Close Menu
    Trending
    • OpenClaw Developers Hit by GitHub Phishing Attack: How to Protect Your Wallet
    • $160 Billion Flood Incoming? Morgan Stanley’s Bitcoin ETF Bet Could Ignite Markets
    • Uncovering Lucrative Investment Opportunities in the Current Crypto Market
    • Bitcoin Market Caution Rises After Failed Breakout: Glassnode Data
    • Active Addresses Set New Record
    • Strive (ASST) Accumulates 13,600 Bitcoin Despite $393 Million Loss In First Six Months As Public Company
    • Elevate Your BTC by Integrating Bitcoin Everlight Shards Early
    • What Investors Need to Know
    CryptoGate
    • Home
    • Bitcoin News
    • Cryptocurrency
    • Crypto Market Trends
    • Altcoins
    • Ethereum
    • Blockchain
    • en
      • en
      • fr
      • de
      • it
      • ja
    CryptoGate
    Home»Ethereum»The P + epsilon Attack
    Ethereum

    The P + epsilon Attack

    CryptoGateBy CryptoGateFebruary 2, 2026No Comments10 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Email


    Particular because of Andrew Miller for arising with this assault, and to Zack Hess, Vlad Zamfir and Paul Sztorc for dialogue and responses

    One of many extra attention-grabbing surprises in cryptoeconomics in current weeks got here from an assault on SchellingCoin conceived by Andrew Miller earlier this month. Though it has all the time been understood that SchellingCoin, and related techniques (together with the extra superior Truthcoin consensus), depend on what’s to date a brand new and untested cryptoeconomic safety assumption – that one can safely depend on individuals appearing actually in a simultaneous consensus recreation simply because they consider that everybody else will – the issues which have been raised to date must do with comparatively marginal points like an attacker’s skill to exert small however rising quantities of affect on the output over time by making use of continued strain. This assault, then again, reveals a way more basic downside.

    The situation is described as follows. Suppose that there exists a easy Schelling recreation the place customers vote on whether or not or not some explicit reality is true (1) or false (0); say in our instance that it is truly false. Every consumer can both vote 1 or 0. If a consumer votes the identical as the bulk, they get a reward of P; in any other case they get 0. Thus, the payoff matrix appears to be like as follows:

    You vote 0 You vote 1
    Others vote 0 P 0
    Others vote 1 0 P

    The idea is that if everybody expects everybody else to vote honestly, then their incentive is to additionally vote honestly as a way to adjust to the bulk, and that is the explanation why one can count on others to vote honestly within the first place; a self-reinforcing Nash equilibrium.

    Now, the assault. Suppose that the attacker credibly commits (eg. through an Ethereum contract, by merely placing one’s fame at stake, or by leveraging the fame of a trusted escrow supplier) to pay out X to voters who voted 1 after the sport is over, the place X = P + ε if the bulk votes 0, and X = 0 if the bulk votes 1. Now, the payoff matrix appears to be like like this:

    You vote 0 You vote 1
    Others vote 0 P P + ε
    Others vote 1 0 P

    Thus, it is a dominant technique for anybody to vote 1 it doesn’t matter what you assume the bulk will do. Therefore, assuming the system shouldn’t be dominated by altruists, the bulk will vote 1, and so the attacker is not going to have to pay something in any respect. The assault has efficiently managed to take over the mechanism at zero price. Word that this differs from Nicholas Houy’s argument about zero-cost 51% attacks on proof of stake (an argument technically extensible to ASIC-based proof of labor) in that right here no epistemic takeover is required; even when everybody stays useless set in a conviction that the attacker goes to fail, their incentive remains to be to vote to assist the attacker, as a result of the attacker takes on the failure threat themselves.

    Salvaging Schelling Schemes

    There are just a few avenues that one can take to attempt to salvage the Schelling mechanism. One strategy is that as an alternative of spherical N of the Schelling consensus itself deciding who will get rewarded primarily based on the “majority is correct” precept, we use spherical N + 1 to find out who needs to be rewarded throughout spherical N, with the default equilibrium being that solely individuals who voted accurately throughout spherical N (each on the precise reality in query and on who needs to be rewarded in spherical N – 1) needs to be rewarded. Theoretically, this requires an attacker wishing to carry out a cost-free assault to deprave not only one spherical, but additionally all future rounds, making the required capital deposit that the attacker should make unbounded.

    Nonetheless, this strategy has two flaws. First, the mechanism is fragile: if the attacker manages to deprave some spherical within the far future by truly paying up P + ε to everybody, no matter who wins, then the expectation of that corrupted spherical causes an incentive to cooperate with the attacker to back-propagate to all earlier rounds. Therefore, corrupting one spherical is dear, however corrupting hundreds of rounds shouldn’t be way more pricey.

    Second, due to discounting, the required deposit to beat the scheme doesn’t must be infinite; it simply must be very very giant (ie. inversely proportional to the prevailing rate of interest). But when all we would like is to make the minimal required bribe bigger, then there exists a a lot less complicated and higher technique for doing so, pioneered by Paul Storcz: require individuals to place down a big deposit, and construct in a mechanism by which the extra rivalry there’s, the extra funds are at stake. On the restrict, the place barely over 50% of votes are in favor of 1 final result and 50% in favor of the opposite, the whole deposit it taken away from minority voters. This ensures that the assault nonetheless works, however the bribe should now be better than the deposit (roughly equal to the payout divided by the discounting price, giving us equal efficiency to the infinite-round recreation) slightly than simply the payout for every spherical. Therefore, as a way to overcome such a mechanism, one would wish to have the ability to show that one is able to pulling off a 51% assault, and maybe we could merely be snug with assuming that attackers of that dimension don’t exist.

    One other strategy is to depend on counter-coordination; basically, by some means coordinate, maybe through credible commitments, on voting A (if A is the reality) with chance 0.6 and B with chance 0.4, the idea being that it will permit customers to (probabilistically) declare the mechanism’s reward and a portion of the attacker’s bribe on the similar time. This (appears to) work significantly nicely in video games the place as an alternative of paying out a relentless reward to every majority-compliant voter, the sport is structured to have a relentless whole payoff, adjusting particular person payoffs to perform this objective is required. In such conditions, from a collective-rationality standpoint it’s certainly the case that the group earns a highest revenue by having 49% of its members vote B to say the attacker’s reward and 51% vote A to verify the attacker’s reward is paid out.

    Nonetheless, this strategy itself suffers from the flaw that, if the attacker’s bribe is excessive sufficient, even from there one can defect. The basic downside is that given a probabilistic combined technique between A and B, for every the return all the time modifications (nearly) linearly with the chance parameter. Therefore, if, for the person, it makes extra sense to vote for B than for A, it would additionally make extra sense to vote with chance 0.51 for B than with chance 0.49 for B, and voting with chance 1 for B will work even higher.



    Therefore, everybody will defect from the “49% for 1” technique by merely all the time voting for 1, and so 1 will win and the attacker could have succeeded within the costless takeover. The truth that such difficult schemes exist, and are available so near “seeming to work” means that maybe within the close to future some complicated counter-coordination scheme will emerge that truly does work; nevertheless, we have to be ready for the eventuality that no such scheme will likely be developed.

    Additional Penalties

    Given the sheer variety of cryptoeconomic mechanisms that SchellingCoin makes attainable, and the significance of such schemes in practically all purely “trust-free” makes an attempt to forge any sort of hyperlink between the cryptographic world and the true world, this assault poses a possible critical risk – though, as we are going to later see, Schelling schemes as a class are in the end partially salvageable. Nonetheless, what’s extra attention-grabbing is the a lot bigger class of mechanisms that do not look fairly like SchellingCoin at first look, however the truth is have very related units of strengths and weaknesses.

    Significantly, allow us to level to at least one very particular instance: proof of labor. Proof of labor is the truth is a multi-equilibrium recreation in a lot the identical means that Schelling schemes are: if there exist two forks, A and B, then if you happen to mine on the fork that finally ends up profitable you get 25 BTC and if you happen to mine on the fork that finally ends up dropping you get nothing.

    You mine on A You mine on B
    Others mine on A 25 0
    Others mine on B 0 25

    Now, suppose that an attacker launches a double-spend assault towards many events concurrently (this requirement ensures that there is no such thing as a single social gathering with very sturdy incentive to oppose the attacker, opposition as an alternative turning into a public good; alternatively the double spend could possibly be purely an try and crash the worth with the attacker shorting at 10x leverage), and name the “essential” chain A and the attacker’s new double-spend fork B. By default, everybody expects A to win. Nonetheless, the attacker credibly commits to paying out 25.01 BTC to everybody who mines on B if B finally ends up dropping. Therefore, the payoff matrix turns into:

    You mine on A You mine on B
    Others mine on A 25 25.01
    Others mine on B 0 25

    Thus, mining on B is a dominant technique no matter one’s epistemic beliefs, and so everybody mines on B, and so the attacker wins and pays out nothing in any respect. Significantly, word that in proof of labor we would not have deposits, so the extent of bribe required is proportional solely to the mining reward multiplied by the fork size, not the capital price of 51% of all mining gear. Therefore, from a cryptoeconomic safety standpoint, one can in some sense say that proof of labor has nearly no cryptoeconomic safety margin in any respect (if you’re bored with opponents of proof of stake pointing you to this article by Andrew Poelstra, be happy to hyperlink them right here in response). If one is genuinely uncomfortable with the weak subjectivity situation of pure proof of stake, then it follows that the proper answer could maybe be to reinforce proof of labor with hybrid proof of stake by including safety deposits and double-voting-penalties to mining.

    In fact, in apply, proof of labor has survived regardless of this flaw, and certainly it might proceed to outlive for a very long time nonetheless; it might simply be the case that there is a excessive sufficient diploma of altruism that attackers usually are not truly 100% satisfied that they may succeed – however then, if we’re allowed to depend on altruism, naive proof of stake works positive too. Therefore, Schelling schemes too could nicely merely find yourself working in apply, even when they don’t seem to be completely sound in principle.

    The following a part of this publish will talk about the idea of “subjective” mechanisms in additional element, and the way they can be utilized to theoretically get round a few of these issues.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
    CryptoGate
    • Website
    • Pinterest

    Related Posts

    Active Addresses Set New Record

    March 21, 2026

    These Key Ethereum Metrics Point To A Potential Liquidity Trap – What To Know

    March 21, 2026

    Policy Friday #6: SEC and CFTC Declare Most Crypto Assets Are Not Securities — What It Means for Enterprise Ethereum

    March 21, 2026

    XRP, Ethereum, Others Get SEC Shock: Analyst Says $4.7 Trillion Has Been Unlocked

    March 20, 2026
    Add A Comment
    Leave A Reply Cancel Reply

    Top Posts

    Pro-Bitcoin restaurant Steak ‘n Shake announces El Salvador expansion

    November 17, 2025

    The Ethereum Development Process | Ethereum Foundation Blog

    February 1, 2026

    Trader Says All Eyes on One Bitcoin Level After BTC Loses Critical Support Line, Updates Outlook on Cardano and Three Other Altcoins

    August 1, 2025

    Tom Lee Bought $281 Million in Ethereum Crypto: Does He Know Something We Don’t? Will ETH Hit A New High?

    October 19, 2025

    Crypto markets turn bearish with Bitcoin’s 7% slide

    August 21, 2025
    Categories
    • Altcoins
    • Bitcoin News
    • Blockchain
    • Crypto Market Trends
    • Crypto Mining
    • Cryptocurrency
    • Ethereum
    About us

    Welcome to cryptogate.info — your trusted gateway to the latest and most reliable news in the world of cryptocurrency. Whether you’re a seasoned trader, a blockchain enthusiast, or just curious about the future of digital finance, we’re here to keep you informed and ahead of the curve.

    At cryptogate.info, we are passionate about delivering timely, accurate, and insightful updates on everything crypto — from market trends, new coin launches, and regulatory developments to expert analysis and educational content. Our mission is to empower you with knowledge that helps you navigate the fast-paced and ever-evolving crypto landscape with confidence.

    Top Insights

    CME Plans 24/7 Crypto Futures Trading Starting May 29

    February 20, 2026

    Aave active loans hit record $30.5B, commanding 65% of DeFi lending market

    September 19, 2025

    10 Years of Ethereum | Ethereum Foundation Blog

    August 23, 2025
    Categories
    • Altcoins
    • Bitcoin News
    • Blockchain
    • Crypto Market Trends
    • Crypto Mining
    • Cryptocurrency
    • Ethereum
    YouTube
    • Privacy Policy
    • Disclaimer
    • Terms and Conditions
    • Impressum
    • About us
    • Contact us
    Copyright © 2025 CryptoGate All Rights Reserved.

    Type above and press Enter to search. Press Esc to cancel.