What Happens in a 51% Attack?


Once attackers control the majority of the network’s power, they can manipulate the blockchain ledger in ways that are normally impossible.
They can spend coins, then rewrite the chain to erase that transaction, effectively spending the same coins again.
They can block or delay new transactions from being confirmed.
They can replace parts of the blockchain with their own version, invalidating recent blocks.

What They Cannot Do
They cannot steal coins from other wallets.
They cannot change old transactions that are already deeply embedded in the chain.
They cannot create new coins out of thin air (that would break consensus rules).

Proof-of-Work chains (like #Bitcoin, # Monero, #Ethereum Classic) are vulnerable if attackers control enough mining power.
Smaller blockchains with less total hashrate are more vulnerable, since renting or redirecting enough power is easier.
Larger networks like #BTC are considered safe because the cost of acquiring over 50% of hashrate is astronomical (billions of dollars in hardware + electricity).
IN5.77%
POWER-1.68%
OWN0.01%
WORK-0.89%
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
0/400
No comments
Trade Crypto Anywhere Anytime
qrCode
Scan to download Gate App
Community
English
  • 简体中文
  • English
  • Tiếng Việt
  • 繁體中文
  • Español
  • Русский
  • Français (Afrique)
  • Português (Portugal)
  • Bahasa Indonesia
  • 日本語
  • بالعربية
  • Українська
  • Português (Brasil)