 19th, Tuur Demeester wrote on Twitter

A quote from the ETH 2.0 attack paper, from @KyleLogiks:

“An opponent with a 0.09% stake has a 99.6% chance of executing 1 record on any day.”

“In the case of adversarial network delays, the attacker only needs to control 19 validators to perform 10 reorganizations”

-Tuur Demeester (@TuurDemeester) October 30, 2021

This white paper was written by Caspar Schwarz-Schilling, Joachim Neu, Barnabé Monnot, Aditya Asgaonkar, Ertem Nusret Tas and David Tse. The white paper mainly exposes the two recent Ethereum network attacks, and the authors stated in the white paper that they have improved the attack technology.

The improvement of the first two attack techniques will theoretically cause “short-range reorganization” and “adversarial network delay.” In addition, computer scientists also proposed a third attack method, they wrote:

“Combining the first two improved attack methods, we get the third attack method, which is to cause an opponent who has very few shares and cannot control network message propagation (assuming probabilistic message propagation) to trigger a remote consensus chain reorganization.” . 

Not only that, the white paper also adds to these three attack methods:

“Honest, sensible, or ideologically motivated verifiers can use this attack to increase their profits or delay the agreement, thereby threatening the consistency and security of the Ethereum PoS incentives. Not only that, the attack may also lead to voting Processing has become congested, leading to an unstable consensus.”

On the other hand, the white paper stated that the attack “can also cause a priori malicious actors to completely delay consensus decisions.” At the same time, those who do not support the Ethereum network used the paper to emphasize that when the network fully transitions to a proof-of-stake system, there may be vulnerabilities related to these attacks. It is worth mentioning that Bram Cohen , the founder of the Chia project and the creator of Bittorrent, also tweeted about this new research on Saturday:

Some questions about the ETH2 consensus “We have obtained a third attack method, which can even trigger a remote consensus chain reorganization by an opponent with a very small stake”

— Bram Cohen? (@bramcohen) October 30, 2021

A Chia supporter responded and replied to Bram Cohen:

“Let’s revisit your tweets in a year and see what Chia has achieved compared to ETH. You know, you are now rejecting community members like me.”

The Ethereum attack paper does provide a feasible method to attack the Ethereum proof-of-stake blockchain, but it also provides a solution. The author of the paper believes that these attacks will lure malicious actors.

The author of this paper describing the three attack methods of the Ethereum proof-of-stake blockchain concluded:

“Our attack method also enables a priori malicious actors (perhaps ideologically motivated) to delay or even in some cases completely delay consensus decisions. In Section 4.2, the improved attack method can be used by the attacker. Provide tools to do this even if the attacker cannot control the message propagation delay (instead, it is assumed to be probabilistic).”

What do you think of this paper published by researchers on the three attack methods of the Ethereum proof-of-stake system when the price of ETH hit an all-time high recently? May wish to tell us our views and opinions on this in the comments section below.

Posted by:CoinYuppie,Reprinted with attribution to:
Coinyuppie is an open information publishing platform, all information provided is not related to the views and positions of coinyuppie, and does not constitute any investment and financial advice. Users are expected to carefully screen and prevent risks.

Leave a Reply