- The Breakdown
- Posts
- šŖ Thursday attacking mailbag
šŖ Thursday attacking mailbag
Q: What would it cost me to break Ethereum?

Brought to you by:
āDavid: Is this a game or is it real?
WOPR: Whatās the difference?ā
ā WarGames

Thursday attacking mailbag
Q: What would it cost me to break Ethereum?
$376!
On average, according to a paper recently published by a team of academics who appear to enjoy breaking things (but in the case of Ethereum, only on testnet).
Sometimes you could even do it for $0.
The cost would vary, and youād only break it for 12 seconds, but thatās how little it might take to execute a denial-of-service attack that would force Ethereum to produce an empty or compromised block.
Q: How does that work?
Youāll have to read the paper for a proper explanation ā or better yet, attend next weekās presentation of the paper at the Princeton DeCenter, where āno prior knowledge of the subjectā will be required to learn about how to break Ethereum.
But my no-prior-knowledge understanding is that thereās a structural flaw in Ethereumās design that makes it unusually vulnerable to inexpensive DoS attacks.
The paper details three separate attack strategies, but the commonality appears to be that because fees are only charged on transactions that are included in blocks, an attacker can force block producers to do expensive computations that ultimately get thrown out and leave the block they produce empty or compromised.
āAdversaries can craft malicious transactions that decouple the work imposed on blockchain actors from the compensation offered in return,ā as the paper puts it.
By making everyone do work without paying anything in fees, an attacker could force the Ethereum network to grind to a halt.
Q: Why would someone do that?
Same reason why anyone does anything in crypto ā to make money.
(I kid. Sort of.)
More specifically, the most likely motivation would be to force a liquidation event and then stop people from bidding on the collateral that comes for sale ā if youāre the only one who can get a transaction into a block, youād presumably be able to scoop the collateral at artificially low prices.
Q: Why hasnāt it happened already?
Iām not sure.
I asked one of the paperās authors, Aviv Zohar, how profitable these strategies might be. He guesstimated that a malicious attacker could make hundreds of millions of dollars from them.
(Thereās no science behind that, he was simply guessing based on how profitable other, unrelated attack strategies have been.)
Thatās a lot of money, even by crypto hacking standards, so itās not clear to me why someone hasnāt tried it yet.
Perhaps itās because thereās lower-hanging fruit to be had or because if you donāt do it correctly, you might end up paying much more than the average cost without reaping any ill-gotten gains.
Flash loan attacks are earlier and safer, Iām told.
It might also be because a profit-making DoS attack would probably be illegal (market manipulation, I think).
Or it might just be that the paper hasnāt been translated into the North Korean language yet.
I don't know.
Q: Maybe crypto is a less adversarial place than it seems?
Thatās the most hopeful explanation, yes ā and it might even be correct.
Aviv Zohar told me that researchers are aware of many theoretical crypto attacks that never get executed.
Zohar himself found an attack on the Lightning Network that he expects would make money āpretty much for sureā ā but even after publishing a paper explaining how to execute it way back in 2020, no oneās ever tried it.
Vulnerabilities in Bitcoin itself that have been known for even longer have also gone untested.
So maybe there just arenāt as many bad actors in crypto as everyone seems to think.
Still, though, if nothing else, Iām surprised a Solana partisan hasnāt yet DoSād Ethereum just to stop their frenemies from trolling them when Solana occasionally goes down.
Less than 3 SOL to shut them up seems like a bargain.
Q: What would the price of ETH do?
The long history of attacks on other layer-1 blockchains shows that token prices donāt necessarily go down when a chain does, so maybe not ā and the authors of the paper I spoke to didnāt seem to think empty Ethereum blocks would be particularly damaging for ETH.
But seeing as one of Ethereum's best selling points is that it never goes down, I would guess thereās considerable risk for ETH the first time it does (if it does).
Temporarily, at least.
Q: So, this isnāt an existential threat to Ethereum?
Aviv Zohar assures me itās not: āEthereum would evolve around it.ā
The biggest risk, he says, is to the ā80% of validators that are censoring.ā
Q: Whatās censoring have to do with it?
The easiest of the three attacks described in the paper takes advantage of the US sanctions list that most validators abide by.
Attackers can force validators to run computationally expensive operations to build a block without knowing that a sanctioned address is involved ā they spend the money to run the operation only to find out they canāt include it in a block because of the sanctioned address ā and therefore canāt get paid for it.
Another factor is that Ethereumās new-ish separation of proposers and builders also makes these attacks easier ā separating those roles means an attacker can more easily trick people into processing transactions that look valid to them but are not valid to others.
The bigger picture, though, is that the paperās findings suggest allowing censorship on a Turing-complete blockchain like Ethereum introduces new attack vectors.
With the caveat that he has āno formal proof,ā Aviv Zohar told me that itās ānot so simple to do both censorship and general computation.ā
So maybe we shouldnāt?
Q: Is this just an Ethereum problem?
The DoS paper only describes attacks on Ethereum, but I think it would apply to any blockchain where transactions are sequenced and transactions are processed before execution (which might be all of them?)
Ethereum layer-two blockchains are certainly susceptible, but Zohar told me the team did not test that because the code for those chains is not all public source.
So, the only way to run a simulation would be to run a real attack.
WOPR might not see the difference, but letās hope we donāt find out.
ā Byron Gilliam
Catch your favorite newsletter author (Byron, of course!) IRL at Permissionless as he draws insights out of the greatest investment minds in the liquid token market.

Atlas: Combining TradFi Performance with DeFi Transparency

Frankie from Paradigm and Eugene from Ellipsis Labs discuss why Atlas is using the SVM to build an Ethereum L2. They talk design decisions made along the way and Atlasā approach to handling MEV.
Blockworks Research is conducting a survey to gain insight into the institutional staking landscape. This data will help industry leaders adopt their strategies as the industry matures.
If you're an institutional staker, we want to hear from you (and if youāre new to Blockworks Research, get 20% off of our service while youāre at it!)

19 benefits of Bitcoin that most people have never heard about...
Note: these are not hypothetical, or isolated benefits - but existing uses that are currently impacting an exponentially growing set of people
Humanitarian benefits
1. Getting aid to millions of war refugees⦠x.com/i/web/status/1ā¦
ā Daniel Batten (@DSBatten)
2:30 PM ⢠Sep 11, 2024
I take this seriously. Starting next year, I plan to only publicly mention (in blogs, talks, etc) L2s that are stage 1+, with *maybe a short grace period* for new genuinely interesting projects.
It doesn't matter if I invested, or if you're my friend; stage 1 or bust.
Multiple⦠x.com/i/web/status/1ā¦
ā vitalik.eth (@VitalikButerin)
2:46 AM ⢠Sep 12, 2024
An RIA just confirmed theyāre adding 6% crypto ETFs to their model portfolios: 4% Bitcoin and 2% Ethereum.
Oh and, they sold the Nasdaq 100 (tech stocks) to buy Ethereum.
ā Ryan Rasmussen (@RasterlyRock)
3:10 PM ⢠Sep 12, 2024