{"id":534,"date":"2018-11-23T09:18:09","date_gmt":"2018-11-23T09:18:09","guid":{"rendered":"http:\/\/org.saito.tech\/?p=534"},"modified":"2022-04-29T02:04:00","modified_gmt":"2022-04-29T02:04:00","slug":"the-ver-attack-the-biggest-vulnerability-in-bitcoin","status":"publish","type":"post","link":"https:\/\/saito.tech\/the-ver-attack-the-biggest-vulnerability-in-bitcoin\/","title":{"rendered":"The Ver Attack: The Biggest Vulnerability in Bitcoin?"},"content":{"rendered":"<p id=\"e33f\" class=\"graf graf--p graf-after--h3\">Anyone who knows\u00a0<a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/twitter.com\/SaitoOfficial\" target=\"_blank\" rel=\"nofollow noopener\" data-href=\"https:\/\/twitter.com\/SaitoOfficial\">Saito<\/a>\u00a0knows that we\u2019re obsessed with economic attacks. From inception to our\u00a0<a class=\"markup--anchor markup--p-anchor\" href=\"https:\/\/technode.com\/2018\/11\/21\/blockchain-security-economic-vs-technical-attacks\/\" target=\"_blank\" rel=\"nofollow noopener\" data-href=\"https:\/\/technode.com\/2018\/11\/21\/blockchain-security-economic-vs-technical-attacks\/\">TechCrunch panel<\/a>\u00a0last Tuesday, we\u2019ve stressed that vulnerabilities in blockchain are almost always economic at heart.<\/p>\n<p class=\"graf graf--p graf-after--h3\">Given this, the most fascinating part of the Bitcoin Hash War for us has been watching the fallout from what we\u2019re calling the Ver Attack. We are actually fond of Roger and don\u2019t mean this maliciously, but settled on \u201cVer Attack\u201d for the same reason people talk about the \u201cMorris Worm\u201d: the first person to exploit a vulnerability generally gets credit for discovering it.*<\/p>\n<p class=\"graf graf--p graf-after--h3\">Also, \u201cVer Attack\u201d is a lot easier to say than \u201chash-transfer supply-curve-mediated governance attack\u201d, which is what the attack technically involves: moving hashpower from one chain to another to force changes to consensus-level rules on the receiving chain.<\/p>\n<p class=\"graf graf--p graf-after--h3\">Regardless of whether people support ABC or SV we should agree that this constitutes an attack. If someone used a similar tactic to change the 21mm bitcoin coin limit almost everyone would be howling with outrage. So why the lack of concern? The reason seems to be that many think the Ver Attack is an intended part of network design\u200a\u2014\u200aif a miner has a majority of hashpower why shouldn\u2019t they decide the fate of the chain? Isn\u2019t this how bitcoin is supposed to work? Why shouldn\u2019t someone be able to rent hashpower?<\/p>\n<p class=\"graf graf--p graf-after--h3\">What this stance misses is that the Ver Attack is distinct from the 51% attack, because while a POW blockchain is *always* vulnerable to 51% attacks, Ver Attacks are only possible when there exists a sizeable pool of off-chain hashpower available for use. Because this should not be possible in a secure blockchain, what the Ver Attack highlights is an economic truth that very few people in the space understand: the security of bitcoin depends far more on the shape of the supply curve for hashpower than on the efficiency of the hashing machines themselves. The key vulnerabilities are bounded by economic\u200a\u2014\u200anot technical\u200a\u2014\u200afactors and are to some degree out of the control of network operators.<\/p>\n<p class=\"graf graf--p graf-after--h3\">Here, the discussion gets interesting, because these vulnerabilities are not\u00a0<em class=\"markup--em markup--p-em\">entirely\u00a0<\/em>out of the control of the miners, and problems are minimized when miners behave like Calvin Ayre and Craig Wright, and threaten to water the fields of Carthage with the blood whomever even thinks about forking the chain. By behaving in this way\u200a\u2014\u200aand forcing a brutal death-pact on any competing fork\u200a\u2014\u200aCalvin and Craig are ensuring that only one network ultimately survives to incentivizes the production of hashpower. This limits the production of off-chain hash by ensuring a limited flow of resources for new miner production.<\/p>\n<p class=\"graf graf--p graf-after--h3\">In other words, despite the torrent of abuse thrown their way, what nChain is doing is not only the right thing for the security of Bitcoin SV, but it is absolutely essential for the security of proof-of-work as a governance mechanism. The \u201clive and let live\u201d strategy advocated by Roger Ver and Bitmain might sound reasonable to those who want their own fork to play with, but permitting the existence of multiple forks is self-destructive, destroying the security not only of the child fork, but eventually that of the main chain as well. And, yes, this logic extends to the need to eradicate all POW blockchains relying on double-SHA256. Whether SV survives or ABC survives, one of them must absolutely die.<\/p>\n<p class=\"graf graf--p graf-after--h3\">This raises a troubling question: does Bitmain even understand bitcoin\u2019s security model? While one fork might be an accident, two is a nasty habit. It may be that the company\u2019s sales department believes multiple chains are good for business\u200a\u2014\u200amore buyers for mining equipment\u200a\u2014\u200abut the long-term result of profligate forking is the collapse of the security mechanism that underpins their entire business model.<\/p>\n<p class=\"graf graf--p graf-after--h3\">On a deeper level, the fact that only nChain seems to be aggressively defending the integrity of its chain raises unsettling questions about the rationality of the entire cryptocurrency space. Why is the entire ecosystem so fork-friendly? And why is it perceived as malicious for miners to protect their own chains by crushing forks? Is the problem that people are lured into economic irrationality by the prospect of \u201cfree money\u201d on forked chains? Is this a simple matter of miners not knowing their own interests? Or perhaps there is a collective action problem at play: even though all miners would benefit from crushing a competing fork, no-one will volunteer their hashpower to serve as executioner when there is more profitable mining to be done for the main chain. Is POW only secure when it is backed by a hegemon willing to sacrifice its all in defense of the chain? Or an industrial magnate like Ayre with the conviction to make large bets on network integrity?<\/p>\n<p class=\"graf graf--p graf-after--h3\">Ultimately, it is striking to us that nChain and its followers in the SV camp are the only ones that seem to understand that the survival of proof-of-work as a governance system implies the existence of a single chain with total hash-dominance. We wonder how long people can continue to believe otherwise before it sparks existential crisis for proof-of-work itself.<\/p>\n<p class=\"graf graf--p graf-after--h3\">\u2026<\/p>\n<p class=\"graf graf--p graf-after--h3\">* We have heard from friends on both sides that ABC and SV deployed hashpower from other chains into BCH as part of their fork strategies. So while this may or may not be a one-sided attack, we figure that the honour of the name goes to Roger\u2014if only for being the first to publicly own up to using the tactic.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Anyone who knows\u00a0Saito\u00a0knows that we\u2019re obsessed with economic attacks. From inception to our\u00a0TechCrunch panel\u00a0last Tuesday, we\u2019ve stressed that vulnerabilities in blockchain are almost always economic at heart. Given this, the most fascinating part of the Bitcoin Hash War for us has been watching the fallout from what we\u2019re calling the Ver Attack. We are actually fond of Roger and don\u2019t mean this maliciously, but settled on \u201cVer Attack\u201d for the same reason people talk about the \u201cMorris Worm\u201d: the first person to exploit a vulnerability generally gets credit for discovering it.* Also, \u201cVer Attack\u201d is a lot easier to say [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":4251,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"_import_markdown_pro_load_document_selector":0,"_import_markdown_pro_submit_text_textarea":"","footnotes":""},"categories":[37],"tags":[],"class_list":["post-534","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-theory"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Ver Attack: The Biggest Vulnerability in Bitcoin? - Saito<\/title>\n<meta name=\"description\" content=\"Anyone who knows Saito knows that we\u2019re obsessed with economic attacks.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/saito.tech\/the-ver-attack-the-biggest-vulnerability-in-bitcoin\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Ver Attack: The Biggest Vulnerability in Bitcoin? - Saito\" \/>\n<meta property=\"og:description\" content=\"Anyone who knows Saito knows that we\u2019re obsessed with economic attacks.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/saito.tech\/the-ver-attack-the-biggest-vulnerability-in-bitcoin\/\" \/>\n<meta property=\"og:site_name\" content=\"Saito\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-23T09:18:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-04-29T02:04:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/saito.tech\/wp-content\/uploads\/2018\/11\/ver-attack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"730\" \/>\n\t<meta property=\"og:image:height\" content=\"360\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"David Lancashire\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"David Lancashire\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/saito.tech\/the-ver-attack-the-biggest-vulnerability-in-bitcoin\/\",\"url\":\"https:\/\/saito.tech\/the-ver-attack-the-biggest-vulnerability-in-bitcoin\/\",\"name\":\"The Ver Attack: The Biggest Vulnerability in Bitcoin? - Saito\",\"isPartOf\":{\"@id\":\"https:\/\/saito.tech\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/saito.tech\/the-ver-attack-the-biggest-vulnerability-in-bitcoin\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/saito.tech\/the-ver-attack-the-biggest-vulnerability-in-bitcoin\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/saito.tech\/wp-content\/uploads\/2018\/11\/ver-attack.jpg\",\"datePublished\":\"2018-11-23T09:18:09+00:00\",\"dateModified\":\"2022-04-29T02:04:00+00:00\",\"author\":{\"@id\":\"https:\/\/saito.tech\/#\/schema\/person\/f40682a72a579ee103ae59cd94f5b528\"},\"description\":\"Anyone who knows Saito knows that we\u2019re obsessed with economic attacks.\",\"breadcrumb\":{\"@id\":\"https:\/\/saito.tech\/the-ver-attack-the-biggest-vulnerability-in-bitcoin\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/saito.tech\/the-ver-attack-the-biggest-vulnerability-in-bitcoin\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/saito.tech\/the-ver-attack-the-biggest-vulnerability-in-bitcoin\/#primaryimage\",\"url\":\"https:\/\/saito.tech\/wp-content\/uploads\/2018\/11\/ver-attack.jpg\",\"contentUrl\":\"https:\/\/saito.tech\/wp-content\/uploads\/2018\/11\/ver-attack.jpg\",\"width\":730,\"height\":360},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/saito.tech\/the-ver-attack-the-biggest-vulnerability-in-bitcoin\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/saito.tech\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Ver Attack: The Biggest Vulnerability in Bitcoin?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/saito.tech\/#website\",\"url\":\"https:\/\/saito.tech\/\",\"name\":\"Saito\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/saito.tech\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/saito.tech\/#\/schema\/person\/f40682a72a579ee103ae59cd94f5b528\",\"name\":\"David Lancashire\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/saito.tech\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0a1d210c5b2a17e058f478037f5223e784441f537ceb2548b7512967af62717a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0a1d210c5b2a17e058f478037f5223e784441f537ceb2548b7512967af62717a?s=96&d=mm&r=g\",\"caption\":\"David Lancashire\"},\"url\":\"https:\/\/saito.tech\/author\/david\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Ver Attack: The Biggest Vulnerability in Bitcoin? - Saito","description":"Anyone who knows Saito knows that we\u2019re obsessed with economic attacks.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/saito.tech\/the-ver-attack-the-biggest-vulnerability-in-bitcoin\/","og_locale":"en_US","og_type":"article","og_title":"The Ver Attack: The Biggest Vulnerability in Bitcoin? - Saito","og_description":"Anyone who knows Saito knows that we\u2019re obsessed with economic attacks.","og_url":"https:\/\/saito.tech\/the-ver-attack-the-biggest-vulnerability-in-bitcoin\/","og_site_name":"Saito","article_published_time":"2018-11-23T09:18:09+00:00","article_modified_time":"2022-04-29T02:04:00+00:00","og_image":[{"width":730,"height":360,"url":"https:\/\/saito.tech\/wp-content\/uploads\/2018\/11\/ver-attack.jpg","type":"image\/jpeg"}],"author":"David Lancashire","twitter_card":"summary_large_image","twitter_misc":{"Written by":"David Lancashire","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/saito.tech\/the-ver-attack-the-biggest-vulnerability-in-bitcoin\/","url":"https:\/\/saito.tech\/the-ver-attack-the-biggest-vulnerability-in-bitcoin\/","name":"The Ver Attack: The Biggest Vulnerability in Bitcoin? - Saito","isPartOf":{"@id":"https:\/\/saito.tech\/#website"},"primaryImageOfPage":{"@id":"https:\/\/saito.tech\/the-ver-attack-the-biggest-vulnerability-in-bitcoin\/#primaryimage"},"image":{"@id":"https:\/\/saito.tech\/the-ver-attack-the-biggest-vulnerability-in-bitcoin\/#primaryimage"},"thumbnailUrl":"https:\/\/saito.tech\/wp-content\/uploads\/2018\/11\/ver-attack.jpg","datePublished":"2018-11-23T09:18:09+00:00","dateModified":"2022-04-29T02:04:00+00:00","author":{"@id":"https:\/\/saito.tech\/#\/schema\/person\/f40682a72a579ee103ae59cd94f5b528"},"description":"Anyone who knows Saito knows that we\u2019re obsessed with economic attacks.","breadcrumb":{"@id":"https:\/\/saito.tech\/the-ver-attack-the-biggest-vulnerability-in-bitcoin\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/saito.tech\/the-ver-attack-the-biggest-vulnerability-in-bitcoin\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/saito.tech\/the-ver-attack-the-biggest-vulnerability-in-bitcoin\/#primaryimage","url":"https:\/\/saito.tech\/wp-content\/uploads\/2018\/11\/ver-attack.jpg","contentUrl":"https:\/\/saito.tech\/wp-content\/uploads\/2018\/11\/ver-attack.jpg","width":730,"height":360},{"@type":"BreadcrumbList","@id":"https:\/\/saito.tech\/the-ver-attack-the-biggest-vulnerability-in-bitcoin\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/saito.tech\/"},{"@type":"ListItem","position":2,"name":"The Ver Attack: The Biggest Vulnerability in Bitcoin?"}]},{"@type":"WebSite","@id":"https:\/\/saito.tech\/#website","url":"https:\/\/saito.tech\/","name":"Saito","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/saito.tech\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/saito.tech\/#\/schema\/person\/f40682a72a579ee103ae59cd94f5b528","name":"David Lancashire","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/saito.tech\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0a1d210c5b2a17e058f478037f5223e784441f537ceb2548b7512967af62717a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0a1d210c5b2a17e058f478037f5223e784441f537ceb2548b7512967af62717a?s=96&d=mm&r=g","caption":"David Lancashire"},"url":"https:\/\/saito.tech\/author\/david\/"}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/saito.tech\/wp-json\/wp\/v2\/posts\/534","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/saito.tech\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/saito.tech\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/saito.tech\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/saito.tech\/wp-json\/wp\/v2\/comments?post=534"}],"version-history":[{"count":1,"href":"https:\/\/saito.tech\/wp-json\/wp\/v2\/posts\/534\/revisions"}],"predecessor-version":[{"id":3838,"href":"https:\/\/saito.tech\/wp-json\/wp\/v2\/posts\/534\/revisions\/3838"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/saito.tech\/wp-json\/wp\/v2\/media\/4251"}],"wp:attachment":[{"href":"https:\/\/saito.tech\/wp-json\/wp\/v2\/media?parent=534"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/saito.tech\/wp-json\/wp\/v2\/categories?post=534"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/saito.tech\/wp-json\/wp\/v2\/tags?post=534"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}