0%

What is double spending and how to avoid it 

2022年10月14日 5分读完
新闻文章的横幅图片

What is double spending?

It is crucial that a digital currency system contains mechanisms to safeguard against double spending.  Entire systems could collapse should such protocols not be in place.

Bitcoin is well-designed to prevent double-spending attacks, if its protocol is used as intended. Because the transactions on Bitcoin are recorded in blocks and the network  uses Proof of Work as its consensus mechanism, recorders (known as miners) have to complete  a hash computing process in order to obtain the right to record the transaction. Once the transactions are recorded, it will be distributed to different nodes.

How does double spending affect Bitcoin?

With such a  mechanism in place, miners must have access to stronger  computing power than others should they  wish to be granted recording rights. Once a transaction is successfully recorded and confirmed in a block, it would be extremely challenging for other miners to change this record as massive amounts of computing power would be needed.

This mechanism, however, does not constitute a fail-safe prevention against double spending. As the transaction recording process of Bitcoin is one that takes time, double spending could still occur before transactions are successfully recorded, especially when transactions involve relatively small amounts of Bitcoin.

For example, Bob orders one hamburger and pays for his purchase with Bitcoin. However, as the restaurant is too busy to wait for every transaction to be fully recorded, they give the burger to Bob directly without waiting for the transaction to be complete.

If Bob immediately sends the same amount of Bitcoin to another address with a higher transaction amount attached, the later transaction will likely be recorded and closed by miners – resulting in the invalidity of the previous transaction.

Different types of double spending

  • 51% attacks: When a single entity or organization manages to control more than 50% of the hash computing power on a chain, this allows them to change the transaction sequence or even delete the transaction. The occurrence of such a scenario is  nearly impossible on the Bitcoin network, but has happened on other blockchain networks.

  • Race attacks: Customer A’s double spending case mentioned above is a typical race attack – a user broadcasts two conflicting transactions with the same amount at the same time, and tries to get one confirmed in order to invalidate the other. Race attacks take advantage of the time difference and require the receiver to confirm the transaction before the transaction is  recorded on blocks.

  • Finney attacks: An attacker pre-mines one transaction into a block without broadcasting it to the network immediately. Instead, he spends the same amount in another transaction and only then broadcasts his previously mined block, which may invalidate the former payment. Finney attacks require a specific sequence of events to occur and are also contingent on the recipient’s acceptance of unconfirmed transactions.

How to prevent double spending?

1: Wait for the block confirmation

The best solution to solve the double spending issue is to finish the deal after the transaction is confirmed by blocks. Once the transaction is confirmed, the coins can’t be double-spent, as ownership is assigned to a new user – and the entire network can verify this.  This is a solution adopted by transactions involving large amounts.

2: Increase 51% attacker’s costs

As mentioned above, when attackers control more than 50% of a blockchain network’s hash computing power, it is theoretically possible for them to delete a transaction that has been confirmed by blocks. However in reality, such a scenario would be near impossible as 51% attacks and their required computing power would come at a high monetary cost.

There could sometimes be transactions deemed to be of sufficient value for attackers to invest in the required computing power. In such a case, users should wait for more blocks to confirm the transaction’s validity, in order to increase the cost to attackers.

For example, hacker B spends a large amount of resources to acquire 51% of a blockchain network’s computing power and hence gets a 51% chance to invalidate a transaction. However, should he need to invalidate two blocks, his change would halve to 26% and he would then need to invest in more resources to obtain the required computing power for his purposes.

Of course, the scenarios mentioned above are theoretical. In reality, dealers will have to determine how many blocks a transaction requires in order to be validated. If a transaction involves a small amount, perhaps block confirmations need not be attended to immediately. But if a large amount is involved, it would be prudent to wait for more block confirmations before proceeding with the deal.

The post appeared first on Huobi Blog.

热门新闻

How to Set Up and Use Trust Wallet for Binance Smart Chain
#Bitcoin#Bitcoins#Config+2 更多标签

How to Set Up and Use Trust Wallet for Binance Smart Chain

Your Essential Guide To Binance Leveraged Tokens

Your Essential Guide To Binance Leveraged Tokens

How to Sell Your Bitcoin Into Cash on Binance (2021 Update)
#Subscriptions

How to Sell Your Bitcoin Into Cash on Binance (2021 Update)

What is Grid Trading? (A Crypto-Futures Guide)

What is Grid Trading? (A Crypto-Futures Guide)

马上免费使用Cryptohopper进行交易!

免费使用——无需信用卡

开始吧
Cryptohopper appCryptohopper app

免责声明:Cryptohopper并非受监管机构。加密货币的机器人交易存在大量风险,过去的业绩表现并不能预示未来的结果。产品截图中展示的利润仅供参考,可能有所夸大。只有在您具备充足的知识或寻求了专业财务顾问的指导后,才应进行机器人交易。在任何情况下,Cryptohopper均不对任何人或实体因使用我们的软件进行交易而产生的全部或部分损失或损害,或任何直接、间接、特殊、后果性或附带的损害承担责任。请注意,Cryptohopper社交交易平台上的内容由Cryptohopper社区成员生成,并不代表Cryptohopper或其代表的建议或推荐。市场上展示的利润并不能预示未来的结果。使用Cryptohopper的服务即表示您承认并接受加密货币交易的固有风险,并同意免除Cryptohopper因您的任何责任或损失的责任。在使用我们的软件或进行任何交易活动之前,务必审阅并理解我们的服务条款和风险披露政策。请根据您的具体情况咨询法律和金融专业人士,获取个性化的建议。

©2017 - 2025 版权归属于Cryptohopper™ -版权所有。