• About
  • FAQ
  • Earn Bitcoin while Surfing the net
  • Buy & Sell Crypto on Paxful
Newsletter
Approx Foundation
  • Home
    • Home – Layout 1
  • Bitcoin
  • Ethereum
  • Regulation
  • Market
  • Blockchain
  • Business
  • Guide
  • Contact Us
No Result
View All Result
  • Home
    • Home – Layout 1
  • Bitcoin
  • Ethereum
  • Regulation
  • Market
  • Blockchain
  • Business
  • Guide
  • Contact Us
No Result
View All Result
Approx Foundation
No Result
View All Result
Home Bitcoin

Can a 51% attack be triggered by any other of these 7 strategies? (and with a quantum computer?)

Moussa by Moussa
March 26, 2024
in Bitcoin
0
peer discovery – how to obtain the IP addresses of nodes for mining pools?
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


(I think this question will be blocked for being not specific, so help me edit it, thanks)

(I will present Facts [1] and Facts [2] which will help organize my ideas before my question)

Facts [1]: (the following information is common sense)

One possible attack is: (reproducing the words in the blog braiins)

…public keys are revealed when transactions are broadcasted to the
mempool, even BEFORE they get added to the blockchain.

If an attacker could reverse the signature and get the associated
private key during this window before the transaction gets included
on-chain, they could then broadcast a higher-fee transaction sending
the coins to themselves instead.

Facts [2]: (the difficult part of the question will start here)

The paper A Survey on Various Attacks in Bitcoin and Cryptocurrency describes 7 attacks:

A. Denial-of-service Attack 
B. Double Spending Attack 
C. Sybil Attack 
D. Eclipse Attack 
E. Selfish mining Attack 
F. Fork after Withholding Attack 
G. Block Withholding Attack

I finally arrive to my question:

Using a quantum computer to break SHA-256/ECDSA:

Are there other tricks to pull off a 51% attack throughout any of the (A-G) strategies?

(I have tried to find any not widespreadly diffuse knowledge, like

For example 1: In Eclipse attack, the IP address of victim person is blocked or redirected towards a competitor. IPsec uses SHA. So I think it is possible to find a vulnerability this way, but I have no idea how.

For example 2: It is written in the paper Off-Path TCP Exploits of the Mixed IPID Assignment:

“TCP connections DoS attack is particularly applicable to compromising applications secured by encrypted traffic, e.g., HTTPS and SSH”.

I have tried to guess which quantum attack to sha256 is able to attack bitcoin, but I am not a computer scientist so please ANY information is wellcome)



Source link

Related articles

Kraken Partners With Nasdaq In New Tokenized Stocks Move

Kraken Partners With Nasdaq In New Tokenized Stocks Move

March 10, 2026
Saylor Reloads? Bitcoin Buy Signal Appears As BTC Nears $67K

Saylor Reloads? Bitcoin Buy Signal Appears As BTC Nears $67K

March 10, 2026
Share76Tweet47

Related Posts

Kraken Partners With Nasdaq In New Tokenized Stocks Move

Kraken Partners With Nasdaq In New Tokenized Stocks Move

by Moussa
March 10, 2026
0

Trusted Editorial content, reviewed by leading industry experts and seasoned editors. Ad Disclosure Kraken parent Payward has partnered with Nasdaq...

Saylor Reloads? Bitcoin Buy Signal Appears As BTC Nears $67K

Saylor Reloads? Bitcoin Buy Signal Appears As BTC Nears $67K

by Moussa
March 10, 2026
0

Strategy, the company that has built its identity around hoarding Bitcoin, is now sitting on paper losses — and buying...

Bitcoin Has A Golden Opportunity With AI Agents, It’s Time To Build

Bitcoin Has A Golden Opportunity With AI Agents, It’s Time To Build

by Moussa
March 10, 2026
0

For all of bitcoin’s life, it has been fighting an uphill battle against fiat currencies that mostly do the job...

Nasdaq, Kraken Developing Gateway Connecting Tokenized Equities With Blockchain Networks

Nasdaq, Kraken Developing Gateway Connecting Tokenized Equities With Blockchain Networks

by Moussa
March 10, 2026
0

Tokenized equities are moving closer to mainstream finance as Nasdaq and Payward team up to build a gateway linking regulated...

How do Bitcoin mining pools typically handle payout frequency versus thresholds?

multi signature – Is P2TR-MS (Taproot M-of-N multsig) leaking public keys?

by Moussa
March 9, 2026
0

I am using P2TR-MS (Taproot M-of-N multisig) using the library "@scure/btc-signer" M-of-N single leaf TapRoot multisig ( CHECKSIG NUMEQUAL) It...

Load More

youssufi.com

sephina.com

[vc_row full_width="stretch_row" parallax="content-moving" vc_row_background="" background_repeat="no-repeat" background_position="center center" footer_scheme="dark" css=".vc_custom_1517813231908{padding-top: 60px !important;padding-bottom: 30px !important;background-color: #191818 !important;background-position: center;background-repeat: no-repeat !important;background-size: cover !important;}" footer_widget_title_color="#fcbf46" footer_button_bg="#fcb11e"][vc_column width="1/4"]

We bring you the latest in Crypto News

[/vc_column][vc_column width="1/4"][vc_wp_categories]
[/vc_column][vc_column width="1/4"][vc_wp_tagcloud taxonomy="post_tag"][/vc_column][vc_column width="1/4"]

Newsletter

[vc_raw_html]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[/vc_raw_html][/vc_column][/vc_row]
No Result
View All Result
  • Contact Us
  • Homepages
  • Business
  • Guide

© 2024 APPROX FOUNDATION - The Crypto Currency News