Advanced Checkpointing released
-
Feathercoin 0.6.4.3 released with Advanced Checkpointing
[ACP Press Release] https://docs.google.com/document/d/1bJsoP3758r19yOsUJeBd-g_WCrQm-CCer3NeDSSqbxU/edit\
Today we are proud to announce the release of Feathercoin with Advanced Checkpointing (ACP). Currently the checkpointing is set to be 5000 blocks behind the current block so it is effectively turned off. Checkpointing will be set to automatically checkpoint the latest block on September 2nd at 09:00UTC. This gives people a chance to update to the latest version before ACP is fully enabled.
Please download the latest client from the link below.
[url=https://www.feathercoin.com/about/index.php#downloads]Feathercoin Software Downloads[/url]Advanced Checkpointing FAQ
What is checkpointing?
Checkpointing was originally built in to Bitcoin in order to prevent dishonest people reversing transactions and taking back the money they had sent. Imagine someone sends you money and you dispatch goods only to find that they have taken the money back out of your account.The basic checkpointing feature in Bitcoin makes sure that the software only connects to the blockchain defined by the developers. This is a safety feature to stop malicious users from trying to force clients on to a different blockchain. The blockchain has all the Bitcoin transactions of Bitcoin written into it. Every block in the blockchain has a unique string of characters called a hash. In the client the checkpoints are defined by providing the block number and its hash, this is then compiled and distributed. Clients will only accept the blockchain that has the corresponding block number and hash defined in the code. Checkpointing offers some protection against attackers but only up to the last checkpoint. So malicious users could try to orphan blocks after the last checkpoint and reverse transactions with 51% attacks.
What is a 51% attack?
As the network is decentralised the blocks that make it into the blockchain need to be agreed upon by the majority of the miners. So if someone has 51% of the network mining power they are able to dictate which blocks get accepted. Typically a 51% attack is used to force the network to accept alternative blocks to ones that have already made it into the chain. The result of this is to make the transactions in the original blockchain disappear. Typical clients will broadcast the transaction again but the attacker will make sure that their transaction disappears. The aim of this sort of attack is typically to reverse transactions. As these attacks orphan the original blocks, pools and miners also find that the coins they mined disappear. The victims of these attacks are the recipient of the attacker’s transaction and the miners whose mined coins from the original blocks will disappear.What is Advanced Checkpointing?
Advanced Checkpointing allows us to send out checkpoints without having to redistribute the Feathercoin software. This works by having a ‘master node’ which checkpoints each block it sees on the network protecting it from the attacker. This checkpoint is then picked up by all the other clients on the network which will then ignore any blocks generated by a 51% attack. This protects merchants from transaction reversal and miners from losing their newly minted coins. With Advanced Checkpointing, Feathercoin becomes the most secure of all the Scrypt cryptographic currencies.Why doesn’t Bitcoin or Litecoin have this protection?
51% attacks have generally been theoretical and in the past they have only happened a handful of times to newly born coins. However it appears that the cryptocoin landscape is becoming increasingly hostile as people invest in larger and more expensive mining farms and have access to large mining pools. The attacks that were theoretical are now becoming commonplace to coins which do not have a large amount of hash power.Bitcoin and Litecoin have never been subjected to successful 51% attacks as their hashpower has so far been too great for the attackers to target. It would seem that as they have not suffered from these attacks then it is not a problem for them but we believe this complacency is the biggest threat. It may be true that Bitcoin is safe for now but all crypto currencies should have some concern for this issue as hash power should never be taken for granted. Litecoin could well find itself subject to such attacks especially as Scrypt hash power is becoming increasingly mobile with the advent of multipools which switch their miner’s hashpower to the most profitable coins at the time.
Feathercoin in the past has been subjected to 51% attacks and even though we have enough hash power at the moment to thwart these attacks, that does not mean that the attackers will not have the resources to attack us again in the future. In fact it could be seen as irresponsible if Feathercoin did not come up with some kind of protection against these attacks as our hash power may drop or the attackers may get greater resources.
Is this a centralised solution?
ACP is a form of centralisation that we have put in place because we believe security comes first. Attacks on this new breed of crypto currencies are on the rise with the attackers becoming more and more resourceful. We are the first Scrypt based coin to respond to this threat by recruiting the best minds in this domain to ensure everyone is protected even those who engage in speculative mining and to whom we owe a debt of gratitude for their patience and understanding.How will Feathercoin continue to innovate to ensure security and decentralisation?
This is the hard work that needs to be done and we will continue to listen to our community and innovate on the design and implementation of the ACP. We believe that Feathercoin should be powered by the community.This is a form of centralisation as the checkpoint master node is deployed and maintained by the lead developer Peter Bushnell. Currently no other person has access to this system but it is planned to make the checkpointing system distributed over time. Distributing this system would allow several stakeholders like mining pools to have a vote on which block gets checkpointed. The controls in the system are very limited and only allow the developer to change the depth at which the blocks are checkpointed. This is an automated process and there is no facility to pick and choose which blocks get checkpointed.
-
Wow! ACP is here ;) good work!!
-
excellent news!
-
Keep up the great work
-
Now we wait for the difficulty target calc change. ;)
-
Might be that the diff will even out with ACP and popularity increase, hooooopefully.
If not that should be a focus.As of now, bring out the champagne! ACP has arived! ;D
-
nice work! Didn’t know you were already done with it :).
Guide to update client: [url=http://forum.feathercoin.com/index.php?topic=2702]click![/url]
-
Thanks Bushstar ;)
-
Nicely done! Grattis!
-
[quote name=“erk” post=“26417” timestamp=“1377632071”]
Did you take the opportunity to fix the slow diff adjustment problem that gave the 51% attackers the time to do their attacks in the first place?
[/quote]This is not a hard fork but will give us protection for when we do hard forks :)
So we get ACP enabled real time and then tone down the 41.4% adjust which is way to wild to hit in each direction every time. We can now firmly get ourselves back on track.
-
[quote name=“Bushstar” post=“26418” timestamp=“1377633912”]
[quote author=erk link=topic=3438.msg26417#msg26417 date=1377632071]
Did you take the opportunity to fix the slow diff adjustment problem that gave the 51% attackers the time to do their attacks in the first place?
[/quote]This is not a hard fork but will give us protection for when we do hard forks :)
So we get ACP enabled real time and then tone down the 41.4% adjust which is way to wild to hit in each direction every time. We can now firmly get ourselves back on track.
[/quote]Thanks so much for you effort bushstar.
Awesome job 8) -
[quote name=“erk” post=“26417” timestamp=“1377632071”]
Did you take the opportunity to fix the slow diff adjustment problem that gave the 51% attackers the time to do their attacks in the first place?
[/quote]That’s coming next.
-
[quote name=“Bushstar” post=“26405” timestamp=“1377621353”]
… the checkpoint master node is deployed and maintained by the lead developer Peter Bushnell. Currently [color=red][b]no other person has access[/b][/color] to this system …
[/quote]Ugh … did a decentralized p2p digital currency just became centralized? Not sure how the (Bitcoin/Litecoin) community will react on this.
Bushstar, what happens if some crooks kidnap you and threaten to cut of your fingers if you don’t checkpoint [i]their[/i] blocks.
What happens if you lapse into a coma, die, loose your mind?
What happens if your system gets compromised?
Single point of failure -> not good.
-
Well done! :)
-
[quote name=“Radacoin” post=“26434” timestamp=“1377641834”]
[quote author=Bushstar link=topic=3438.msg26405#msg26405 date=1377621353]
… the checkpoint master node is deployed and maintained by the lead developer Peter Bushnell. Currently [color=red][b]no other person has access[/b][/color] to this system …
[/quote]Ugh … did a decentralized p2p digital currency just became centralized? Not sure how the (Bitcoin/Litecoin) community will react on this.
Bushstar, what happens if some crooks kidnap you and threaten to cut of your fingers if you don’t checkpoint [i]their[/i] blocks.
What happens if you lapse into a coma, die, loose your mind?
What happens if your system gets compromised?
Single point of failure -> not good.
[/quote]We’re working on this and we want your input.
-
[quote name=“Radacoin” post=“26434” timestamp=“1377641834”]
[quote author=Bushstar link=topic=3438.msg26405#msg26405 date=1377621353]
… the checkpoint master node is deployed and maintained by the lead developer Peter Bushnell. Currently [color=red][b]no other person has access[/b][/color] to this system …
[/quote]Ugh … did a decentralized p2p digital currency just became centralized? Not sure how the (Bitcoin/Litecoin) community will react on this.
Bushstar, what happens if some crooks kidnap you and threaten to cut of your fingers if you don’t checkpoint [i]their[/i] blocks.
What happens if you lapse into a coma, die, loose your mind?
What happens if your system gets compromised?
Single point of failure -> not good.
[/quote]Bush answers some of those concerns right here:
http://bitcoinmagazine.com/6263/feathercoin-interview-with-peter-bushnell/
It’s a good starting point, you have some great questions.
-
Congrats. :)
-
How I reacted initially … [img]http://www.reactiongifs.com/wp-content/uploads/2012/11/not_having_it.gif[/img]
How I’m dealing with it now … [img]http://www.reactiongifs.com/wp-content/uploads/2013/02/just-hug-it-out.gif[/img]
How I hope it ends … [img]http://www.reactiongifs.com/wp-content/uploads/2013/08/the-brain-likes.gif[/img] -
Gangsters can kidnap me and chop my fingers off but I would not be able to checkpoint their blocks. That would be an unpleasant misunderstanding. The only control I have in the software is how deep the checkpoint is. I cannot remove existing checkpoints in the system.
-
[quote name=“Bushstar” post=“26451” timestamp=“1377676845”]
Gangsters can kidnap me and chop my fingers off but I would not be able to checkpoint their blocks. That would be an unpleasant misunderstanding. The only control I have in the software is how deep the checkpoint is. I cannot remove existing checkpoints in the system.
[/quote]for remove it’s absolutely true.
for checkpointing other blocks, unfortunately that is true only with unmodified code in real network. You have the private key to checkpoint, this is what in fact can make a checkpoint. so a modified or isolated checkpointer can checkpoint any block [b]after[/b] the last checkpointed block. So it can not checkpoint some block in a chain(not seen because it’s isolated or ignore via code change) and then checkpoint another chain block orphaning the first chain without checkpoint (i’m not sure what would happen if checkpoint on both conficting chain would be send. )