Edge (XVG) Suffers Severe Miner Network Again

Brink (XVG), the privacy conscious cryptocurrency, suffered a dreaded 51% network attack today.

This wasgoed according to a very respected miner and the administrator of the Suprnova mining pool. The discovery wasgoed laid out ter a BitcoinTalk forum postbode where he detailed that the malicious miner wasgoed able to exploit bugs ter the retargeting of XVG code.

This permitted the miner to mine a XVG block merienda every 2nd within a three hour time period earlier this morning. The ogenblik that the poster (OCMiner) mentioned the attack, the malicious miner stopped his pool.

So what exactly is going on with Edge?

Timestamp Spoofing

Edge mining is a bit unique te that each Brink block is mined according to a different algorithm. So for example one block will be mined with Scrypt and the other with blake etc.

The Edge protocol will check the previous block to confirm what algorithm wasgoed used. However, given a bug ter the Brink code the miner is able to submit blocks with false timestamps. Hence, the miner is able to trick the algorithm into thinking that the last block that wasgoed mined wasgoed overheen an hour ago.

According to OCMiner:

Your next block, the subsequent block, will then have the voorbeeldig time… And since it’s already an hour ago (at least that is what the network thinks) it will permit this block to be added to the main chain spil well

He then posted a breakdown of all of the blocks that the miner wasgoed able to submit. They all followed each other but had different time stamps. The block with the spoofed time stamp wasgoed instantly before a correctly timed block. The result of this exploit wasgoed that the hacker wasgoed able to mine a block merienda every 2nd.

There were also other miners who mentioned problems they were having mining during that particular window. OCminer also linked to a number of the addresses that were used te order to offload the mined coins. There were no doubt many more.

Response from Edge

When this wasgoed brought to the attention of the Edge developers, they very very first claimed that there wasgoed nothing to uitgerekend. However, after the clear demonstration of the attack they shoved a “fix” and issued a tweet.

Wij had a puny hash attack that lasted about Three hours earlier this morning, it’s bot cleared up now. Wij will be implementing even more redundancy checks for things of this nature te the future! $XVG #vergefam

Of course, there were many te the Brink community who did not take gladly to the postbode on Bitcointalk. They replied to the renovador postbode with the usual prognostications of “FUD” and someone attempting to “pick up” cheap Brink coins.

This is indeed unfortunate spil the pool technicus wasgoed ter fact helping the community out. By spotting the network attack early and bringing coverage to it he managed to get the attacker to think twice. Moreover, it talent helpful information to the Edge Devs ter order to voorbeeldig the exploit.

More Trouble for Brink?

This comes at a time when opinion about Brink is very split. There are diegene hard adherents of the “vergefam” phenomenon who think that it could legitimately be the next big privacy conscious cryptocurrency.

However, there are many others who view the tactics recently employed by Edge spil dubious at best. For example, just last week the Edge team sent out a fundraising request te order to raise more money for securing a “secret deal”.

Te the end, they managed to raise the required funds and have now moved the announcement date to the 17th of April. This has created a good overeenkomst of speculation and indeed confusion from both sides of the divide.

Spil the miner attack shows, there are still some technological challenges for Brink to overcome if they truly want to take on more established cryptocurrencies. One can only hope that no further exploits are discovered.

Updated 22 May

It may shock no one to learn that the Edge attacker wasgoed able to find a way around the minor patch that wasgoed implemented by the Devs. And they have used this to mint millions more XVG.

OC miner, the same person who spotted the flamante vulnerability, brought it to the attention of users on Bitcointalk.

Te this case, the attackers merely used two algorithms instead of one. He then wasgoed able to fork the chain by renting hashing power for thesis two algorithms.

The hacker is still using the same timestamp spoofing that would influence on the difficulty adjustments on the network. Expect this time he is not only using scrypt but also lyra2re.

At the time of writing, the malicious miner wasgoed able to mine blocks 2155850 to 2206272 which is about 35m XVG. This is omschrijving to about $1.7m that the hacker wasgoed able to earn again.

What did the devs do about it?

They merely labelled it an “ongoing DDOS” attack with not that much more explanation. However, they have used the chance to explaint that they will be rolling out a entirely updated codebase.

Albeit something emerges to being done, many will say that it is too little too late. Albeit Edge has done a good overeenkomst ter the way of marketing with partnerships such spil PornHub, the fundamental flaws remain.

If the developers are able to release a entirely fresh codebase and they use a rigourous peer review, it is possible that they could recover.

However, spil many would say: Idiot mij merienda, shame on mij, loser mij twice, shame on you…

Featured Pic via Fotolia

  • Posted ter: News
  • Tagged te: Altcoin mining, Attack, Bitcointalk.org, miners, Brink, XVG

Posted by Editorial Team

Editors at large. Posting the latest news, reviews and analysis to succesnummer the blockchain.


  • Yes I have bot trading there many times spil well, and I do not think that they are scam. If your deposit is not counted just waiting for a few hours maybe they have some problems with certain coin purses if, however, your coins do not demonstrate up at the end of the range to their support. Such shrill accusations voorwaarde have some evidence.

  • I do not think they are scammers, I personally have never had any problems with them, everything worked and it wasgoed good!

Leave a Reply

Your email address will not be published. Required fields are marked *