A 51% attack is when a single entity controls over half the network's computing power (hashrate) in a blockchain, allowing them to manipulate transactions, like preventing confirmations or double-spending coins
by rewriting parts of the blockchain, though not creating new coins or altering past blocks, posing a major threat to smaller Proof-of-Work (PoW) coins.
How it Works:
- Control the Majority: An attacker acquires more than 50% of a blockchain's mining power (hashrate).
- Create a Private Chain: They start mining a secret, longer version of the blockchain.
- Double Spend: They send coins to an exchange, wait for the transaction to confirm on the public chain, then use their majority power to create a longer, secret chain where those coins are sent back to themselves, effectively spending them twice.
- Broadcast: Once their secret chain is longer, they broadcast it, making it the new official history, invalidating the exchange's transactions.
What an Attacker Can Do:
- Prevent Confirmations: Stop new transactions from being added.
- Reverse Transactions: Cancel transactions already confirmed by others (double-spending).
- Monopolize Mining: Take all block rewards for themselves.
What They Cannot Do:
- Create Money: Cannot mint new coins or steal from others' wallets.
- Alter Past Blocks: Cannot change the fundamental history of blocks mined before the attack.
- Why It's a Threat (Especially for Smaller Coins):
- It's extremely expensive for large networks like Bitcoin, but feasible for smaller cryptocurrencies with less hashing power, making them vulnerable.
- It destroys trust and can crash the coin's value, which is often the attacker's goal.
Real-World Example:
The Ghash.io mining pool temporarily exceeded 50% of Bitcoin's hashrate in 2014, causing concern and price drops, leading them to voluntarily reduce power.