• jdeath@lemm.ee
    link
    fedilink
    arrow-up
    0
    ·
    10 months ago

    that’s… not how that works. all you can do with 51% is possibly double-spend whatever coins you already have. or undo some transactions.

    so you submit a transaction, then use your extra 1% of hash power to mine a new block that says you didn’t actually spend it. at the same time you need to trick somebody else into believing you actually did send the coins, and take their stuff you “paid for.” then after you have the stuff, you can submit the block that doesn’t have your transaction in it. Voila, free stuff and you didn’t spend your coins.

    it does not enable you to mess with other’s balances. other than possibly reversing some transactions. you would need the private keys to their wallets to take their money. and if you have those, you don’t need 51% of the hash power, you can just take the coins with 0% hash power.

    • Jknaraa@lemmy.ml
      link
      fedilink
      arrow-up
      0
      ·
      edit-2
      10 months ago

      It’s obviously not a comprehensive guide on how to cheat the system. I’m making the point that computers will never be secure under the current paradigm when there are massive and powerful actors with vastly greater resources than the average person. I strongly suspect that an org like the DoD (which had exclusive access to integrated circuit technology for three years before anyone else) could probably capture/spoof virtually the entire network if they wanted too.

      • I_Has_A_Hat@lemmy.world
        link
        fedilink
        arrow-up
        0
        ·
        10 months ago

        By spending billions of dollars in order for them to dupe a transaction worth a couple million at most. Once. Before the entire network realizes what happens and a fork is made. It’s just idiotic enough to work!