{"id":12159,"date":"2014-01-10T12:55:55","date_gmt":"2014-01-10T18:55:55","guid":{"rendered":"http:\/\/bucktownbell.com\/?p=12159"},"modified":"2014-01-10T13:26:01","modified_gmt":"2014-01-10T19:26:01","slug":"weaknesses-bitcoin","status":"publish","type":"post","link":"http:\/\/bucktownbell.com\/?p=12159","title":{"rendered":"Weaknesses &#8211; Bitcoin"},"content":{"rendered":"<blockquote><p>An attacker that controls more than 50% of the network&#8217;s computing power can, for the time that he is in control, exclude and modify the ordering of transactions. This allows him to:<\/p>\n<ul>\n<li>Reverse transactions that he sends while he&#8217;s in control. This has the potential to <a title=\"Double-spending\" href=\"https:\/\/en.bitcoin.it\/wiki\/Double-spending#51.25_attack\">double-spend transactions<\/a> that previously had already been seen in the block chain.<\/li>\n<li>Prevent some or all transactions from gaining any confirmations<\/li>\n<li>Prevent some or all other miners from mining any valid blocks<\/li>\n<\/ul>\n<\/blockquote>\n<p>via <a href=\"https:\/\/en.bitcoin.it\/wiki\/Weaknesses#Attacker_has_a_lot_of_computing_power\">Weaknesses &#8211; Bitcoin<\/a>.<\/p>\n<blockquote><p>With less than 50%, the same kind of attacks are possible, but with less than 100% rate of success. For example, someone with only 40% of the network computing power can overcome a 6-deep confirmed transaction with a 50% success rate.<\/p><\/blockquote>\n","protected":false},"excerpt":{"rendered":"<p>An attacker that controls more than 50% of the network&#8217;s computing power can, for the time that he is in control, exclude and modify the ordering of transactions. This allows him to: Reverse transactions that he sends while he&#8217;s in &hellip; <a href=\"http:\/\/bucktownbell.com\/?p=12159\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17],"tags":[742,589,1127],"class_list":["post-12159","post","type-post","status-publish","format-standard","hentry","category-technical","tag-bitcoin","tag-economics","tag-game-theory"],"_links":{"self":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/12159","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=12159"}],"version-history":[{"count":2,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/12159\/revisions"}],"predecessor-version":[{"id":12163,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=\/wp\/v2\/posts\/12159\/revisions\/12163"}],"wp:attachment":[{"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=12159"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=12159"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/bucktownbell.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=12159"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}