TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Hijacking Bitcoin: Routing Attacks on Cryptocurrencies

141 pointsby federicoponziover 7 years ago

7 comments

nikcubover 7 years ago
BIP150[0] adds peer authentication, BIP151 adds encrypted peer communication. Having them implemented and enforced is probably overdue - afaik so far i&#x27;ve only seen bcoin[2] implement it<p>[0] <a href="https:&#x2F;&#x2F;github.com&#x2F;bitcoin&#x2F;bips&#x2F;blob&#x2F;master&#x2F;bip-0150.mediawiki" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;bitcoin&#x2F;bips&#x2F;blob&#x2F;master&#x2F;bip-0150.mediawi...</a><p>[1] <a href="https:&#x2F;&#x2F;github.com&#x2F;bitcoin&#x2F;bips&#x2F;blob&#x2F;master&#x2F;bip-0151.mediawiki" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;bitcoin&#x2F;bips&#x2F;blob&#x2F;master&#x2F;bip-0151.mediawi...</a><p>[2] <a href="https:&#x2F;&#x2F;github.com&#x2F;bcoin-org&#x2F;bcoin" rel="nofollow">https:&#x2F;&#x2F;github.com&#x2F;bcoin-org&#x2F;bcoin</a>
评论 #15769484 未加载
wonderousover 7 years ago
&gt;&gt; “Moreover, most of the traffic exchanged between Bitcoin nodes traverse few ISPs. Indeed, our results indicate that 60% of all possible Bitcoin connections cross 3 ISPs. In other words, 3 ISPs can see 60% of all Bitcoin traffic.”<p>Direct link to the paper:<p><a href="https:&#x2F;&#x2F;btc-hijack.ethz.ch&#x2F;files&#x2F;btc_hijack.pdf" rel="nofollow">https:&#x2F;&#x2F;btc-hijack.ethz.ch&#x2F;files&#x2F;btc_hijack.pdf</a>
评论 #15769205 未加载
tlrobinsonover 7 years ago
If you’re concerned about this type of attack it’s pretty easy to defend against. All it takes to avoid partition is a single connection across a VPN, Tor, or even satellite (<a href="https:&#x2F;&#x2F;blockstream.com&#x2F;satellite&#x2F;" rel="nofollow">https:&#x2F;&#x2F;blockstream.com&#x2F;satellite&#x2F;</a>).
KasianFranksover 7 years ago
Crypto is misunderstood but can&#x27;t be ignored. Welcome to the disruption and destruction of the VC model for founders that move things forward.
albertgoeswoofover 7 years ago
&gt; &quot;An attacker can use routing attacks to partition the network into two (or more) disjoint components. By preventing nodes within a component to communicate with nodes outside of it, the attacker forces the creation of parallel blockchains. After the attack stops, all blocks mined within the smaller component will be discarded together with all included transactions and the miners revenue. &quot;<p>How does bitcoin protect against this from happening by accident? Could someone surround my node with malicious nodes and put me on a forked chain?
评论 #15770965 未加载
kanzureover 7 years ago
One of the authors gave a talk earlier this month at Stanford on lightning network and fees, <a href="http:&#x2F;&#x2F;diyhpl.us&#x2F;wiki&#x2F;transcripts&#x2F;scalingbitcoin&#x2F;stanford-2017&#x2F;how-to-charge-lightning&#x2F;" rel="nofollow">http:&#x2F;&#x2F;diyhpl.us&#x2F;wiki&#x2F;transcripts&#x2F;scalingbitcoin&#x2F;stanford-20...</a>
评论 #15768761 未加载
idibidiartover 7 years ago
Also like I said removal of net neutrality regulations means ISPs esp big ones can kill Bitcoin by blocking the default port used by the Bitcoin client and ISPs can more than just blocking a certain port. ISPs can identify and block all P2P traffic (anything that is not being sent or received to&#x2F;from an approved central service) and do it in the name of protecting MPAA member revenue or whatever blanket execuse like killing off encrypted p2p communication like Signal et al)
评论 #15769144 未加载
评论 #15768825 未加载
评论 #15772098 未加载
评论 #15768808 未加载