We sometimes hear that Bitcoin is indestructible and incensurable because of the computing power of its network, and that it would be unlikely that an attack would occur today. However, this is a caricatured view, stemming from a lack of understanding and a certain naivety, which contributes to the fragility of the system. Let’s take a look in this article at how a mining attack against Bitcoin could take place.
” Know thy enemy and know thyself; though you have a hundred wars to fight, a hundred times you will be victorious. ” – Sun Tzu
An increasingly restrictive regulatory environment
Bitcoin is a digital currency system that allows online payments to be ” sent directly from one party to another without going through a financial institution ” and whose supply is limited to a ” predetermined number of coins,” i.e., a censorship-resistant and inflation-resistant currency. In particular, the censorship-resistant aspect is crucial, as Bitcoin’s value proposition collapses immediately without it.
Nevertheless this conception is not held by everyone and institutional bodies all around the world have sought as early as 2013 to impose regulation for exchange platforms.
As time went on, these regulations became clearer and more restrictive, including the know-your-customer (KYC) requirements practiced on all platforms and the reporting of users’ capital gains to the tax authorities. With the demands of legislators becoming more and more pressing, it seems that we are now heading towards a full-blown regulatory war against Bitcoin with the goal of total control of Bitcoin, i.e. its final death as a concept.
This disturbing progression of regulation is unfortunately accompanied by a lack of understanding about what Bitcoin is and what it carries, to the point that some players in the ecosystem are trying to collaborate with the authorities, without success so far.
Bitcoin is a free currency system, suitable for activities in the underground economy or activities that could become illegal. This is why states, whose central principle is control, are natural enemies: they embody authority while it allows freedom, which creates a logical incompatibility. In fact, if Bitcoin were a centralized system, it would not exist for a long time, as the experiences of <a href=”https://journalducoin.com/bitcoin/actualites-bitcoin/gold-douglas-jackson-cryptomonnaie-or-1996/” target=”_self” rel=”noopener”>e-gold and Liberty Reserve.
In this article, we will therefore try to see what states can do to take control of Bitcoin. To do so, we will here imagine a fictional scenario where this regulatory war is extended and leads to a major mining attack.
The criminalization of Bitcoin
Let’s place ourselves in the near future, where Bitcoin continues to grow, so much so that the authorities are severely alerted to it. In this world, the use of blockchain analysis has increased and blacklists of “dirty” Bitcoins have merged into a single list maintained by an intergovernmental organization like the FATF. This blacklist identifies all addresses containing bitcoins that have passed through illicit activities to some degree.
A group of states containing the most powerful states in the world (United States, China, European Union) then decides to make illegal all transactions moving these “dirty” bitcoins, under various and sundry pretexts such as terrorist financing.
This materializes on the one hand by criminalizing the sending and receiving of blacklisted bitcoins, acts that expose users to fines or even prison sentences. This legally forces all merchants to have to impose a drastic verification on every payment, which negates any use in the surface economy.
On the other hand, the mining of these “dirty” transactions is prohibited and also exposes white market miners to fines and jail time. Since mining has a natural tendency to become centralized (for reasons such as latency in block transmission or variance in reward), it is not difficult to impose this regulation on a significant portion of the hash power.
However, in the first preparatory stage, legal miners do not actively censor: they are simply ordered not to include blacklisted transactions in their blocks. These transactions are therefore confirmed, although their confirmation time is necessarily increased.
In this scenario, the Bitcoin economy is thus separated into two parts: the surface economy, where “dirty” Bitcoins are rejected, and the s
outerraine (free market), where all bitcoins are accepted. The size of the difference between these two markets depends on the willingness of individuals to disobey and what the state is willing to do. Transaction bans can range from transactions involving only bitcoins directly related to the least tolerated activities (terrorism, drug trafficking) to an outright ban on Bitcoin in its entirety. A complete ban could, for example, occur because of a systematic practice of coin mixing that would “dirty” virtually all Bitcoins, and would likely be accompanied by a push for central bank digital currencies
(CBDCs), presented as safer and less volatile alternatives.
Also note that in this scenario, all cryptocurrencies are subject to the same regulations and attacks. The confidential use of Monero is forbidden: a transaction is only allowed if the regulator has the necessary information for identification, such as addresses, privatetransaction keys andprivate
view keys. This drastic restriction allows authorities to track the movement of funds as in Bitcoin.
The Great Attack
Despite the regulatory measures taken, people are not letting up. Some states have drifted slowly into authoritarianism, banning anonymous (non-KYC) use of Bitcoin altogether. Bitcoin is getting too big, and making its uncontrolled use illegal does not stop non-compliant transactions from being created (in the market) and confirmed (in mining) on the black market.
The direct consequence of this development is a drop in state revenues. Indeed, states are finding it increasingly difficult to levy taxes and can no longer profit from issuing their currencies, as distrust in the currency is already too high, as it is subject to high inflation.
Having failed to coerce individuals by force of law, states are forced to resort to the only option that seems best at the time: attacking the blockchain through mining.
They mobilize all the hash power at their disposal. In particular, they send directives to the large groups of miners previously subject to legal authority, and requisition them if necessary. With access to the cheapest sources of power, state-approved miners have a significant advantage over competing miners, increasing their influence on the chain.
<img width=”1920″ height=”1080″ src=”https://journalducoin-com.exactdn.com/wp-content/uploads/2020/11/Attaque-51-.jpg?strip=all&lossy=1&quality=66&ssl=1 1920w, https://journalducoin-com.exactdn.com/wp-content/uploads/2020/11/Attaque-51–324×182.jpg?strip=all&lossy=1&quality=66&ssl=1 324w, https://journalducoin-com.exactdn.com/wp-content/uploads/2020/11/Attaque-51–768×432.jpg?strip=all&lossy=1&quality=66&ssl=1 768w, https://journalducoin-com.exactdn.com/wp-content/uploads/2020/11/Attaque-51–1536×864.jpg?strip=all&lossy=1&quality=66&ssl=1 1536w, https://journalducoin-com.exactdn.com/wp-content/uploads/2020/11/Attaque-51-.jpg?strip=all&lossy=1&quality=66&w=384&ssl=1 384w, https://journalducoin-com.exactdn.com/wp-content/uploads/2020/11/Attaque-51-.jpg?strip=all&lossy=1&quality=66&w=1152&ssl=1 1152w” alt=”A 51% attack on Bitcoin, realistic? ” />
Once enough hash power is gathered (more than half of the network’s power), the group of states carries out its attack and orders all of its miners to actively censor all “dirty” transactions by invalidating the blocks that contain them
. By virtue of
principle of the longest chain, the chain with the most proof of work (i.e., the longest in the short term) is considered by the nodes to be the valid chain, and thus the censors’ chain dominates. Active chain censorship: even though the “dirty” blockchain is the longest, the censors ignore them and extend their “clean” chain.
The attack is similar to imposing a soft fork where nodes following the old rules (here, no censorship) are forced to follow the new rules (here, censoring “dirty” transactions). All block branches containing “dirty” transactions are invalidated by the re-coordination caused by the announcement of a longer “clean” chain. After a while, the honest miners, i.e. those who build their blocks from the longer chain, notice the attack, renounce their honesty and start following the censorship themselves, in order to continue to earn an income.
This is how you end up with a censored channel. News of the censorship is likely to drive the price down, but it may also drive it up, reassuring traditional players that Bitcoin is controllable. In any case, the goal of the states is to
ts is achieved, at least temporarily.
In the long run, it is not even necessary for the state-controlled hash power to remain greater than half the power of the network. Since miners are economically rational, it is in their interest to apply censorship as shown in a paper by Juraj Bednar on the subject (describing a variant of this attack). Censorship can therefore persist for a relatively long period of time.
The market counter-attack
The attack does a lot of damage to the free economy, which can no longer function properly. Promises are exchanged in the market. Channels identified as “dirty” in the Lightning network are still functioning but can no longer be settled on the channel.
In the face of active censorship, the idea of changing the proof-of-work algorithm is gaining popularity. Indeed, it is an effective short-term way to stop the attack, by rendering all miners’ ASICs useless. However, this change is controversial: it would drastically reduce Bitcoin’s security in the medium term by reducing the overall cost of an attack, benefiting the largest miners (mostly legalists) who have the capital to deploy new hash power, and increasing the insurance cost of miners. This may lead to a split between the hard forkers and the others, but the chain using the original proof-of-work algorithm remains in the majority.
The use of social agreement is also proposed, through a system of manual and automatic checkpoints to avoid chain re-matching. However, the community (rightly) feels that this would create too much instability in the face of a hostile power seeking to create multiple splits that could not be objectively separated. No “social” measures were therefore taken on the main channel.
During the censorship period, censored transactions accumulate in the memory area of the nodes. Since their transactions are not confirmed, censored users increase their fees: some move large amounts of money and can therefore afford to pay high fees. Thus, there is a substantial increase in the level of fees paid by censored transactions.
This additional fee encourages non-cooperated miners to deploy hashing power in order to confirm “dirty” transactions and collect fees. These miners operate in secrecy, but manage to communicate (privately or via flagging) in order to coordinate a “return to normal”. After a while, they manage to mobilize a majority power and then start mining “dirty” blocks: their chain is considered valid and censorship is defeated.
However, even assuming that users are willing to pay enough fees, the victory of this first battle does not mean that censorship should stop for good: it is a matter ofhe truce simply marks the beginning of open warfare between the state and Bitcoin.
The states cannot bring themselves to let Bitcoin continue and are necessarily fighting back. Since the miners under control do not receive the fees for censored transactions and operate at a loss, the states increase their respective tax levies and create more money to deploy more hash power by subsidizing these miners.
This war economically erodes both sides. On the one hand, states have to levy more and more on their citizens, in a less and less efficient way. On the other hand, Bitcoin users have to bear high levels of fees, which makes using the protocol very expensive and no longer necessarily justifies the risks taken.
After an indefinite period of time, one of the two sides gives in: the states because they can no longer extract enough wealth, or Bitcoin because the users can no longer extract a profit. In both cases, the winning side can profit from its victory: if the states win then any attempt at digital currency will be challenged in the years to come, if Bitcoin wins then the states will have to deal with Bitcoin for a long time, even if it means less income. Obviously we hope Bitcoin wins this war if it ever happens.
Thus, contrary to what some dream sellers may sometimes claim, a censorship attack could take place against Bitcoin if it managed to have sufficient influence on the income of states, especially through money creation. Nevertheless such an attack would not mark the end of the cryptocurrency, as Bitcoin’s design allows the market to get rid of it.
The Coin Journal is proud to be able to tell you the big and small stories of Bitcoin and cryptocurrencies. To support the newspaper in this type of initiative and guarantee its independence, do not hesitate to go through the affiliated links of the media, whether you want to take advantage of 300 euros offered in cryptocurrencies by an ultra-robust platform, or why not mine them yourself!