Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

>take an average of past block times, compare that with cpu time, and derive a best guess at the current time

But how does that work if the attacker controls your network and prevents you from receiving any blocks newer than the first of april? He can even send you the next (still ancient) block from the blockchain every ten minutes, making everything look legitimate.

If you are cold-starting and have only a vague idea of the date, then you can't defend against this. If you have a sufficiently good idea of the current time that this doesn't impact your threat model, you have already solved your timekeeping problem and don't need the blockchain technique anymore.



Presumably you can corrupt a couple of small networks on which bitcoin nodes are running and that wouldn't disrupt time for the entire chain and clients relying on it...




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: