Why does this matter?<p>One of the most notorious threats to blockchain-powered networks is allowing a malicious actor to obtain control over more than half of the network's computing resources. This situation is commonly referred to as the elusive "fifty-one percent attack." It is difficult, but not impossible to pull off —<a href="http://motherboard.vice.com/blog/bitcoins-fatal-flaw-was-nearly-exposed" rel="nofollow">http://motherboard.vice.com/blog/bitcoins-fatal-flaw-was-nea...</a> — the aggregation of this kind of hashing power. And it looks like we've nearly made it there again, but there is a difference between a pool getting > 50% of resources, and an "attack."<p>A successful attack using this method would allow the attacker to exclude, or "orphan" any new blocks from the valid chain causing all newly-minted coins go to the attacker. He may also execute a "double-spend" and reverse any of his own transactions during the window of time that his sham blockchain is considered authoritative by the network.<p>A successful 51% attack on Feathercoin — <a href="http://www.coindesk.com/feathercoin-hit-by-massive-attack/" rel="nofollow">http://www.coindesk.com/feathercoin-hit-by-massive-attack/</a> — was stopped in its tracks by the network's natural uptick in difficulty in response to an increase in network hash rate. The Feathercoin attacker was likely executing a price pump in parallel to compromising the network, which caused coin-switching pools to mine feathercoin and increase the difficulty to a level that stopped the attack.