NEW
51% attack Flash News List | Blockchain.News
Flash News List

List of Flash News about 51% attack

Time Details
2025-05-27
22:02
How Secure Is Bitcoin? SHA-256 Hash Function Explained for Crypto Traders

According to André Dragosch, PhD (@Andre_Dragosch), Bitcoin leverages the SHA-256 cryptographic hash function, which is fundamental to its network security and resistance against double spending or fraudulent transactions. SHA-256 ensures that Bitcoin transactions are extremely difficult to alter or reverse without immense computational power, making attacks such as double-spending and 51% attacks highly unlikely at current network scales (source: @Andre_Dragosch on Twitter, May 27, 2025). For crypto traders, this strong security underpins trust in the network and enhances Bitcoin’s appeal as a safe-haven digital asset. Understanding the technical robustness of SHA-256 can help traders assess risk and make informed decisions, especially when comparing Bitcoin to altcoins with different security protocols.

Source
2024-10-23
04:54
Vitalik Buterin Advocates for Automated Slashing in 51% Attack Scenarios

According to Vitalik Buterin, the slashing process in blockchain networks should be fully automated, even in cases of a 51% attack. He emphasizes that without automation, attackers could exploit the social layer to avoid penalties.

Source
2024-08-22
09:23
Vitalik Buterin Discusses Security Differences Between PoS and PoW

According to Vitalik Buterin, it is significantly easier to penalize participants in the event of a 51% attack on a Proof of Stake (PoS) network compared to a Proof of Work (PoW) network. In PoW, the only recourse is to change the algorithm, which negatively impacts all users and makes subsequent attacks easier until the ASIC ecosystem is re-established.

Source
2024-08-22
09:23
Vitalik Buterin Discusses 51% Attack Mitigation in PoS vs PoW

According to Vitalik Buterin, it is easier to penalize participants in a 51% attack on a Proof of Stake (PoS) network compared to a Proof of Work (PoW) network. In PoS, the attackers can be punished directly, while in PoW, the only option is to change the algorithm, which negatively impacts all users. Additionally, once the algorithm is changed, the network remains vulnerable until the ASIC ecosystem is re-established.

Source