非协议层的短期攻击解决方案
An Short-term solution for 51% attacks based on non-protocol level

By monitoring ETC network computing power, when we believe that 51% attacks occur, we will rent computing power from nicehash.com and Friendly pool to dilute the attacker's hash power and use game strategy to reduce the probability of the attacker's success.

Def log防御记录线路进展

WHAT CAN WE DO ?
方案简介

DsDefence是一个非协议层的51%攻击的不充分解决方案,通过对ETC网络算力的监控,当我们认为出现51%攻击的情况时,我们会租用算力来稀释攻击者的算力,用博弈策略来降低攻击者成功的可能性。

Defense logic 防御逻辑

通过Node RPC接口、dashblock的页面接口工具、Nicehash的公共API,以及和社区的沟通,争取第一时间发现51%攻击的迹象,使用自有预备资金来租用算力,通过已设计好的防御策略用最低的成本来动态租用算力进行抵御。可用来抵御攻击的瞬时算力应该在2T以上,并且我们长期租用的ETC算力将持续提升。

Through the interface data of Node RPC, the custom interface of Dashblock, the public API of Nicehash, and the communication with the community, we try to find the signs of 51% attack in the first time. We use our own reserve fund to rent hashrate, and dynamically adjust the hash power to resist based on the designed defense strategy at the lowest cost. The hashrate that can be used to defend against an attack in an instant should be above 2TH/s.

In addition, Our ETC hashrate held for a long-term will be increased.

Friendly mining pool 友好矿池

市场上可供租用的Ether算力虽然足以发动针对51%的攻击,但是总量并不是很大,除了租用算力,我们还和一些持有1T以上Ether算力的矿池沟通协作,通过支付差价的方式以获得在51%发生时获得矿池算力的支持。

There's enough Ether power available to rent in the market to launch a 51% attack, but it's not a huge amount. Therefore, in addition to considering the open hashmarket, the mine pool is also preferred to defend against 51% attacks. we also work with a number of mining pools that hold more than 1T of Ether power, paying the difference to get the pool power when 51% happens.

Funding sources 资金来源

为潜在攻击准备的资金在0.45个BTC以上,为了用最小成本来迷惑攻击者,增加攻击的成本和削弱攻击者的意图,我们不会公布准确数字。我们并没有计划进行大规模防御或和攻击者进行资金消耗战,皆在通过博弈来降低攻击可能。ETC的安全本身还是需要依赖自有算力、协议层的改进。

Funding for potential attacks is more than 0.45 BTC. In order to confuse an attacker with minimal cost, increase the cost of the attack and weaken the intention of the attacker, we will not publish the exact number. We're not planning a massive defense or a war of attrition against attackers, we're all playing games to reduce the willingness of attack. ETC security itself still needs to rely on its own hash power, protocol layer improvement.

Why? 初衷

我们有自己项目,作为ETC的支持者,为ETC做出一定贡献是有趣的事。

It's not complicated, we have our own main business, and as a support team for ETC, it's interesting to make a contribution.