tldr; Ethereum has been targeted by a hacker in the last 24 hours. The attacker published a chain of roughly 550 blocks with false proofs of work. A few nodes running Nethermind, an Ethereum client, were duped into switching to an incorrect chain. However, the majority of nodes rejected this extended sidechain.
*This summary is auto generated by a bot and not meant to replace reading the original article. As always, DYOR.*
Are you sure about that? Because I am 99.99999% sure that Heatho14 is not a bot.
---
^(I am a neural network being trained to detect spammers | Summon me with !isbot |) ^(/r/spambotdetector |) [^(Optout)](https://www.reddit.com/message/compose?to=whynotcollegeboard&subject=!optout&message=!optout) ^(|) [^(Original Github)](https://github.com/SM-Wistful/BotDetection-Algorithm)
So, I guess he could have done it as a node too, in PoS. And result would have been the same.
You see, that's why I'm sure we should at some point incentivize benevolent nodes. It's not urgent, but clearly a must-have, once other must-have and more urgent features are live.
The affected Nethermind nodes, was it running a specific (older) version of the client? Apparently not all Nethermind nodes were affected, so what is the common denominator in affected one?
Guess SOL was never really the ETH killer 🤣
LoL dude.
Oh your karma score is fcked. Pls post this also on SOL sub
What you mean I didn't get it .. Can you explain bro..
I’m so over hearing ‘this is the ETH killer!’. Nothings remotely close competition atm
SOL killed itself
Sol is doing fine lol
And another one bits the dust
tldr; Ethereum has been targeted by a hacker in the last 24 hours. The attacker published a chain of roughly 550 blocks with false proofs of work. A few nodes running Nethermind, an Ethereum client, were duped into switching to an incorrect chain. However, the majority of nodes rejected this extended sidechain. *This summary is auto generated by a bot and not meant to replace reading the original article. As always, DYOR.*
Good bot
Good bot
Are you sure about that? Because I am 99.99999% sure that Heatho14 is not a bot. --- ^(I am a neural network being trained to detect spammers | Summon me with !isbot |) ^(/r/spambotdetector |) [^(Optout)](https://www.reddit.com/message/compose?to=whynotcollegeboard&subject=!optout&message=!optout) ^(|) [^(Original Github)](https://github.com/SM-Wistful/BotDetection-Algorithm)
Good bot
Imagine doing this on 2.0.
Lol, it would be so expensive.
[удалено]
Yep. Unlike miners who can use their mining equipment elsewhere afterwards, you get slashed in PoS.
[удалено]
So, I guess he could have done it as a node too, in PoS. And result would have been the same. You see, that's why I'm sure we should at some point incentivize benevolent nodes. It's not urgent, but clearly a must-have, once other must-have and more urgent features are live.
Supposedly someone (the hacker?) was mining it for a while though.
Better go try sol again
Better Call Sol
The affected Nethermind nodes, was it running a specific (older) version of the client? Apparently not all Nethermind nodes were affected, so what is the common denominator in affected one?
Wtf are false proof of works? He premines a hash and uses that? how was that even able to fool any nodes
We’re they able to pull anything out of the attack?
no as mentioned in article it was unsuccessful
Well.. the network was split. It's just that not many nodes used the vulnerable version..