List of Flash News about 51% attack
Time | Details |
---|---|
2025-08-15 06:47 |
BTC Explainer Shared by @alice_und_bob; No New Details on Monero XMR 51% Attack and a Look at Clanker on Base — Trading Takeaways
According to @alice_und_bob, a four-hour session did not cover the Monero Cubic 51% Attack, providing no new security details for XMR traders; source: @alice_und_bob on X, Aug 15, 2025. @alice_und_bob stated they explored the world of @clankeronbase during the session and ended by drawing a Bitcoin explainer, indicating the post is educational rather than market-moving; source: @alice_und_bob on X, Aug 15, 2025. For trading, this post offers no price levels, on-chain metrics, or risk disclosures for BTC or XMR, so there are no direct trading signals derived from this update; source: @alice_und_bob on X, Aug 15, 2025. |
2025-08-14 18:55 |
Monero (XMR) and Qubic (QUBIC) 51% Attack Research: Security Risks and Exchange Confirmation Impact
According to @alice_und_bob, new research titled Monero Qubic 51% Attack was shared via an X broadcast, flagging a security analysis relevant to Monero (XMR) and Qubic (QUBIC); source: https://twitter.com/alice_und_bob/status/1956067089674043574 and https://x.com/i/broadcasts/1. 51% attacks allow majority hash power to reorganize blocks and enable double-spending, directly undermining transactional finality and settlement assurance for traders; source: https://bitcoin.org/bitcoin.pdf. Exchanges mitigate reorg risk by requiring a set number of network confirmations, and higher confirmation thresholds lengthen deposit and withdrawal times, which can impact intraday execution and arbitrage; source: https://support.kraken.com/hc/en-us/articles/360001395506-What-are-confirmations-and-why-are-they-required. |
2025-08-12 13:32 |
Monero (XMR) Alert: Qubic Claims 51% Hashrate Control and Aims for 100% Block Rewards via Selfish Mining, BitMEX Research Questions Likelihood
According to @BitMEXResearch, Qubic published an article claiming to control over 51% of Monero (XMR) network hashrate and stating its end goal is to take over all block rewards through full and sustained selfish mining. Source: BitMEX Research on X, Aug 12, 2025; Qubic article as cited by BitMEX Research. @BitMEXResearch said they consider the 51% claim unlikely and noted key details remain unclear, highlighting unresolved uncertainty around XMR network security at this time. Source: BitMEX Research on X, Aug 12, 2025. For traders, if Qubic’s claim were accurate, the setup would imply elevated 51%-attack risk characteristics consistent with selfish mining incentives and block reward capture on Monero. Source: BitMEX Research on X, Aug 12, 2025. |
2025-05-27 22:02 |
How Secure Is Bitcoin? SHA-256 Hash Function Explained for Crypto Traders
According to André Dragosch, PhD (@Andre_Dragosch), Bitcoin leverages the SHA-256 cryptographic hash function, which is fundamental to its network security and resistance against double spending or fraudulent transactions. SHA-256 ensures that Bitcoin transactions are extremely difficult to alter or reverse without immense computational power, making attacks such as double-spending and 51% attacks highly unlikely at current network scales (source: @Andre_Dragosch on Twitter, May 27, 2025). For crypto traders, this strong security underpins trust in the network and enhances Bitcoin’s appeal as a safe-haven digital asset. Understanding the technical robustness of SHA-256 can help traders assess risk and make informed decisions, especially when comparing Bitcoin to altcoins with different security protocols. |
2024-10-23 04:54 |
Vitalik Buterin Advocates for Automated Slashing in 51% Attack Scenarios
According to Vitalik Buterin, the slashing process in blockchain networks should be fully automated, even in cases of a 51% attack. He emphasizes that without automation, attackers could exploit the social layer to avoid penalties. |
2024-08-22 09:23 |
Vitalik Buterin Discusses Security Differences Between PoS and PoW
According to Vitalik Buterin, it is significantly easier to penalize participants in the event of a 51% attack on a Proof of Stake (PoS) network compared to a Proof of Work (PoW) network. In PoW, the only recourse is to change the algorithm, which negatively impacts all users and makes subsequent attacks easier until the ASIC ecosystem is re-established. |
2024-08-22 09:23 |
Vitalik Buterin Discusses 51% Attack Mitigation in PoS vs PoW
According to Vitalik Buterin, it is easier to penalize participants in a 51% attack on a Proof of Stake (PoS) network compared to a Proof of Work (PoW) network. In PoS, the attackers can be punished directly, while in PoW, the only option is to change the algorithm, which negatively impacts all users. Additionally, once the algorithm is changed, the network remains vulnerable until the ASIC ecosystem is re-established. |