Blockchain nodes are poisoned
core analysis:
1. Transparency, 2. Openness, 3. Information can not be tampered with, 4. Decentralization,
5. Detailed analysis
blockchain is a new application mode of distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm and other computer technologies. The so-called consensus mechanism is a mathematical algorithm to establish trust and obtain interests between different nodes in the blockchain system
1. In a narrow sense, blockchain is a kind of chained data structure composed of data blocks connected in sequence according to the time sequence, and it can not be tampered with and forged by cryptography
2. Broadly speaking, blockchain technology uses blockchain data structure to verify and store data, uses distributed node consensus algorithm to generate and update data, and uses cryptography to ensure the security of data transmission and access It is a new distributed infrastructure and computing method to program and operate data by using intelligent contract composed of automated script code.
on the other hand, all nodes (computers in short) participating in the network will store one account book, which is updated in real time. Even if one node fails, the blockchain will not be affected.
Recently, Vulcan team of 360 company found a series of high-risk security vulnerabilities in EOS, a blockchain platform. It is verified that some of the vulnerabilities can remotely execute arbitrary code on EOS nodes, that is, they can directly control and take over all nodes running on EOS through remote attacks
In the early morning of May 29, 360 reported this kind of vulnerability to EOS official for the first time, and assisted it to repair the security risks. The person in charge of the EOS network said that the EOS network will not be officially launched until these problems are fixed
EOS super node attack: the virtual currency transaction is completely controlled
in the attack, the attacker will construct and publish a smart contract containing malicious code, and the EOS super node will execute the malicious contract and trigger the security vulnerability. The attacker then uses the super node to pack the malicious contract into a new block, resulting in the remote control of all nodes in the network (alternative super node, exchange recharge withdrawal node, digital currency wallet server node, etc.)
because the system of the node has been completely controlled, the attacker can "do whatever he wants", such as stealing the key of the EOS super node and controlling the virtual currency transaction of the EOS network; Obtain other financial and privacy data in the participating node system of EOS network, such as digital currency in the exchange, user key stored in the wallet, key user information and privacy data, etc
What's more, an attacker can turn a node in the EOS network into a member of a botnet, launch a network attack, or become a free "miner" to extract other digital currency
source: Science and Technology News
first, expand the scope of integrity candidate nodes to 5% of all nodes, and randomly select consensus and accounting nodes from the candidate pool according to the time task. The larger the scope of nodes involved in the consensus, the less likely it is to commit joint crimes< Second, select nodes based on bit-r reputation value. Bit-r reputation value is the behavior portrait and historical transaction record of each user and node, which cannot be merged and transferred like token, so the feasibility of joint evil between nodes is small.