-
Notifications
You must be signed in to change notification settings - Fork 8
DC Network Attacks
Attack on the DC-network by sending transactions that are valid independently, but invalid in the same block. For example, change of the primary key and any other transaction that features previous signature. Or 2 send_dc transactions, sum of which exceeds the wallet balance. Success of such attack may result in nodes to become unable to generate new blocks, thus no new blocks will appear in the DC-network. Solution for this problem is to update software on all nodes.
Transaction compatibility test is used for protection, which uses the clear_incompatible_tx() function. For send_dc transactions, debited amount for all transactions that were not added to the block is recorded in the buffer.
Attack 51% is possible if a violator obtains 51% of miners’ private keys. The most efficient protection is to use 3 private keys, 2 of which are not stored on the user’s computer.