Blockchain Security

Blockchain Security

Igor Pejic

Financial technology & blockchain specialist

The blockchain is often hailed for its immaculate security, its immutability, and the protection of its users’ identities. To uncover the true level of security, Igor discusses the mechanism itself, transaction validation and other criticisms.

The blockchain is often hailed for its immaculate security, its immutability, and the protection of its users’ identities. To uncover the true level of security, Igor discusses the mechanism itself, transaction validation and other criticisms.

Speak to an expert

Speak to an expert today to access this and all of the content on our platform.

Blockchain Security

9 mins 42 secs

Key learning objectives:

  • Explain why nodes would invest resources/computing power into the blockchain network

  • Understand whether attackers change blockchain history

  • Understand the 51% attack and why is it unlikely

Overview:

The blockchain is often hailed for its immaculate security, its immutability, and the protection of its users’ identities. However, there have been many cases where exchanges have been hacked and cryptocoins have been stolen. These hacks can be attributed to lax security standards not in the blockchain-system itself, but in the management and storage of data such as private access keys. The blockchain itself has proven extremely resilient and as more transactions are added to the chains of cryptocurrencies such as bitcoin, the safer the mechanism becomes.

Speak to an expert

Speak to an expert today to access this and all of the content on our platform.

Summary

Can attackers change blockchain history?

This answer depends on the validation mechanism each particular blockchain uses. With the so-called proof-of-work validation, each bitcoin transaction is encrypted into a hash value that is unique and has uniform length. This is done via one-way cryptography; so, if someone only has the hash value, they can’t find the initial input variables. The header of a block contains hash values referring to the previous block meaning altering the preceding block becomes impossible without alerting all subsequent blocks. This makes the chain tamper-proof.

Explain why nodes would invest resources/computing power into the blockchain network

Validator nodes, also known as miners, invest massive computing power to solve a mathematical puzzle with trial and error mechanisms. The miners decide which transactions to include in each new block and the node that hits the right solution first is rewarded with freshly minted bitcoins.

What is a 51% attack and why is it unlikely?

Before the winning node receives the credit for solving the mathematical puzzle, the other miners must verify the proposed solution. The verification can be performed very quickly once the correct value is found, however, if a possible hacker was to gain control of over 50% of the hashing power in a network, they could vote a ‘wrong’ truth into reality. This scenario is known as the 51% attack and it poses a threat to future transaction validity. However, the attack is extremely unlikely due to the sheer computing power required to control over 50% of the network, but considering that miners are joining in mining pools, it is not completely impossible to manipulate future transactions.

Speak to an expert

Speak to an expert today to access this and all of the content on our platform.

Igor Pejic

Igor Pejic

Igor is the author of “Blockchain Babel: The Crypto-Craze and the Challenge to Business.” The book was a Financial Times Book of the Month and a finalist in the Bracken Bower Prize. He has published more than 50 articles on blockchain and financial technology. Moreover, Igor is the Head of Marketing and Product Management for BNP Paribas Personal Finance in Austria.

There are no available Videos from "Igor Pejic"