Paper 2021/1282

On the Claims of Weak Block Synchronization in Bitcoin

Seungjin Baek, Hocheol Nam, Yongwoo Oh, Muoi Tran, and Min Suk Kang

Abstract

Recent Bitcoin attacks [CCS'21, CCS'21, ICDCS'19] commonly exploit the phenomenon of so-called weak block synchronization in Bitcoin. The attacks use two independently-operated Bitcoin monitors — i.e., Bitnodes and a system of customized supernodes — to confirm that block propagation in Bitcoin is surprisingly slow. In particular, Bitnodes constantly reports that around 30% of nodes are 3 blocks (or more) behind the blockchain tip and the supernodes show that on average more than 60% of nodes do not receive the latest block even after waiting for 10 minutes. In this paper, we carefully re-evaluate these controversial claims with our own experiments in the live Bitcoin network and show that block propagation in Bitcoin is, in fact, fast enough (e.g., most peers we monitor receive new blocks in about 4 seconds) for its safety property. We identify several limitations and bugs of the two monitors, which have led to these inaccurate claims about the Bitcoin block synchronization. We finally ask several open-ended questions regarding the technical and ethical issues around monitoring blockchain networks.

Metadata
Available format(s)
PDF
Category
Applications
Publication info
Preprint.
Keywords
Blockchainpeer-to-peer network
Contact author(s)
minsukk @ kaist ac kr
History
2021-09-24: received
Short URL
https://ia.cr/2021/1282
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2021/1282,
      author = {Seungjin Baek and Hocheol Nam and Yongwoo Oh and Muoi Tran and Min Suk Kang},
      title = {On the Claims of Weak Block Synchronization in Bitcoin},
      howpublished = {Cryptology {ePrint} Archive, Paper 2021/1282},
      year = {2021},
      url = {https://eprint.iacr.org/2021/1282}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.