Author

Topic: BEWARE! Predatorcoins: A new breed of crypto currency (Read 992 times)

legendary
Activity: 1022
Merit: 1000
Hello, I have been mining cryptocurrencies on my desktop computer for about month now and have a few miscellaneous questions that I have not been able to find the answer to.  Here is one theoretical question I have.

What kind of threat do cryptocurrencies pose to one another?  Could a cryptocurrency use its miners to hijack another cryptocurrency without compromising its own security?  Here is the simplest example I can think of that might do this.

Let’s assume a new cryptocurrency named Gazelle Coin is released into the wild and receives a modest reception from the public.  Shortly after its release a variant of Gazelle Coin named Lion Coin is released.  Lion Coin uses the same rules for its ledger as Gazelle Coin, but has some arbitrary additional rule (perhaps public keys cannot start with a certain character).  This makes Lion Coin’s ledger compatible with Gazelle Coin’s, but Gazelle Coin’s ledger is incompatible with Lion Coin’s.  In addition Lion Coin broadcasts its ledger as both a Lion Coin ledger and a Gazelle Coin ledger.

Since Lion Coin was released after Gazelle Coin, its block chain starts off smaller than Gazelle Coin, so broadcasting its ledger has no initial effect on Gazelle Coin.   As Lion Coin grows in popularity its block chain eventually becomes longer than Gazelle Coin and Gazelle Coin automatically adopts the new longer block chain.  This shifts ownership of Gazelle Coins from their previous owners to the owners of Lion Coins.

Is this scenario realistic?  If not, what would prevent this from happening?


another thread: https://bitcointalksearch.org/topic/predatory-cryptocurrencies-411111
legendary
Activity: 1022
Merit: 1000



In nature there are peace loving coins that like to climb high rising merkle trees and graze on lush blockchains. And then..there are the other coins, those that lurk in the dark, circle the warm pools of hash and wait for their moment to strike and kill unsuspecting altcoins out of nowhere.

This is a tale of a new breed of chains that could very well take over large parts of todays hash power and feed on the money supply of defenseless coins out there, multiplying, breeding.

Here is where they live and how they hunt:

A predatory chain comes along with the basic equipment to survive in the wild, with hash pools, blockchains and basic transaction types and decentralized, open source code architecture. Now where they are different from others is where it gets interesting: instead of trying to acquire a larger user base, issuance of new coins, hash power or market share, they actively try to interact and dominate other protocols where ever a vulnerability presents itself. Like botnets or viruses they infiltrate a victims computer to install on it's system using it's hash power to secure it's own network. If another instance of crypto currency is detected on the infected machine, the predatory coin gains control of the priv. keys and 'devours' all coins associated with it. Instead of just sending them off to a distant controller, the coins are terminally destroyed by sending them to a terminator address (addresses with provably unspendable outputs). Coins destroyed that way are then replaced by an amount equal in value to the coins destroyed on the infected machine, thus reproducing and spreading to the victims computer, where they are stored in a newly downloaded and installed instance of the Predator Coin client, thus putting the coins in it's possession and command. The transaction hash of the termination transaction serves as proof of burn in order to justify the creation of new coins within the Predator blockchain. As soon as the victim discovers his old coins gone, he will be notified of what has happened and advised on the value and use of his new predatory coins, which he can freely trade on public exchanges or help to spread among his peers, thus raising the value of his own stake, knowing that he is now behind the sharp end of the dagger.
Another way to prey on the activities of the crypto zoo is by hijacking hashing power from pools and solo miners, diverting their power towards the creation of Predator Coins instead of Prey coins, putting them into charge of their corrupted mining efforts and letting them hold on to their carnivorous coins instead.

To maintain its thieving life style predatory coins have to be very adaptive to foreign protocols and to be maintained constantly in order to exploit changing vulnerabilities of their prey. They utilize POW as well as POS to function independently of their hunting success and at the same time provide the option to create new coins by capturing the mining efforts of miners, thus increasing their (unvoluntary) user base and increasing total money supply.

By capturing unguarded systems and preying on the many remaining wallets of long forgotten altchains that have fallen out of favour by their users, replacing them with a new and exciting alternative but also devouring precious coins of active users, they create a huge awareness and marketing effort. Prooving the viability of their concept the value to their share holders will skyrocket and at the same time improve security of the whole crypto currency eco system.

Have you seen one of them in the wild yet!?
Jump to: