After Cyber Attack, Cryptocurrency ZenCash Fights Back

- Advertisement -

Early this month, privacy-focused cryptocurrency platform ZenCash suffered what’s known as a 51 percent attack. Attackers absconded with hundreds of thousands of dollars’ worth of its (ZEN) coins from an exchange. But the company is not taking it lying down.

Instead, ZenCash has released a white paper it claims provides a strategy for the entire industry to prevent such attacks, which are considered to be a significant vulnerability of blockchain technology. The paper may signal a more proactive approach to combating 51 percent attacks, which some blockchain observers expect to proliferate in light of the ZenCash event and two other, recent attacks and the relatively low cost of waging such attacks.

For those unfamiliar with the arcane lingo of the crypto world, a 51 percent attack is when malicious miners take control of more than half the nodes, or half the computing power, on a blockchain network. These bad actors can’t change existing blocks of data on a blockchain, but they can disrupt the recording of new blocks. That can halt the authentication of transactions or reverse them, making it appear that these miners still possess coins they have spent, something known as double-spending.

ZenCash’s white paper advocates an adjustment to what is known as the longest chain rule, or Satoshi Consensus, named for bitcoin’s developer.

Husam Abboud, a researcher at Brazil’s FECAP University and co-founder of PDB Capital, an investment firm focused on cryptocurrency, also writes in a 2017 study that such events can generate denial-of-service attacks “against specific transactions or addresses including other miners or pools.”

Based on a complex set of calculations, Abboud noted in his paper that someone could “profitably attack a $2 billion cryptocurrency network like ethereum classic (ETC), with as little as $1.5 million.”

ZenCash Isn’t the Only Victim

Other coins that have been hit by 51 percent attacks include verge (XVG), bitcoin gold (BTG) and krypton (KR). Such attacks inspired an episode of the TV show “Silicon Valley and have raised calls to reform the industry.

- Advertisement -

ZenCash’s white paper spells out the common method for performing a double-spend attack. It also proposes an adjustment “that makes it exponentially more costly, and hence unlikely, to launch such attacks for any proof-of-work mineable cryptocurrency system.”

“Proof-of-work refers to the kind of blockchain system underlying many popular cryptocurrencies including bitcoin (BTC). In this system, miners on the blockchain compete against one another to solve complicated mathematical problems. That’s the “work.” Miners who successfully solve a problem add a new block of data to the chain and are rewarded with fresh cryptocurrency.

ZenCash’s white paper advocates an adjustment to what is known as the longest chain rule, or Satoshi Consensus (for Satoshi Nakamoto, the name used by bitcoin’s still-unknown developer). As The CPA Journal notes, this rule means that when a blockchain is refreshing, blocks that don’t receive sufficient confirmations to be considered valid drop from the chain. Only the longest chain is left.

- Advertisement -

Previous Articles:

Stay in the Loop

Get exclusive crypto insights, breaking news, and market analysis delivered straight to your inbox. No fluff, just facts.

    1 Email per day. Unsubscribe at any time.

    - Advertisement -

    Latest News

    Mystery Creator Nets $5M Launching Hundreds of Memecoins Daily

    One memecoin creator has launched hundreds of tokens daily since January.The creator has made...

    Tornado Cash Co-Founder Roman Storm Guilty on Money Transmitting Charge

    Roman Storm, co-founder of crypto mixing tool Tornado Cash, was found guilty of operating...

    Predictors Bet on Bitcoin Surge, Vitalik’s Linea Mention, ETH Push

    Prediction markets show most participants expect Bitcoin to reach $125,000 before dropping to $105,000. A...

    SocGholish Malware Leveraging TDS for Sophisticated Web Attacks

    Attackers use Traffic Distribution Systems to spread the SocGholish Malware through compromised websites. SocGholish operates...

    OpenAI Launches Smarter, Faster GPT-5 AI Model for All Users

    OpenAI has launched the new ChatGPT-5 model, available to all users, including free accounts. ChatGPT-5...

    Must Read

    18 Countries With No Privacy Laws According To UN (List)

    Privacy laws are legal frameworks designed to protect personal data from unauthorized access, misuse, or disclosure.Lack of privacy laws can lead to misuse of...