T
toknormal
Guest
Hi
In the Evolution docs it says:
I was wondering about how secure this was. Although I realise that the selection algorithm makes it near impossible for me to attack any transaction in particular, what about the converse situation ? i.e. no transaction in particular ?
Say I compiled my own 10 masternodes from source, and modified their processing logic. Then collateralised them and simply waited for those ten to be picked which must be a statistical certainty after a certain number of weeks, months or years.
What type of damage could I do ? I'm not just talking about affecting a single transaction but more of damaging confidence in the network generally by demonstrating that I managed to take control of an entire quorum.
What I'm pointing out - as far as I understand - is that the deterministic algo for quorum selection is only deterministic for a GIVEN TRANSACTION. It doesn't stop people from predicting that a particular 10 nodes will form a quorum at some point and using that fact to design some malicious collusion logic in a kind of "quorum landmine" attack.
In the Evolution docs it says:
To stop Masternodes from colluding, we base the deterministic selection algorithm on the proofofwork hash.
I was wondering about how secure this was. Although I realise that the selection algorithm makes it near impossible for me to attack any transaction in particular, what about the converse situation ? i.e. no transaction in particular ?
Say I compiled my own 10 masternodes from source, and modified their processing logic. Then collateralised them and simply waited for those ten to be picked which must be a statistical certainty after a certain number of weeks, months or years.
What type of damage could I do ? I'm not just talking about affecting a single transaction but more of damaging confidence in the network generally by demonstrating that I managed to take control of an entire quorum.
What I'm pointing out - as far as I understand - is that the deterministic algo for quorum selection is only deterministic for a GIVEN TRANSACTION. It doesn't stop people from predicting that a particular 10 nodes will form a quorum at some point and using that fact to design some malicious collusion logic in a kind of "quorum landmine" attack.
Last edited: