Search ForexCrunch
  • BTC.com and BTC.top performed 51% attack to reverse malicious transactions.
  • Several members of the community are not happy with their actions.

Two bitcoin cash mining pools BTC.com and BTC.top combined their hash rates to perform a 51 percent attack on the blockchain to reverse a malicious miner’s transactions. While their intentions were not “evil,” their actions have been criticized widely in the community. As one bitcoin cash developer, going by “Kiarahpromises,” wrote:

“To coordinate a reorg to revert unknown’s transactions. This is a 51% attack. The absolutely worst attack possible. It’s there in the whitepaper. What about (miner and developer) decentralized and uncensorable cash? Only when convenient?”

Some, like BCH supporter Jonathan Silverblood, have supported the actions. As Silverblood puts it:

“This is a very unfortunate situation, but it is also what proof of work actually is. The miners in this case did choose to drop prohashes block and from what I heard, it is because they deemed a transaction within it to have been invalid.”

The attack

Bitcoin podcast host, Guy Swann, explained the inner workings of the original attack that prompted this action. He Tweeted:

“Since the original split in 2017, there has been a significant number of coins accidentally sent to ‘anyone can spend’ addresses (due to [transaction]compatibility of sigs, but no #SegWit on #BCH), or possibly they’ve been replayed from #Bitcoin onto the #BCH network.

When the unknown miner tried to take the coins themselves, [BTC.top and BTC.com] saw & immediately decided to re-organize and remove these [transactions], in favor of their own [transactions], spending the same P2SH coins, [and]many others.”