The Good Tech Companies - When Miners and Validators Go Rogue: Some Bad Cases

Episode Date: November 4, 2025

This story was originally published on HackerNoon at: https://hackernoon.com/when-miners-and-validators-go-rogue-some-bad-cases. When miners or validators go rogue, bloc...kchains can face takeovers and attacks. Let's see some bad cases about this. Check more stories related to web3 at: https://hackernoon.com/c/web3. You can also check exclusive content about #crypto-mining, #crypto-staking, #51-percent-attack, #crypto-attacks, #steemit, #obyte, #ethereum-classic, #good-company, and more. This story was written by: @obyte. Learn more about this writer by checking @obyte's about page, and for more stories, please visit hackernoon.com. Most distributed ledgers have some middlemen, especially as miners and “validators,” and they can go rogue, sometimes. This means they can do a certain number of things against freedom and fairness, including double-spending funds or completely destroying a network, in the worst scenarios.

Transcript
Discussion (0)
Starting point is 00:00:00 This audio is presented by Hacker Noon, where anyone can learn anything about any technology. When miners and validators go rogue, some bad cases, by Obite. Crypto networks promote themselves as decentralized and in our heads, that could be equated to unstoppable, uncensurable, and free, as in freedom. However, that's not always the case. In reality, most distributed ledgers have some middlemen, especially as miners and validators, and they can go rogue sometimes. This means they can do a certain number of things against freedom and fairness, including double
Starting point is 00:00:34 spending funds or completely destroying a network, in the worst scenarios. It's not always that miners and validators act in bad faith, as they are rewarded to benefit the entire network and or punished if they act maliciously. But it can happen because the system, if it's designed like that, obeys the majority of them. Let's see how this would work and some bad cases we've already seen in the past. what going rogue looks like. To understand what going rogue means, you need a quick refresher on how different chains secure themselves. In proof of work, POW networks like Bitcoin or Zcash, miners compete by solving complex math puzzles. The winner adds a new block of transactions to the chain and gets
Starting point is 00:01:15 rewarded. This process keeps the network honest, but it has a catch. If someone controls more than half the total mining power, they can reorganize blocks, double spend, or censor transactions. That's what's called a 51% attack. Smaller networks are more at risk because their total hash power is lower, sorenting or aggregating enough computing power becomes affordable. Some of the smaller chains around can be attacked for even $0 per hour, whereas attacking Bitcoin costs millions because its mining power is huge. Proof of state, POS, chains, like Ethereum and Solana, replace miners with validators,
Starting point is 00:01:52 in reality, approvers, as they have the power to reject perfectly validates. valid transactions. Instead of burning electricity on puzzles, validators, stake, their tokens for the right to confirm transactions. The more tokens you stake, the more influence you have. This saves energy, but it introduces a new problem. If big players control enough state, they can't elude to censor or stall the network, or just individual transactions that their governments don't like. And since validators are often concentrated in certain providers or exchanges, power can end up in fewer hands than you'd expect. Operational failures, bugs, or centralized control of validator nodes ALS account.
Starting point is 00:02:32 For you, as an average user, that means even when you use a chain that's supposed to be validator run, its security depends heavily on how decentralized, transparent, and independent the validators are. Bitcoin Gold, the first bad case of our list is here. Bitcoin Gold, BTG, was born to give GPU miners a chance instead of limiting rewards to azic miners. In other words, it removed the need to invest in costly hardware just to mine coins. That looked fair, but fairness didn't protect it. In 2018 and 2020, Bitcoin gold was hit by 51% attacks where malicious miners rented hash power, took control, reorganized blocks,
Starting point is 00:03:12 diverted coins, and double spent coins. Exchanges lost funds. Users who believed their transactions were final woke up to vanishings. Because the network had relatively low hash attackers could mount such attacks at modest cost compared to the states involved. That exposed the risk smaller POW network's face. When computing power or ITS cost is low, damage becomes affordable for bad actors. Participating in or holding such coins means accepting longer confirmation weights, risk of loss, or checking whether the network has enough economic weight to deter attacks. Ethereum Classic, Ethereum Classic, etc., went from being a philosophical experiment in Code Isla,
Starting point is 00:03:53 to being tested seriously by hostile actors between 2019 and 2020. It suffered multiple 51% attacks, with malicious miners reorganizing thousands of blocks and double spending millions of dollars worth of etc. In 2020, the attacker reportedly moved about 807,260 etc., around $5.6 million, using rented hash power from Nice Hash, then used that control to reverse blocks and redirect funds through accounts under their control. Exchanges and services were hit hard. Some halted withdrawals and deposits, raised the number of confirmations required, and froze operations. Developersand the etc. team reacted by proposing multiple countermeasures. These included defensive mining
Starting point is 00:04:37 cooperation to keep hash power stable, monitoring tools, proposals to limit how deep reorganizations could go, reorg caps, and pushing for community and exchange participation in securing the chain. etc. was a reminder for all of us that even long-running chains with real users and devs can suffer serious trust-breaking events if hash power drops, attackers rent power, or exchanges don't enforce long confirmation windows. Luckily, they solved this issue by implementing a modified version of their consensus algorithm, boosting security against 51% attacks. Since then, its hash rate has been steadily increasing. Steam versus Hive, back in 2020, one of the most dramatic crypto-showed unfolded between the Steam community and Justin Sun. Sun, known for running the Tron network,
Starting point is 00:05:25 bought Steam It Inc. The company that had developed the Steam blockchain's main platform, what seemed like a lifeline for the struggling company quickly turned sour for the wider community. The conflict erupted over the so-called Ninja Mind stake, a massive stash off tokens meant for Steam's development. Steam users voted to freeze it then, fearing Sun would use it for personal profit. Sun fired back, accusing them of hacking his legally owned property. Things escalated fast. Sun allegedly rallied exchanges like Binance and Huobi, which used customer deposits to vote out Steam's original witnesses. With Sun's validators in full control, community members saw it as a blatant hostile takeover, proof that delegated proof of state, the consensus algorithm used
Starting point is 00:06:10 by Steam, could be gamed when a few big players teamed up. The community refused to back down, March 20th 2020, they cloned the Network Kinto Hive, offering a one-to-one balance to steamholders, but excluding the ninja mine stake now in Sun's hands. A big part of the former steamit community moved to this new chain. Tornado Cash and Ethereum, when Tornado Cash was sanctioned by the U.S. government in 2022, it exposed how fragile Ethereum's decentralization could be. The Privacy Mixers founders were accused of enabling money laundering, but the bigger shock came when some Ethereum validators began refusing tornado cash transactions. Validators are supposed to create blocks. That's why the quotes, they are doing more than just validating that the
Starting point is 00:06:56 transactions follow the network's rules and keep the network neutral, yet many chose to censor. What began as a legal issue quickly turned into a test of how much outside pressure Ethereum gold handle without betraying its ideals of openness and neutrality. Ethereum's structure gives builders, relayers, and proposers the power to decide what gets processed. Once the OFAC blacklist appeared, about half of validators, started avoiding tornado cash activity while still building on blocks that included it. That fragile balance keeps the network running, but it shows how dependent Ethereum has become on regulated intermediaries. If, validators, stop building on those blocks entirely, tornado cash could vanish from Ethereum. It's a warning that real decentralization can't depend
Starting point is 00:07:42 on middlemen who choose which transactions deserve to exist beyond miners and validators. So, where does that leave us? If miners can overpower small proof of workchains and validators can team up or be manipulated by big players, is there any safer ground? Some networks are experimenting with approaches that don't rely on miners or validators at all. Obite is one of them. Instead of a blockchain, it uses a directed acyclic graph, DAG, model and order providers, ops rather than minors are validator, committees dominating block production. Transactions are confirmed through no to participation in the DAG, not through major middlemen pulling levers of power. That means only users are in charge of adding their own transactions, and once added,
Starting point is 00:08:27 they can't be modified or deleted by anyone. Meanwhile, ops only issue waypoints to order transactions, and they don't hold any other power to control the network. A set of 12 public and reputable op-scan be voted on-chained by G-BY-T-E holders and even be replaced by voters at any given moment. This way, the network is truly in the hands of the community, and T-H-E risk of a hostile takeover is minimal. Remember, when you choose networks to trust or transact on, check how governance works, who controls token stake or voting power, past conflicts among validators, and whether alternatives might serve you better. Featured Vector Image by Freepick Thank You for listening to this Hackernoon story, read by artificial intelligence.
Starting point is 00:09:10 Visit hackernoon.com to read, write, learn and publish.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.