Chapter 627 The Computational Power of Mutants
Lin Hong has high hopes for Bitcoin. Bitcoin occupies a very important position in his future planning, so he hopes that Bitcoin can develop smoothly.
This is a monetary experiment, which is enough to have a profound impact on the whole world. Even if Bitcoin fails, Lin Hong will not stop exploring electronic money. He will learn lessons, continue to start another time, and continue like this.
51% attack, that is, if someone has mastered more than 51% of the computing power of the entire Bitcoin network, then he can manipulate the whole network to achieve some of his "illegal" purposes. For example, if you send your own false transaction information, you will send your fake confirmation information before the legal confirmation information arrives, which is equivalent to forging currency.
This principle is equivalent to someone's wallet accepting another person's payment, and then he waits for the confirmation of the legal source of the payment. Once more than five people send him a confirmation message saying that the money is legal, then he thinks it is a valid transaction.
But once someone has more than 51 percent of the computing power of the whole network, he can forge these confirmation information, so that others mistakenly think that they have received a legal Bitcoin, but in fact it is forged by this person himself.
In addition, if you master more than 51% of the computing power of the whole network, it is extremely easy to mine. You can gain obvious advantages in the mining operations of many miners and collect most of the Bitcoin generated by yourself.
According to the design of Bitcoin, a Bitcoin "gold nugget" will be generated about every ten minutes (one gold nugget in the first four years is 50 bitcoins, and then it will be halved every four years). This speed has been set by Lin Hong for a long time. No matter how much your computing power is, in ten minutes, Come and compete for this "gold nugget".
In order to achieve this effect, Lin Hong also designed a difficulty parameter, which will change at any time according to the overall computing power of the whole network, and the greater the computing power. The more difficult it is.
And if someone has more than 51 percent of the computing power, this fairness will be broken.
In the long run, the principle of absolute fairness of Bitcoin will be completely destroyed, and naturally, Bitcoin will be destroyed.
Lin Hong drove the car and returned to the courtyard at the fastest speed. Then turn on the computer immediately and check the network-wide computing speed graph of Bitcoin.
This is a two-dimensional graph with time as the horizontal coordinate and the whole network operation speed as the vertical coordinate. The unit of the computing speed of the whole network is HASH/S. That is, how many sets of hash values can be tried per second.
Now the best CPU operation speed, the operation speed of a CPU is about 0.1 megaH/S, that is, you can try to calculate about 100 sets of hash values repeatedly in one second.
At the beginning, the computing speed of the whole network was only contributed by Lin Hong alone. Now it can hardly be seen on the picture, just sticking to the bottom. After a period of time, with the addition of some Bitcoin enthusiasts and supporters around the world, the computing speed of the whole network has climbed to the level of 10 trillion. . But now, this value has risen rapidly, suddenly by at least three times. More than 37 megabytes... This means that there is a large amount of computing power to access the Bitcoin network, which also meets the early warning conditions set by Lin Hong.
This was originally a happy thing. After all, the greater the computing power, the better, but now the sudden surge in computing power makes Lin Hong a little unhappy.
It is understandable to increase sharply at the beginning. After all, the base is relatively small and it is easy to double, but these days, the speed of rate increase has been stable, basically a slowly rising curve. Now, this curve has become a steeply rising straight line, but there are no special factors that cause many people to pay attention to Bitcoin, which is a little suspicious.
If these sudden increases in computing power are contributed by the same person, then he now has more than half of the computing power. That is to say, the 51% attack is under way.
Who is the other party?
What is the purpose of?
What kind of access is used to have such great computing power? A lot of computers? Or a supercomputer?
Everything is still uncertain.
Maybe this attack was not intentional. Maybe this person is just a Bitcoin enthusiast. He didn't know that such an attack would exist. It happened that he had such a lot of computing power in his hand and used it for Bitcoin mining.
Everything still needs to be understood and excavated.
Lin Hong sat in front of the computer and began to investigate.
When he designed the Bitcoin client. Its architecture is similar to that of Bitcoin, and the specific IP of miners is confidential, which means that the risk of being tracked and located is eliminated.
However, there is a way to roughly count which region these computing power comes from. Because of the experience of Bitcoin design, some major P2P backbone nodes have been arranged around the world. These nodes are completely provided free of charge by Bitcoin supporters, responsible for the complete preservation of all data, and Handle a large amount of computing power data exchange.
All these data are recorded and checkable. By counting the computing power of these nodes, you can know the overall computing speed from a certain region.
Lin Hong immediately wrote a function to count the computing power of these main nodes, and then compare it with the previous data to see which nodes' computing power suddenly increased.
Lin Hong was relieved by the final result, because he found that these computing power mainly came from five nodes, and the computing power was very close.
That is to say, these computing power come from five different places, which means that the probability of the same person's contribution becomes very small.
Everything in Bitcoin is open source. These data can be seen not only by Lin Hong, but also by others. As long as the other party is connected to the network, and then these data saved in a specific format can be analyzed and counted.
Lin Hong's further analysis found that the time of the change of the computing power of these five nodes is different.
The computing power of a node from the United States first increased sharply. Soon, another node from the United States and one from the United Kingdom changed. Then, the original computing power of the United States continued to increase again, exceeding the sum of the latter two. At this time, Finland and Russia also A strong computing power has emerged respectively.
Since then, these five computing power have continued to adjust and grow, and finally gradually reached a comparable state.
Lin Hong looked at these log records and had a strange feeling in his heart, as if a spoiler suddenly appeared in the Bitcoin network, which then triggered a series of related reactions.
Lin Hong has a feeling that among these five powerful computing power, there must be at least two positive forces, that is, to protect the Bitcoin network from malicious attacks.
Someone defended against the attack earlier than him.
Seeing this, he was relieved and very happy. After all, what he designed was recognized by others and took great care of it. This feeling was quite good.
This shows that there are still people who recognize Bitcoin. He is not alone, but also has some unknown allies.
Lin Hong guessed that one of the following computational power should belong to ESSI. After all, she was the first to know the defect of Bitcoin and sent an email to remind herself that if he guessed correctly, he thought it should be the second computing power to deal with first, that is, the computing power from the United Kingdom.
Lin Hong counted the sum of the computing power of these five main nodes, and found that it only accounts for about half of the new computing power, that is to say, the computing power of about 10 trillion hash per second is contributed by others.
This discovery made Lin Hong a little puzzled. He continued to compare the records of other nodes and found that this part of the computing power came from more than 4,000 nodes.
Is it possible that more than 4,000 new miners have joined the ranks of mining?
This phenomenon makes Lin Hong a little strange.
He checked the discussion in the Bitcoin open source community, and some people also found the phenomenon of rapid rise in computing power. Everyone was discussing this matter, and many of them guessed that someone might be attacking the Bitcoin network.
Although some people said that they would support Bitcoin with practical actions, according to the publication time and number of views of these posts, Lin Hong is far less than 4,000.
There has been no big news recently, such as a community with a very large user base promoting Bitcoin. These more than 4,000 computing power are connected in a very short time when the computing power of the whole network changes abnormally, from all over the world.
The computing power of these 10 megabytes looks very much like a miner from nature, but Lin Hong always feels that something is wrong.
Lin Hong carefully analyzed these records, and he finally saw the doubt. The computing power of this part of the access is too weak, and the computing power speed of each access is very uniform, and almost every copy is equal. If you want to reach 10 megabytes according to the normal calculation of the current computer. Computing power does not need more than 4,000 CPUs at all, and the computing speed is not so uniform at all.
Lin Hong thought about it. There is only one possibility to achieve this way, which is to use broilers for mining.
In the field of hacking, broiler refers to puppet machines, which refer to machines that have been successfully invaded and can be remotely controlled. Hackers or hackers can manipulate these machines at will to complete some functions.
The most common is to use these machines for distributed denial-of-service attacks... If Lin Hong did not make a mistake in judgment, someone must have used a large number of broilers to mine. ( To be continued. If you like this work, you are welcome to vote for recommendation and monthly ticket. Your support is my greatest motivation.) RQ