Chapter 627: The Computational Power of Mutation
readx;
Lin Hong has high hopes for Bitcoin, which occupies a very important position in his future planning, so he hopes that Bitcoin can develop smoothly. Pen? Interesting? Pavilion wWw. biquge。 info
This is a monetary experiment, one time is enough to have a very far-reaching impact on the whole world, even if Bitcoin fails, Lin Hong will not stop exploring electronic money, he will learn the lessons, continue to start another one, and continue to do so.
51% attack, that is, if someone has more than 51% of the computing power of the entire Bitcoin network, then he can manipulate the entire network to achieve some of his own "illegal" purposes. For example, sending your own fake transaction information is equivalent to counterfeiting currency by sending your own fake confirmation information before the legitimate confirmation information arrives.
This is equivalent to someone receiving a payment from someone else in their wallet, then they wait for the legitimate source of the money to be confirmed, and once more than five people send him confirmation that the money is legitimate, then he considers it a valid transaction.
But once someone has more than 51 percent of the network's computing power, then he can fake these confirmations to make others mistakenly believe that they have received legitimate bitcoins, when in fact the person himself has forged them.
In addition, if you have more than 51% of the computing power of the whole network, it is even easier to mine, and you can gain a significant advantage in the mining actions of many miners, and collect the vast majority of the bitcoins generated by yourself.
According to the design of Bitcoin, there will be a Bitcoin "gold nugget" every ten minutes, this speed is set by Lin Hong a long time ago, no matter how much computing power you have, in ten minutes, you can only compete with all the miners in the whole network to compete for this "gold nugget".
In order to achieve this effect, Lin Hong designed another difficulty parameter, which will change at any time according to the overall computing power of the whole network, and the greater the computing power. The more difficult it is.
And if someone has more than 51 percent of the computing power, this fairness is broken.
In the long run, the principle of absolute fairness of Bitcoin will be completely destroyed, and naturally, Bitcoin will also be destroyed.
Lin Hong drove the car and returned to the courtyard at the fastest speed. Then immediately turn on the computer and view the entire network computing speed curve of Bitcoin.
This is a two-dimensional curve graph with time as the abscissa and the operation speed of the whole network as the ordinate. The unit of network-wide computing speed is hash
s。 That is, how many sets of hash values can be tried per second.
The best CPU computing speed now, the computing speed of a CPU is about 0.1 megahash
s, that is, you can repeatedly try to calculate about 100 sets of hash values in one second.
At the beginning, the computing speed of the whole network was only contributed by Lin Hong alone, and now it is almost impossible to see on the map, just sticking to the bottom, and after a period of time, with the addition of some Bitcoin enthusiasts and supporters around the world, the computing speed of the whole network has climbed to the order of 10 trillion. But now, that number has increased so rapidly that all of a sudden it has more than tripled. More than 37 trillion hashes
s。
This means that there is a large amount of computing power connected to the Bitcoin network, and the early warning conditions set by Lin Hong have also been met.
This was originally a thing to be happy about, after all, the greater the computing power, the better, but now this situation of sudden surge in computing power made Lin Hong a little unhappy.
It was understandable to spike at first, after all, the base was relatively small, and it was easy to double, but these days, the rate of increase has stabilized, and it is basically a slow upward curve. And now, this curve has become a straight line with a steep climb, and there are no special factors that cause many people to pay attention to bitcoin, which is somewhat suspicious.
If all these sudden increases in computing power were contributed by the same person, then he now has more than half of the computing power. This means that 51% of attacks are ongoing.
Who the hell is the other party?
What is the purpose?
What kind of access method is used to have so much computing power? Many computers? Or maybe it's a supercomputer?
Now everything is uncertain.
Maybe the attack wasn't intentional, maybe the person was just a Bitcoin enthusiast who didn't know it existed, and it just so happened that he had so much computing power in his hands and used it for Bitcoin mining.
Everything remains to be understood and explored.
Lin Hong sat in front of the computer and began to investigate.
He designed the Bitcoin client at the time. Its architecture is similar to that of Bitcoin, and the specific IP of the miner is confidential, which means that the risk of being tracked and located is eliminated.
However, there is a way to roughly count where the computing power comes from, because drawing on the experience of Bitcoin design, some major P2P backbone nodes are deployed around the world, which are provided by Bitcoin supporters for free and free of charge, responsible for keeping all the data in its entirety and handling a large amount of computing power data exchange.
All of this data is documented, and by counting the computing power of these nodes, it is possible to know how fast the overall computing speed is from a certain area.
Lin Hong immediately wrote a function to count the computing power of these major nodes, and then compared it with the previous data to see which nodes suddenly increased their computing power.
Lin Hong was relieved to see the final result, because he found that the computing power mainly came from the five nodes, and the computing power was very close.
In other words, if the computing power comes from five different places, the probability of the same person contributing becomes very small.
Everything in Bitcoin is open source, and these data can be seen not only by Lin Hong, but also by others, as long as the other party is connected to the network, and then these data saved in a specific format can be analyzed and counted.
Lin Hong further analyzed and found that the time of the change of computing power of these five nodes was different.
The computing power of one node from the United States first increased sharply, and soon, two nodes of the United States and one of the United Kingdom changed respectively, and then, the computing power of the original United States continued to increase abruptly, exceeding the sum of the next two shares, and at this time, Finland and Russia also appeared a strong computing power.
Since then, these five computing forces have continued to adjust and grow, and finally gradually reached a comparable state.
Lin Hong looked at these log records and had a strange feeling in his heart, as if a spoiler suddenly appeared in the Bitcoin network, and then triggered a series of correlation reactions.
Lin Hong has a feeling that at least two of these five powerful computing forces must be positive forces, that is, they appear to protect the Bitcoin network from malicious actors.
Someone defended against the attack one step ahead of him.
Seeing this, he was relieved and happy at the same time, after all, it was a good feeling that the things he designed were recognized by others and that he had put a lot of effort into taking care of them.
This shows that there are still people who recognize Bitcoin, and he is not alone, and there are some unknown allies.
Lin Hong guessed that one of the latter few computational powers should belong to ESSI, after all, she was the first to know about this defect of Bitcoin and sent an email to remind herself, if he guessed correctly, he felt that the second computational power should be the first to deal with, that is, the computational power from the United Kingdom.
Lin Hong counted the total computing power of these five main nodes, and found that it only accounted for about half of the new computing power, that is, about 10 megahashes per second of computing power was contributed by others.
This discovery made Lin Hong a little puzzled, and he continued to compare the records of other nodes, and found that this part of the computing power actually came from more than 4,000 nodes.
Could it be that more than 4,000 new miners have joined the mining ranks?
This phenomenon made Lin Hong a little strange.
He checked the discussion on the Bitcoin open source community, and some people also noticed the rapid increase in computing power, and everyone was talking about it, and some of them guessed that someone might be attacking the Bitcoin network.
Although some people say that they will support Bitcoin with practical actions, Lin Hong is far from the number of 4,000 based on the time of publication and the number of views of these posts.
Recently, there hasn't been any big news, such as the promotion of Bitcoin by a very large community. These more than 4,000 computing power were accessed in a very short period of time when the computing power of the entire network changed abnormally, and they came from all over the world.
This 10 trillion computing power looks very much like a miner from nature, but Lin Hong always feels that something is wrong.
Lin Hong carefully analyzed these records, and he finally saw something suspicious, the computing power of this part of the access is too weak, and the computing power speed of each access is very uniform, almost every copy is equal, if according to the normal computing of the computer now, if you want to reach 10 trillion computing power, you don't need more than 4,000 CPUs at all, and the computing speed will not be so uniform at all.
Lin Hong thought about it, if he wanted to achieve this way, there was only one possibility, and that was to use broilers for mining.
In the field of hackers, broilers refer to puppet machines, which can be successfully hacked and can be remotely controlled, and hackers or hackers can manipulate these machines to complete some functions at will.
The most common is to use these machines for distributed denial-of-service attacks.
If Lin Hong had not made a mistake in his judgment, someone must have used a large number of broilers to mine.