The Distributed
  • Cryptocurrencies
    • Adoption
    • Altcoins
    • Bitcoin
    • Blockchain
    • Business
    • Decentralized Finance
    • Ethereum
    • Hacks
    • Crypto Markets
    • NFTs
    • Regulation
    • Scams
    • Stablecoins
  • Finance
    • Banking
    • Central Banks
    • Financial Markets
  • Technology
    • Artificial Intelligence
    • Cyber Security
    • Metaverse
    • Web3
  • Tools
    • Cryptocurrency Market
    • Stock Market
    • Economic Calendar
  • Archive
No Result
View All Result
The Distributed
  • Cryptocurrencies
    • Adoption
    • Altcoins
    • Bitcoin
    • Blockchain
    • Business
    • Decentralized Finance
    • Ethereum
    • Hacks
    • Crypto Markets
    • NFTs
    • Regulation
    • Scams
    • Stablecoins
  • Finance
    • Banking
    • Central Banks
    • Financial Markets
  • Technology
    • Artificial Intelligence
    • Cyber Security
    • Metaverse
    • Web3
  • Tools
    • Cryptocurrency Market
    • Stock Market
    • Economic Calendar
  • Archive
No Result
View All Result
The Distributed
No Result
View All Result
Home Learn The Technology

51% Attack Definition

by The Distributed Team
February 15, 2022 - Updated on June 2, 2022
in The Technology
hacker performing a 51% attack on a blockchain

A 51% attack is a potential attack where a person or group gains a majority of a blockchains hashing power to control the network and its ledger.

How Does A 51% Attack Work?

Whenever a cryptocurrency exchange happens, the transactions are stored within a block and every couple of seconds or minutes this block is validated by a consensus of nodes or computers attached to the said network. A block is only added to the chain after it has been validated.

The blockchain contains a record of all exchanges that anybody can view at any time, known as a distributed ledger. This arrangement of record-keeping is decentralized, meaning no single individual or group has control over it.

But when a majority, or more than 51%, of hashing power is controlled by a single entity the network is disrupted.

The attackers would control the network meaning they’d be able to prevent some or all transactions from being confirmed, reverse completed transactions allowing double-spending coins, and prevent some miners from mining (through a mining monopoly).[1]https://academy.binance.com/en/articles/what-is-a-51-percent-attack

References[+]

References
↑1 https://academy.binance.com/en/articles/what-is-a-51-percent-attack
Tags: 51% AttackBlockchainConsensusHashrate

Most Read

The Technology

51% Attack Definition

February 15, 2022 - Updated on June 2, 2022
Cryptocurrencies

Highly Anticipated Ripple Stablecoin RLUSD Launches On December 17

December 19, 2024
Research

Cryptocurrency Statistics And Insights (2022)

October 22, 2022 - Updated on November 4, 2022
Artificial Intelligence

Breaking Down Meta’s Inaugural LlamaCon 2025

May 18, 2025
Banking

StanChart Creates US-Based Team To Boost Private Equity And Hedge Fund Coverage

May 18, 2025

Subscribe To Our Newsletter

By subscribing, you agree with our privacy and terms.

Follow The Distributed

Twitter Instagram Youtube LinkedIn Facebook RSS
ADVERTISEMENT
The Distributed

  • About The Distributed
  • Terms
  • Contact
  • Privacy
  • Editorial
  • Careers
  • RSS Feed

© 2023 The Distributed

No Result
View All Result
  • Cryptocurrencies
    • Adoption
    • Altcoins
    • Bitcoin
    • Blockchain
    • Business
    • Decentralized Finance
    • Ethereum
    • Hacks
    • Crypto Markets
    • NFTs
    • Regulation
    • Scams
    • Stablecoins
  • Finance
    • Banking
    • Central Banks
    • Financial Markets
  • Technology
    • Artificial Intelligence
    • Cyber Security
    • Metaverse
    • Web3
  • Learn
    • The Coins
    • The Future
    • The Innovations
    • The Technology
  • Tools
    • Cryptocurrency Market
    • Stock Market
    • Economic Calendar
  • Research
  • Reviews
    • Exchanges
    • Wallets
  • Headlines
  • About Us
  • Contact Us

© 2023 The Distributed

This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.