Practice Sheet for Consensus Attacks
Question 1:
Explain the concept of a 51% attack and how it can be used to manipulate the Bitcoin network?
Question 2:
What is a Finney attack and how is it different from a Double-Spend attack? Mention any assumptions that are required for a Finney attack to be successful.
Question 3:
Explain the concept of a Selfish Mining attack and why it is considered a threat to the Bitcoin network?
Question 4:
Describe the process of a Sybil attack and how it can be used to manipulate the Bitcoin network?
Question 5:
What is the 51% attack threshold and why is it important to the security of the Bitcoin network?
Question 6:
How can a Race Attack be used to harm the Bitcoin network? Explain the steps involved in executing a Race Attack.
Question 7:
Explain the principle behind a Timejacking attack and how it can be used to manipulate the Bitcoin network?
Question 8:
What is the difference between a Routing attack and a Pseudo-routing attack? Give examples of each.
Question 9:
What is the 40% attack vulnerability and how can it be used to attack the Bitcoin network?
Question 10:
Discuss the differences between a DDoS attack and a DoS attack in the context of Bitcoin network security. Mention any best practices for mitigating these types of attacks.
Question 11:
How can a Transaction Malleability attack be used to harm the Bitcoin network? Discuss any preventive measures that can be taken to mitigate the risks associated with this type of attack.
Question 12:
Explain the difference between a Double-Spend attack and a Finney attack. Mention any assumptions that are required for a Double-Spend attack to be successful.
Question 13:
What is the principle behind a Eclipse attack and how can it be used to manipulate the Bitcoin network?
Question 14:
What is the role of Conflicting Transactions in the context of a Bitcoin consensus attack? How can such transactions be used to manipulate the Bitcoin network?
Question 15:
Explain the concept of a Poisoning attack and how it can be used to compromise the security of the Bitcoin network?