Close Menu
  • Cryptocurrency
    • Bitcoin
    • Ethereum
    • Altcoins
    • Blockchain
    • Mining
  • Stocks
  • Forex
  • Personal Finance
  • World Economy
  • AI in Finance
  • Commodities
  • DeFi
  • Fintech
  • NFTs
  • Learn Finance
Trending
  • Strategies for Investing in Bitcoin
  • XRP Macro Pattern Points To $22 Target – Details
  • Ethereum OG Whale Returns To Market With $19.5M ETH Buy — Details
  • Inside SIREN’s 865% Monthly Surge and What’s Next
  • Gear Up! New Bitcoin Bull Market Is About To Begin — Time To Buy?
  • Meet Cohort 4 of the Next Billion Fellows!
  • ‘Extreme Fear’ Grips Crypto Markets as Bitcoin Drops to 3-Week Low
  • Bitcoin-S&P 500 Correlation Coefficient Signals Impending Market Crash
Facebook X (Twitter) Instagram YouTube
Finance Insider Today
  • Cryptocurrency
    • Bitcoin
    • Ethereum
    • Altcoins
    • Blockchain
    • Mining
  • Stocks
  • Forex
  • Personal Finance
  • World Economy
  • AI in Finance
  • Commodities
  • DeFi
  • Fintech
  • NFTs
  • Learn Finance
Finance Insider Today
Home » Ethereum
Ethereum

Long-Range Attacks: The Serious Problem With Adaptive Proof of Work

FIT Editorial TeamBy FIT Editorial TeamSeptember 1, 2025Updated:March 4, 2026No Comments7 Mins Read
Share
Facebook Twitter LinkedIn Pinterest Email


Our present proof of labor design, blockchain-based proof of work, is the second iteration of our try to create a mining algorithm that’s assured to stay CPU-friendly and proof against optimization by specialised {hardware} (ASICs) in the long run. Our first try, Dagger, tried to take the thought of memory-hard algorithms like Scrypt one step additional by creating an algorithm which is memory-hard to compute, however memory-easy to confirm, utilizing directed acyclic graphs (principally, bushes the place every node has a number of dad and mom). Our present technique takes a way more rigorous monitor: make the proof of labor contain executing random contracts from the blockchain. As a result of the Ethereum scripting language is Turing-complete, an ASIC that may execute Ethereum scripts is by definition an ASIC for normal computation, ie. a CPU – a way more elegant argument than “that is memory-hard so you may’t parallelize as a lot”. In fact, there are problems with “effectively, are you able to make particular optimizations and nonetheless get a big speedup”, however it may be argued that these are minor kinks to be labored out over time. The answer can also be elegant as a result of it’s concurrently an financial one: if somebody does create an ASIC, then others could have the motivation to search for kinds of computation that the ASIC can’t do and “pollute” the blockchain with such contracts. Sadly, nonetheless, there’s one a lot bigger impediment to such schemes typically, and one which is sadly to some extent elementary: long-range assaults.

A protracted-range assault principally works as follows. In a standard 51% assault, I put 100 bitcoins right into a recent new account, then ship these 100 bitcoins to a service provider in change for some instant-delivery digital good (say, litecoins). I await supply (eg. after 6 confirmations), however then I instantly begin engaged on a brand new blockchain ranging from one block earlier than the transaction sending the 100 bitcoins, and put in a transaction as a substitute sending these bitcoins again to myself. I then put extra mining energy into my fork than the remainder of the community mixed is placing into the principle chain, and finally my fork overtakes the principle chain and thereby turns into the principle chain, so on the finish I’ve each the bitcoins and the litecoins. In a long-range assault, as a substitute of beginning a fork 6 blocks again, I begin the fork 60000 blocks again, and even on the genesis block.

In Bitcoin, such a fork is ineffective, because you’re simply rising the period of time you would wish to catch up. In blockchain-based proof of labor, nonetheless, it’s a major problem. The reason being that if you happen to begin a fork straight from the genesis block, then whereas your mining shall be gradual at first, after a couple of hundred blocks it is possible for you to to fill the blockchain up with contracts which might be very straightforward so that you can mine, however tough for everybody else. One instance of such a contract is just:

i = 0
whereas sha3(i) != 0x8ff5b6afea3c68b6cd68bd429b9b64a708fa2273a93ea9f9e3c763257affee1f:
i = i + 1

You realize that the contract will take precisely a million rounds earlier than the hash matches up, so you may calculate precisely what number of steps and the way a lot gasoline it would take to run and what the state shall be on the finish instantly, however different folks could have no alternative however to truly run by way of the code. An essential property of such a scheme, a vital consequence of the halting problem, is that it’s truly not possible (as in, mathematically provably not possible, not Hollywood not possible) to assemble a mechanism for detecting such intelligent contracts within the normal case with out truly operating them. Therefore, the long-range-attacker might fill the blockchain with such contracts, “mine” them, and persuade the community that it’s doing a large quantity of labor when it’s truly simply taking the shortcut. Thus, after a couple of days, our attacker shall be “mining” billions of instances sooner than the principle chain, and thereby shortly overtake it.

Discover that the above assault assumes little about how the algorithm truly works; all it assumes is that the situation for producing a legitimate block relies on the blockchain itself, and there’s a big selection of variability in how a lot affect on the blockchain a single unit of computational energy can have. One answer includes artificially capping the variability; that is accomplished by requiring a tree-hashed computational stack hint alongside the contract algorithm, which is one thing that can not be shortcut-generated as a result of even when you realize that the computation will terminate after 1 million steps and produce a sure output you continue to must run these million steps your self to provide the entire intermediate hashes. Nevertheless, though this solves the long-range-attack drawback it additionally ensures that the first computation shouldn’t be normal computation, however moderately computing heaps and plenty of SHA3s – making the algorithm as soon as once more weak to specialised {hardware}.

Proof of Stake

A model of this assault additionally exists for naively applied proof of stake algorithms. In a naively applied proof of stake, suppose that there’s an attacker with 1% of all cash at or shortly after the genesis block. That attacker then begins their very own chain, and begins mining it. Though the attacker will discover themselves chosen for producing a block only one% of the time, they’ll simply produce 100 instances as many blocks, and easily create an extended blockchain in that manner. Initially, I assumed that this drawback was elementary, however in actuality it’s a difficulty that may be labored round. One answer, for instance, is to notice that each block should have a timestamp, and customers reject chains with timestamps which might be far forward of their very own. A protracted-range assault will thus have to suit into the identical size of time, however as a result of it includes a a lot smaller amount of forex models its rating shall be a lot decrease. One other various is to require a minimum of some proportion (say, 30%) of all cash to endorse both each block or each Nth block, thereby completely stopping all assaults with lower than that % of cash. Our personal PoS algorithm, Slasher, can simply be retrofitted with both of those options.

Thus, in the long run, it looks as if both pure proof of stake or hybrid PoW/PoS are the best way that blockchains are going to go. Within the case of a hybrid PoW/PoS, one can simply have a scheme the place PoS is used to resolve the difficulty described above with BBPoW. What we’ll go together with for Ethereum 1.0 could also be proof of stake, it may be a hybrid scheme, and it may be boring outdated SHA3, with the understanding that ASICs won’t be developed since producers would see no profit with the upcoming arrival of Ethereum 2.0. Nevertheless, there’s nonetheless one problem that arguably stays unresolved: the distribution mannequin. For my very own ideas on that, keep tuned for the subsequent a part of this collection.



Source link

⚠️ Investment Disclaimer
The content published on Finance Insider Today is for informational and educational purposes only. It does not constitute financial advice, investment advice, or any other form of professional advice. Always conduct your own research and consult a qualified financial advisor before making any investment decisions. Finance Insider Today is not responsible for any financial losses resulting from decisions made based on information published on this website. Past performance is not indicative of future results. Financial markets carry significant risk. Never invest more than you can afford to lose.
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
FIT Editorial Team

Related Posts

Ethereum OG Whale Returns To Market With $19.5M ETH Buy — Details

March 22, 2026

Meet Cohort 4 of the Next Billion Fellows!

March 22, 2026

ZK Grants Round Announcement | Ethereum Foundation Blog

March 22, 2026

Devcon 2024 updates – Secure your tickets, apply to speak, and get involved!

March 22, 2026
Add A Comment
Leave A Reply Cancel Reply

Top Posts

Bitcoin and Ethereum Markets Rattled by Iran Tensions, Hot Inflation Data, and Fed Warning

March 20, 2026

Semler Scientific Reports $41.8 Million Bitcoin-Related Paper Loss in Q1 2025

April 20, 2025

Momentum Builds Toward $98,000 Amid Neutral Mood

January 6, 2026

Satsuma Technology Sells 579 Bitcoin Ahead Of LSE Uplisting

December 12, 2025

Bitcoin Loses $90K Support as On-Chain Data Hints at $70K Next

November 22, 2025
CurrencyPrice
UAE Dirham 
UAE Dirham
3.6725
Australian Dollar 
Australian Dollar
1.4235up
Canadian Dollar 
Canadian Dollar
1.3726up
Swiss Franc 
Swiss Franc
0.7883up
Renminbi 
Renminbi
6.8958up
Euro 
Euro
0.8638up
British Pound 
British Pound
0.7495down
Japanese Yen 
Japanese Yen
159.2137down
Malaysian Ringgit 
Malaysian Ringgit
3.9373up
New Zealand Dollar 
New Zealand Dollar
1.7138up
US Dollar 
US Dollar
1
22 Mar · FX Source: CurrencyRate 
CurrencyRate.Today
Check: 22 Mar 2026 15:40 UTC
Latest change: 22 Mar 2026 15:33 UTC
API: CurrencyRate
Disclaimers. This plugin or website cannot guarantee the accuracy of the exchange rates displayed. You should confirm current rates before making any transactions that could be affected by changes in the exchange rates.
⚡You can install this WP plugin on your website from the WordPress official website: Exchange Rates🚀
Categories
  • Altcoins
  • Bitcoin
  • Blockchain
  • Cryptocurrency
  • Ethereum
  • Forex
  • Mining
  • Personal Finance
  • Stocks
  • World Economy
About us

Finance Insider Today is an independent financial news platform covering global markets, cryptocurrency, economy, fintech, and personal finance. Published daily.

Top Insights

Strategies for Investing in Bitcoin

March 22, 2026

XRP Macro Pattern Points To $22 Target – Details

March 22, 2026

Ethereum OG Whale Returns To Market With $19.5M ETH Buy — Details

March 22, 2026
Categories
  • Altcoins
  • Bitcoin
  • Blockchain
  • Cryptocurrency
  • Ethereum
  • Forex
  • Mining
  • Personal Finance
  • Stocks
  • World Economy
X (Twitter) Instagram YouTube
  • About us
  • Contact us
  • Advertise With Us
  • Disclaimer
  • Privacy Policy
  • Terms and Conditions
Copyright © 2026 Financeinsidertoday.com All Rights Reserved.

Type above and press Enter to search. Press Esc to cancel.