Forum Home
    • Register
    • Login
    • Search
    • Recent
    • Tags
    • Popular

    Information on attacks

    Feathercoin Discussion
    54
    204
    118252
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • R
      Radacoin last edited by

      [quote name=“zerodrama” post=“12434” timestamp=“1370875079”]
      [quote author=Radacoin link=topic=853.msg12314#msg12314 date=1370859787]
      The problem of FTC and all the other scrypt based coins is that they use an identical hashing algorithm.

      How about we [i]slightly[/i] modify this algorithm, to make it impossible for attackers to simply switch an LTC, WDC, CNC,etc. pool to FTC?
      Plus create a fork of cgminer - or talk to ckolivas to include our new hashing algorithm in cgminer.
      [/quote]

      No. Because they would have the hashrate anyway and could just get the new miner.
      [/quote]

      Wait! Do you think an individual / group can put something like 500 MH/s at FTC?

      I thought it’s maybe a rogue pool operator (or a group of pool operators) that redirect hashes from LTC, WDC, DGC, etc. to attack FTC.

      I mean for a big LTC pool with 2000 MH/s, redirecting 500 MH/s for 1/2 days or so isn’t that much of a problem. Many people won’t notice they got paid out 15% less on a specific day. And the pool operator can always say it was temporary problems with the pool software, an update that took longer than expected … something like that.

      We are looking for

      • someone that has the hashing power
      • someone that suffers if LTC looses miners / supporters / value.

      imho one of the big LTC pool operators is behind this attack.

      1 Reply Last reply Reply Quote 0
      • zerodrama
        zerodrama Regular Member last edited by

        [quote name=“Radacoin” post=“12440” timestamp=“1370876123”]
        [quote author=zerodrama link=topic=853.msg12434#msg12434 date=1370875079]
        [quote author=Radacoin link=topic=853.msg12314#msg12314 date=1370859787]
        The problem of FTC and all the other scrypt based coins is that they use an identical hashing algorithm.

        How about we [i]slightly[/i] modify this algorithm, to make it impossible for attackers to simply switch an LTC, WDC, CNC,etc. pool to FTC?
        Plus create a fork of cgminer - or talk to ckolivas to include our new hashing algorithm in cgminer.
        [/quote]

        No. Because they would have the hashrate anyway and could just get the new miner.
        [/quote]

        Wait! Do you think an individual / group can put something like 500 MH/s at FTC?

        I thought it’s maybe a rogue pool operator (or a group of pool operators) that redirect hashes from LTC, WDC, DGC, etc. to attack FTC.

        I mean for a big LTC pool with 2000 MH/s, redirecting 500 MH/s for 1/2 days or so isn’t that much of a problem. Many people won’t notice they got paid out 15% less on a specific day. And the pool operator can always say it was temporary problems with the pool software, an update that took longer than expected … something like that.

        We are looking for

        • someone that has the hashing power
        • someone that suffers if LTC looses miners / supporters / value.

        imho one of the big LTC pool operators is behind this attack.
        [/quote]

        Or a rogue pool that isn’t even listed.

        1 Reply Last reply Reply Quote 0
        • A
          ASDASDASD last edited by

          Successful attack was successful. Difficulty just went down when it was supposed to rise.

          1 Reply Last reply Reply Quote 0
          • R
            RIPPEDDRAGON Regular Member last edited by

            [quote name=“ASDASDASD” post=“12469” timestamp=“1370877475”]
            Successful attack was successful. Difficulty just went down when it was supposed to rise.
            [/quote]

            unless the system is completely broken the system will adjust the diff back up in a few hours

            1 Reply Last reply Reply Quote 0
            • A
              attacker last edited by

              :)

              1 Reply Last reply Reply Quote 0
              • R
                Radacoin last edited by

                [quote name=“zerodrama” post=“12445” timestamp=“1370876497”]
                Or a rogue pool that isn’t even listed.
                [/quote]

                I don’t believe in conspiracy theories, secret societies - and “unlisted pools”. People always have the need to talk. Can’t keep such things secret.

                1 Reply Last reply Reply Quote 0
                • Bushstar
                  Bushstar last edited by

                  [quote name=“ASDASDASD” post=“12469” timestamp=“1370877475”]
                  Successful attack was successful. Difficulty just went down when it was supposed to rise.
                  [/quote]

                  This was really nifty how they did this.

                  It took less than than the target time to get to the next difficulty adjust so the difficulty should have gone up. Because the attacker overwrote the starting block with one from a day before it looked to the network like it took an extra day. This made the difficulty go down.

                  This is the first time that I have ever seen this sort of attack. We currently have an unexpected easy batch of coins to mine. Perhaps this is the attackers way of compensating miners for the orphaned blocks :)

                  Donate: 6hf9DF8H67ZEoW9KmPJez6BHh4XPNQSCZz

                  1 Reply Last reply Reply Quote 0
                  • T
                    Tuck Fheman last edited by

                    [quote name=“Bushstar” post=“12504” timestamp=“1370891673”]
                    This was really nifty how they did this.

                    It took less than than the target time to get to the next difficulty adjust so the difficulty should have gone up. Because the attacker overwrote the starting block with one from a day before it looked to the network like it took an extra day. This made the difficulty go down.

                    This is the first time that I have ever seen this sort of attack. We currently have an unexpected easy batch of coins to mine. Perhaps this is the attackers way of compensating miners for the orphaned blocks :)
                    [/quote]

                    I tried to say it yesterday (it was not received well) but you said it far better than I.

                    1 Reply Last reply Reply Quote 0
                    • M
                      meetrat1 last edited by

                      Haha well, the attacker(s) helped get us a lot of attention, now we must capitalize on that attention. Plus, they have not achieved their goal, Feathercoin is still alive and kicking.

                      1 Reply Last reply Reply Quote 0
                      • R
                        Radacoin last edited by

                        [quote name=“meetrat1” post=“12509” timestamp=“1370893241”]
                        Haha well, the attacker(s) helped get us a lot of attention, now we must capitalize on that attention. Plus, they have not achieved their goal, Feathercoin is still alive and kicking.
                        [/quote]

                        +1

                        We really should capitalize on that! Not many coins survived such attacks.

                        “51% attack” sounds pretty cool for some media noobs. Maybe they can write a story about that - and mention “Feathercoin” a few times.

                        1 Reply Last reply Reply Quote 0
                        • Bushstar
                          Bushstar last edited by

                          There is a Coindesk article on the attacks today. I spoke to Danny the interviewer earlier today.

                          http://www.coindesk.com/feathercoin-hit-by-massive-attack/

                          Donate: 6hf9DF8H67ZEoW9KmPJez6BHh4XPNQSCZz

                          1 Reply Last reply Reply Quote 0
                          • zerodrama
                            zerodrama Regular Member last edited by

                            [quote name=“ASDASDASD” post=“12469” timestamp=“1370877475”]
                            Successful attack was successful. Difficulty just went down when it was supposed to rise.
                            [/quote]

                            The difficulty was NOT SUPPOSED to rise. That prediction was based on 60 blocks. 47 was based on 504 blocks.

                            1 Reply Last reply Reply Quote 0
                            • M
                              Magic8Ball Regular Member last edited by

                              [quote name=“erk” post=“12574” timestamp=“1370899513”]
                              Can we get the IP address of the attacker that submitted the fake blocks please?

                              I don’t know how to extract it from the chain.

                              It would also be nice to know which hosts first accepted the bogus chain.
                              [/quote]

                              You can’t. Thats the whole point with Cryptocurrency.

                              1 Reply Last reply Reply Quote 0
                              • ghostlander
                                ghostlander Regular Member last edited by

                                [quote name=“erk” post=“12614” timestamp=“1370903970”]
                                [quote author=Magic8Ball link=topic=853.msg12598#msg12598 date=1370902150]
                                [quote author=erk link=topic=853.msg12574#msg12574 date=1370899513]
                                Can we get the IP address of the attacker that submitted the fake blocks please?

                                I don’t know how to extract it from the chain.

                                It would also be nice to know which hosts first accepted the bogus chain.
                                [/quote]

                                You can’t. Thats the whole point with Cryptocurrency.[/quote]

                                Nonsense, the BTC block chain explorer has IP and Whois information for every transaction, is just that the feature has been omitted from the FTC explorer.
                                [/quote]

                                It can be implemented, but I doubt it’s going to help us. Block orphaning isn’t illegal. I know the attackers took their hash rate from the Litecoin network. It can be narrowed down to particular pools and maybe even particular top miners. We cannot terrorise them, they cannot destroy us, so let’s live with it. More we succeed, more they suffer.

                                1 Reply Last reply Reply Quote 0
                                • T
                                  Tuck Fheman last edited by

                                  $10K a day vs $5K a day will make people do crazy things.

                                  1 Reply Last reply Reply Quote 0
                                  • ?
                                    A Former User last edited by

                                    [quote name=“Radacoin” post=“12533” timestamp=“1370894975”]
                                    [quote author=meetrat1 link=topic=853.msg12509#msg12509 date=1370893241]
                                    Haha well, the attacker(s) helped get us a lot of attention, now we must capitalize on that attention. Plus, they have not achieved their goal, Feathercoin is still alive and kicking.
                                    [/quote]

                                    +1

                                    We really should capitalize on that! Not many coins survived such attacks.

                                    “51% attack” sounds pretty cool for some media noobs. Maybe they can write a story about that - and mention “Feathercoin” a few times.
                                    [/quote]

                                    I had to laugh at someone in the trollbox last night saying that with the 51% attack, there’s only 49% of the coins left to mine.

                                    Oo

                                    As we come through this, it should prove to people that you may knock it, but it’s not going down that fast. So many people waving their arms and yelling that it’s all over… they’ll be hushed up when the air clears.

                                    1 Reply Last reply Reply Quote 0
                                    • T
                                      Tuck Fheman last edited by

                                      [b]51% Attacked[/b]

                                      [b]100% Still Kicking Ass[/b]

                                      [i][b][color=red]FEATHERCOIN![/color][/b][/i]

                                      lulz

                                      1 Reply Last reply Reply Quote 0
                                      • J
                                        justabitoftime last edited by

                                        [quote name=“Tuck Fheman” post=“12655” timestamp=“1370909671”]
                                        [b]51% Attacked[/b]

                                        [b]100% Still Kicking Ass[/b]

                                        [i][b][color=red]FEATHERCOIN![/color][/b][/i]

                                        lulz
                                        [/quote]

                                        T-Shirt: Never trust the 51%

                                        1 Reply Last reply Reply Quote 0
                                        • T
                                          Tuck Fheman last edited by

                                          [quote name=“justabitoftime” post=“12662” timestamp=“1370910604”]
                                          T-Shirt: Never trust the 51%
                                          [/quote]

                                          [img]http://www.reactiongifs.com/wp-content/uploads/2013/03/yee.gif[/img]

                                          1 Reply Last reply Reply Quote 0
                                          • T
                                            Tuck Fheman last edited by

                                            [quote name=“wesphily” post=“12688” timestamp=“1370914061”]
                                            I see. Well that service combined with the crypto currency concept makes it impossible to find them.

                                            Our focus will need to be on IPS for now.
                                            [/quote]

                                            “impossible” is a strong word …
                                            [url=http://www.zdnet.com/blog/security/hacker-builds-tracking-system-to-nab-tor-pedophiles/114]http://www.zdnet.com/blog/security/hacker-builds-tracking-system-to-nab-tor-pedophiles/114[/url]

                                            1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post