• News
  • Market Cap
  • Buy Crypto

Subscribe to Updates

Get the latest crypto news from LockMeta about cryptocurrency, nft and metaverse.

Facebook Twitter Telegram
Trending
  • The NEAR Foundation invites the Terra community to join the NEAR ecosystem
  • Indian crypto industry representatives call for reduction of certain tax rules
  • Crypto.com’s DeFi Wallet adds AVAX-TUSD support
  • Binance Integrates Optimism Network, Opens Optimism Layer 2ETH Deposits
  • ETH loses addresses at 2-year high
  • Yuga Labs’ metaverse project Otherside virtual parcel NFT transaction value reached $927 million
  • Data: The 24-hour transaction volume of Milady Maker series NFT increased by more than 652%
  • Goldman Sachs: Cryptocurrency shrinking has little impact on U.S. economy
Facebook Twitter Telegram
LockMetaLockMeta
  • News
  • Market Cap
  • Buy Crypto
LockMetaLockMeta
Facebook Twitter
Home»News»Market News»Cyber Capital founder: Solana’s POH has design flaws

Cyber Capital founder: Solana’s POH has design flaws

December 11, 20212 Views
Facebook Twitter Pinterest LinkedIn Tumblr Email

On December 11th, Cyber ​​Capital founder and CIO Justin Bons tweeted that Solana was attacked by DDoS again yesterday. Solana sacrificed decentralization and security for speed. They chose history to prove that the consensus algorithm POH has basic design flaws, because POH will lead to the creation of deterministic blocks.

Previously, most public chains did not choose the POH consensus for good reasons. Only the creation of non-deterministic blocks can increase security and resist censorship. Because no one can predict who will create the next block. In Solana, it is possible to predict and therefore attack the next inline block producer. For example, a hacker can attack the next 100 validators. Rather than attack the entire network, this attack is effective regardless of scale. This severely reduces the SOL security and the ability to resist DDoS attacks, and this attack can also be combined with a 51% attack. Allows an attacker to temporarily gain control of the network by attacking other Stake Holders.

In addition, if combined with Turbine will lead to more dire consequences. Because Turbine divides the transaction memory pool into groups of validators. This means that using PoH, transactions can be reviewed by attacking a specific validator in the next inline group.

Cyber Capital POH Solana
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related News

Nervos CKB will undergo an important network upgrade tomorrow, the new mainnet will be named Mirana

May 11, 2022

Former Binance CFO Zhou Wei Acquires Philippine Crypto Wallet Service Coins.ph for Nearly $200 Million

April 22, 2022

JPMorgan CEO: Decentralized finance and blockchain are truly new technologies, and JPMorgan is at the forefront of innovation

April 22, 2022

Aura FAT Has Raised $115M in Nasdaq IPO

April 20, 2022
Facebook Twitter Telegram
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms of Service
© 2022 LockMeta.

Type above and press Enter to search. Press Esc to cancel.