What Is a 51% Attack (and How It Could Affect You)

By Charles Joseph | Editor

A 51% attack is a cryptocurrency attack where a group of miners takes control of more than 50% of the network’s mining hashrate, or computing power. This allows the attackers to monopolize the mining of new blocks and prevents new transactions from being confirmed. The attackers can then reverse any transactions that they don’t like, including spending coins that belong to other people or double-spending their own coins.

How Does a 51% Attack Work?

The attacker starts by creating a private blockchain that is identical to the public blockchain. The attacker then mines all of the blocks on their private chain and doesn’t release them to the public.

At this point, the attacker has a choice. They can either wait for someone to make a transaction on the public blockchain and then quickly mine a block on their private blockchain that includes this transaction. This will allow the attacker to reverse the transaction.

Or, the attacker can simply not release any new blocks on the public blockchain, which will prevent any new transactions from being processed.

Either way, the attacker can double spend coins or prevent new transactions from being confirmed.

51% Attack in Example (Silicon Valley Video)

Why Is a 51% Attack is Bad?

A 51% attack is bad for a few reasons.

Want More Financial Tips?

Get Our Best Stuff First (for FREE)
We respect your privacy and you can unsubscribe anytime.

First, it undermines the security of the blockchain. Second, it can be used to steal money from exchanges or users. And third, it can lead to the loss of confidence in the blockchain, which can cause the price of the cryptocurrency to drop.

How to Prevent a 51% Attack

The best way to prevent a 51% attack is to have a large number of miners spread out across the globe. This makes it more difficult for one miner or group of miners to control more than 50% of the total computing power.

Another way to prevent a 51% attack is to use a proof-of-work algorithm that is ASIC resistant. This means that the computing power required to mine new blocks is too high for one miner or group of miners to control.

The last way to prevent a 51% attack is to use a proof-of-stake algorithm. Under this algorithm, new blocks are created based on the number of coins that a miner has. This means that it is not possible for one miner or group of miners to control more than 50% of the total coins.

How to Detect a 51% Attack

The best way to detect a 51% attack is to monitor the blockchain for any unusual activity. This includes things like a sudden drop in the hashrate, a sudden increase in the number of orphaned blocks, or a sudden change in the difficulty.

If you see any of these things happening, it is likely that a 51% attack is taking place.

51% Attack Examples

There have been a few 51% attacks that have taken place on different blockchain networks.

One of the most famous attacks took place on the Ethereum Classic blockchain in January of 2019. An attacker was able to control more than 50% of the network’s hashrate and used this to double spend coins and reverse transactions.

Another famous 51% attack took place on the Bitcoin Gold blockchain in May of 2018. An attacker was able to control more than 50% of the network’s hashrate and used this to double spend coins and reverse transactions.

The last famous 51% attack took place on the Verge blockchain in April of 2018. An attacker was able to control more than 50% of the network’s hashrate and used this to double spend coins and reverse transactions.

How Likely Is a 51% Attack Against Bitcoin?

It is very unlikely that a 51% attack will ever take place against Bitcoin. This is because Bitcoin has a large number of miners spread out across the globe. This makes it very difficult for one miner or group of miners to control more than 50% of the total computing power.

How Can Networks Prevent a 51% Attack?

The best way to prevent a 51% attack is to have a large number of miners spread out across the globe. This makes it more difficult for one miner or group of miners to control more than 50% of the total computing power.

Another way to prevent a 51% attack is to use a proof-of-work algorithm that is ASIC resistant. This means that the computing power required to mine new blocks is too high for one miner or group of miners to control.

Could a Nation State Take Down Bitcoin? (Video)

Scroll to Top
114 Shares
Tweet
Share
Share
Pin