Data Structures and Algorithms


“The Majority is Enough” a Rebuttal of Two Proposed Vulnerabilities of Bitcoin Mining

Authors: Funkenstein the Dwarf

About a year after Ittay Eyal published two papers claiming vulnerabilities in the bitcoin mining protocol, we have seen that the network is still strong (it has grown in hashpower many times over) and is unaffected by the supposed problems. I show here the biggest reasons the two vulnerability analyses were flawed. The attacks appear to hinder other miners who are competitors. However, both of the attacks harm the attacker's bottom line more than any harm to the competitors can emerge as profits for the attacker.

Comments: 4 Pages. Couple of typos and a simplification

Download: PDF

Submission history

[v1] 2015-04-09 09:40:48
[v2] 2015-04-09 12:56:05

Unique-IP document downloads: 224 times is a pre-print repository rather than a journal. Articles hosted may not yet have been verified by peer-review and should be treated as preliminary. In particular, anything that appears to include financial or legal advice or proposed medical treatments should be treated with due caution. will not be responsible for any consequences of actions that result from any form of use of any documents on this website.

Add your own feedback and questions here:
You are equally welcome to be positive or negative about any paper but please be polite. If you are being critical you must mention at least one specific error, otherwise your comment will be deleted as unhelpful.

comments powered by Disqus