Is ETC 102% Screwed After Second 51% Attack?

Ethereum Classic (ETC) has suffered a second 51% attack in less than one week, bringing the ongoing security of the network into question.

On August 6, Etherchain.org tweeted that its affiliated mining pool Ethermine had disabled ETC pool payouts after more than 4,000 blocks had been reorganized in the latest attack on Ethereum Classic.

It is not known if it is the same hacker or a copycat attack inspired by the first attack. 

ETC’s security called into question

In response to the increasing velocity of 51% attacks targeting Ethereum Classic, Ethereum co-founder Vitalik Buterin tweeted:

“ETC should just switch to proof of stake. Even given its risk-averse culture, at this point making the jump seems lower-risk than not making it.”

Despite the apparent vulnerability of the Ethereum Classic network, ETC is currently trading for $7.05 — a mere 1.5% slide over seven days.

It costs $12K to 51% attack ETC for one hour

Last week’s reorganization attack saw a hacker reap a more than 2,800% return on an investment of $192,000 in rented hash power from NiceHash — with the attacker double-spending 807,260 ETC worth $5.6 million into existence over less than 24 hours.

According to crypto51, 51% attacks can be initiated against Ethereum Classic using rented hash power from NiceHash for just $12,028 per hour, with the platform currently offering up 32% more hashing power than is required to initiate the attack.

Ethereum Classic is among 45 cryptocurrencies that are immediately vulnerable to 51% attacks using only hash power rented from NiceHash. ETC also suffered a 51% attack in early January of 2019.

The original article is located at cointelegraph.com

This content is provided by public RSS feed at cointelegraph.com/rss. Please contact us if you have any questions.