ETC Labs believes regulation is the important thing to stopping future 51% assaults

HomeCrypto News

ETC Labs believes regulation is the important thing to stopping future 51% assaults

Responding to quite a few 51% assaults on the Ethereum Traditional blockchain, ETC Labs stated that it is time to deliver regulation to hashpower r


Responding to quite a few 51% assaults on the Ethereum Traditional blockchain, ETC Labs stated that it is time to deliver regulation to hashpower rental marketplaces, citing the truth that not less than two of the assaults had been perpetrated by renting hash energy by NiceHash — a declare that has been confirmed by each NiceHash and ETC Labs. 

ETC Labs CEO Terry Culver additionally shared with Cointelegraph that based on the data that was offered by CipherTrace, which was employed to research the assaults, the attackers used proceeds from the primary assault to hire hashpower for the second assault. The latter price crypto alternate OKEx $5.6 million in damages — the corporate needed to reimburse its customers.

The concept of utilizing a hashpower dealer to conduct an assault on a proof-of-work blockchain just isn’t new. As an example, at a current Unitize digital convention, there was a panel devoted to this subject and an earlier assault on Bitcoin Gold was mentioned.

With a purpose to study NiceHash’s response to the issue, we interviewed the corporate’s chief advertising officer Andrej Skraba. He instructed us that whereas NiceHash’s crypto alternate is a regulated entity and as such follows all correct Know Your Custome or KYC and Anit-Cash Laundering procedures or AML, its hash rental enterprise is unregulated and its customers should not required to reveal their identification. We requested if the corporate would think about instituting such procedures in response to the assaults, Skraba responded:

It will rely completely on the European Union, what they may determine on this regard.

He additionally identified {that a} good analogy for NiceHash can be an Web Service Supplier, or ISP, that merely delivers information packets:

NiceHash can ship packets of information to mining swimming pools and these packets of information might be described as hash energy. <…> So if we actually need to be constructed a very decentralized world, we can not impose limitations on this visitors.

He added that it is rather troublesome for a dealer like NiceHash to detect such assaults as they occur. Or not it’s much more difficult to forestall them from occurring within the first place. Skraba admitted that instituting correct KYC and AML would assist cut back the dangers. Nevertheless, in his opinion, it will not resolve the problem:

You’ll be able to at all times use faux KYC. So it will assist, however it will not cease. It might not cease in any respect.

At the moment, ETC’s hashrate stands at 1.four Th/s. In the meantime, NiceHash market has virtually 10 Th/s out there for rental, which is seven occasions the present quantity of hashpower defending the community.

ETC hashrate. Supply: BitcoinCarts.

Skraba stated that NiceHash has launched ETC Labs to their platform. Although they weren’t beforehand acquainted, ETC Labs now intends to make use of their companies for defensive mining:

We’ve launched them to our service as a result of earlier than they weren’t conscious of how NiceHash works. They usually have additionally publicly acknowledged that they may use defensive mining.

The concept behind defensive mining is to make use of a dealer like NiceHash to extend the community’s hashrate with a view to make potential assaults prohibitively costly.

Though regulation might cut back the probability of future assaults, that is extra of a long-term plan. Not solely does it take time for the suitable legislators and regulators to provide you with a correct framework, however within the case of hashpower brokers, it must be world to be efficient. For instance, NiceHash relies in Slovenia. If the native authorities or the EU enacted a regulatory framework affecting its enterprise, the corporate might simply relocate to an unregulated jurisdiction. The decentralized and digital nature of the enterprise makes bodily location irrelevant.

Different options which are being mentioned by the ETC group embrace a checkpointing system (that may manually forestall future assaults), switching to a distinct hashing algorithm, and at last, strategic strikes just like the establishment of a decentralized treasury.

Some consider that the final assault was carried out by ETH miners. As the 2 forks use the identical DaggerHashimoto hashing algorithm, and ETH enjoys a significantly greater hashrate, it will be reasonably straightforward for ETH miners to assault the much less lucky fork. Tomorrow’s ETC builders’ name might be devoted to discussing the checkpointing system proposed by IOHK.



cointelegraph.com