Article count:16428 Read by:87919360

Hottest Technical Articles
Exclusive: A senior executive of NetEase Games was taken away for investigation due to corruption
OPPO is going global, and moving forward
It is reported that Xiaohongshu is testing to directly direct traffic to personal WeChat; Luckin Coffee is reported to enter the US and hit Starbucks with $2, but the official declined to comment; It is reported that JD Pay will be connected to Taobao and Tmall丨E-commerce Morning News
Yu Kai of Horizon Robotics stands at the historical crossroads of China's intelligent driving
Lei Jun: Don't be superstitious about BBA, domestic brands are rising in an all-round way; Big V angrily criticized Porsche 4S store recall "sexy operation": brainless and illegal; Renault returns to China and is building a research and development team
A single sentence from an overseas blogger caused an overseas product to become scrapped instantly. This is a painful lesson. Amazon, Walmart, etc. began to implement a no-return and refund policy. A "civil war" broke out between Temu's semi-hosted and fully-hosted services.
Tmall 3C home appliances double 11 explosion: brands and platforms rush to
Shareholders reveal the inside story of Huayun Data fraud: thousands of official seals were forged, and more than 3 billion yuan was defrauded; Musk was exposed to want 14 mothers and children to live in a secret family estate; Yang Yuanqing said that Lenovo had difficulty recruiting employees when it went overseas in the early days
The app is coming! Robin Li will give a keynote speech on November 12, and the poster reveals a huge amount of information
It is said that Zhong Shanshan asked the packaged water department to sign a "military order" and the entire department would be dismissed if the performance did not meet the standard; Ren Zhengfei said that it is still impossible to say that Huawei has survived; Bilibili reported that employees manipulated the lottery丨Leifeng Morning News
Account Entry

Bloomberg deeply restores The DAO robbery: How hackers cut the hard fork of ETH and ETC

Latest update time:2021-09-01 12:19
    Reads:

300+ star startups, 3000+ industry professionals gathered at the Global Artificial Intelligence and Robotics Summit GAIR 2017 to witness the peak of the AI ​​wave! The ticket rush for the summit is in full swing. Readers have an exclusive ticket giveaway, see the end of the article for details!

Leiphone.com: It has been a year since the DAO attack, which is plenty of time to assess what went wrong. Bloomberg recently published an article that deeply restores this cryptocurrency case. Leiphone.com AI Financial Review compiled.


Summer colds are the worst, and Emin Gün Sirer caught a naughty bug from his 1-year-old son. It was Monday, June 13, 2016, and the Cornell University associate professor of computer science was working from his hospital bed with tears and a stuffy nose. Gün couldn't leave his laptop, he had another bug to fix, and he was worried that a mistake in a line of code could lead to the theft of $250 million.


These codes are not ordinary. They are the core of the latest and most groundbreaking software design in the blockchain industry. This novel combination of decentralized computing and encryption system has given new life to the world of Bitcoin, which was born in 2009. Since its birth, the prospect of blockchain applications in the financial industry and medical industry has begun to capture the imagination of enterprises and governments. And the Turkish-born professor is exploring the next leap of Bitcoin, which is the Ethereum blockchain.


The truth came out


Whereas bitcoins move from one user to another, the Ethereum blockchain can host computer programs called smart contracts — essentially agreements enforced by code rather than courts. That means it could automate the lifecycle of bond payments, for example, or ensure that pharmaceutical companies can verify the provenance of their drugs. Smart contracts are new, however, and like all software, the reliability of the software code depends on it, and Gün was convinced he had discovered a big problem.


In an email to one of his graduate students, Philip Daian, Gün pointed out that the smart contract he was working on might have a problem on line 666. Gün was concerned that hackers could exploit the bug to withdraw millions of dollars without limit, like an ATM.


The funds involved total $400 million, a staggering amount within a decentralized autonomous organization DAO plan. The DAO is a decentralized venture capital fund that runs on the Ethereum blockchain in the form of a smart contract. It is also a for-profit DAO (decentralized autonomous organization) that will use the Ethereum funds under its control to create value for its members by investing in applications on Ethereum. During the creation of The DAO, anyone can send Ethereum to its crowdfunding contract to obtain DAO tokens.


This is the crowdfunding of The DAO. The DAO is not controlled by any person or organization, and members who hold DAO tokens vote on whether to invest in Ethereum applications. This is real money, $400 million, which means that every penny is at risk in order to build a better world.


Gün has been tracking and publicizing flaws in The DAO’s design, and a few weeks ago, on May 27, he and two colleagues urged investors to stop buying into The DAO until the security issues were resolved.


But it’s too late now. Smart contracts like The DAO are built entirely on their code, and once published on the Ethereum blockchain, The DAO’s code cannot be modified. Peter Vessenes, co-founder of the Bitcoin Foundation, also pointed out security flaws in this smart contract, but Gün appears to be the first to clearly point out the dangerous flaws. The problem is that the code is so new that no one knows what problems will occur.


Gün also had doubts. This wasn't even his job, he was just doing it for fun. He and his students were not sure whether the code bug would cause any real problems.


“We don’t sound the alarm every time we find a suspected bug,” Gün said. So he went to bed—to cure his cold.


Four days later, Christoph Jentzsch lay on the floor of his home, taking a deep breath to calm his panic. It was Friday morning, and the DAO Jentzsch had created was under attack.


Gün is right.


The test of digital liberalism


This is the biggest digital heist in history. Last year, hackers stole $81 million from the Bangladesh central bank, but the DAO attack was completely different. There was no way to intervene. Just as the global WannaCry ransomware attack in May exposed weaknesses in computer operating systems, the DAO hack exposed early flaws in smart contract security. The end result was a strange, futuristic war between white hat hackers and black hat hackers around the DAO.


The roots of the DAO came from an idea Jentzsch borrowed from Internet crowdfunding. Jentzsch, 32, is a theoretical physicist whose company, Slock.it, raised money through an ICO. But why should every new startup come up with a plan for its own ICO? Jentzsch thought, why not just offer a little giant fund to invest in them?


He introduced his idea to the world at DevCon 1 in London in November 2015. "What would be the way to create a company?" Jentzsch asked his audience. "Of course, it would have to be a DAO." It would work like this: Ether, a digital currency like Bitcoin, would be used to fund and develop applications, things like using a music app similar to iTunes or iTunes. Investors would buy DAO tokens with ether; the tokens would allow them to vote for the projects they liked. If the projects they supported made money, the token holders shared in the profits.


He created The DAO in six months, and Jentzsch thought The DAO would be able to raise $5 million. From April 30 to May 28, The DAO raised $150 million.


But why would anyone invest in the DAO in the first place? It has to do with the strain of digital libertarianism that is at the heart of the Ethereum community, just like the set of beliefs that led to the creation of Bitcoin: that Bitcoin is the first global currency, and its use cannot be blocked by governments or corporations; on top of that, Bitcoin is nearly impossible to hack. Ethereum is on another level, an uncensorable computer that is unprecedented and a little scary.


Jentzsch, who spent his evenings jogging or rowing by the river, exercised. But on that Friday morning, he had more pressing tasks: getting off the floor and dealing with the attack. “I went into emergency mode: Don’t try to save the DAO,” he said. “No, it’s over.”


It's far from over


Hours later, Alex Van de Sande woke up in his apartment in Rio de Janeiro.


这个娃娃脸的以太币开发者出生在巴西的一个小渔村,在三岁随他的父母搬到里约。他在Reddit和Twitter的以网名“avsa”著称。他的Skype接收到了无数的消息,随后他转身对妻子说:“记得我告诉你的不可能被黑掉的以太坊?”她点了点头。“它已经被黑了。”他告诉她。


His first thought was to get his tokens out of the DAO. He owned about 100,000 tokens, worth about $15,000 at the time. He was the lead designer of the Ethereum Wallet application, which allowed users to interact with the blockchain. Van de Sande hurriedly logged in, but got the password wrong. He tried a few more times, logged in successfully, and his panic subsided. He realized that instead of abandoning the DAO, he should try to save it. To do that, he needed Griff.


Griff Green, a former massage therapist in Los Angeles who is one of the few people in the world with a master’s degree in digital currency, was the first to tell Slock.it co-founder Jentzsch’s brother Simon about the attack.


Green, who had been working on Slock.it for about six months at the time, woke up that morning at Jentzsch’s mom’s house, where Jentzsch had offered up a spare bedroom. Through his extensive network of contacts, Green began identifying as many people as possible who were interacting with the DAO, trying to separate friend from foe.


Green woke up that morning at Jentzsch's mom's house in Mittweida. Jentzsch was one of nine children, so his mother had a spare bedroom where she could house Green for a few days. Through his extensive contacts, Green began identifying as many people as possible who could interact with the DAO in order to let strangers send pictures or scan their IDs, trying to sort friends from foes.


The attack stopped, and the white hats came on stage


Then something strange happened: The attack stopped. Within six hours of the attack starting, the attacker had managed to steal 30% of the DAO’s 12 million ether, worth about $55 million at the time. “We didn’t even understand why this guy stopped,” Van de Sande said.


Green quickly went to secure the remaining 70% that the attackers hadn’t stolen. Green and two or three other people, a group known as the white hats known as Robin Hood, devised a daring but brilliant plan to save The DAO. To save The DAO, they had to steal the remaining ether and then give it to its rightful owners.


As they went about this plan, doubts arose internally—no one knew if what they were doing was legal. Would their actions be as bad as the theft they were trying to prevent?


Someone has to do it, "Someone has to push the button."

The night before the attack, the price of Ethereum reached an all-time high of $20. After the attack, Ethereum fell by $15, and nearly $500 million in market value evaporated. At this price, DAO still holds $125 million. The white hat army is worried that the attack will come again, and they may be the only line of defense.


In this respect, the DAO is like the spaceship in the movie Aliens that has its self-destruct sequence activated. In order to survive, an escape pod must be used.


The investors in the DAO had to initiate a similar process to deploy an escape pod to move their ether out of the DAO. The location of this escape pod was right where the bug was. So the Robinhood white hat team had to exploit this vulnerability, and they only had a short time and a few escape pods to exploit.


Minutes before the attack, Van de Sande joked: "Let's go rob a bank!" No one laughed. "Not everyone likes humor very much," he said.


In his apartment, Van de Sande prepared to press a button on his laptop. Then suddenly, he was disconnected from the Internet. His router was down. "What's going on?" he said. He had less than 30 minutes to execute the Robin Hood hack. He frantically called NET, the Brazilian Internet service provider, and got a robotic voice in response: "There's a network problem nearby." He quipped, "We were trying to steal tens of millions of dollars from one machine, but we were ambushed by another machine."


“And then we missed the window,” he said. The window closed. His euphoria about saving the DAO was shattered by the network’s operators. He then walked his dog and crawled into bed, frustrated.


The next morning, it was Saturday, and Van de Sande tried to reconvene the Robin Hood group to infiltrate another escape pod. But everyone was busy and couldn't get together. "We were like the worst hackers ever," Van de Sande said. "We were both badly affected by the internet and badly affected by our families."


Who are their opponents in this war?


No one really knows, but there are some clues. One address used by the attacker is 0xF35e2cC8E6523d683eD44870f5B7cC785051a77D. Like everything else on the blockchain, a user's address is an anonymous string of characters, but each address leaves a public record on the blockchain.


To pull off his attack, the attacker needed to create a contract that interacted with the DAO to slowly drain the DAO of ether. Green said he did this on June 15 and deployed it in the early hours of two days later. Once activated, the attack contract began sending about $4,000 in ether every three to four minutes through the attacker's account to drain the DAO.


But where was the original source of the funds? In order to interact with the Ethereum blockchain, each attack contract needs two addresses to provide funds, but further tracing is difficult. This is because the second address uses an exchange called ShapeShift to send 52 ether to its account on June 14. ShapeShift does not collect any information about its users and converts it to another virtual currency (such as Bitcoin) within 10 seconds. While there are legitimate reasons to use ShapeShift, it is also a good way to whitewash digital asset records.


After the attack contract stopped working, the thief needed to deploy it again, but the hack was aborted. (Green said one possible reason the attack was halted was that the hacker’s tokens were destroyed, meaning he had no way to exploit the bug.)


While we can only learn so much about this blockchain record, digital asset exchanges know more, with one exchange’s internal investigation concluding that the DAO attacker was likely a group based in Switzerland, rather than a lone wolf. According to the CEO of an anonymous company, even with an anonymous blockchain, the exchange was able to analyze the location of its customers’ trading activity. The CEO said the exchange shared the analysis with the FBI’s Boston office, but there has been no further contact since October last year.


Gün said he also spoke with agents from the FBI's Boston and New York offices and the New York Attorney General's office. But assisting such investigations is difficult because attackers leave no trace.


“I’m surprised that it’s not possible to trace back who did this,” said Stephan Tual, the third co-founder of Slock.it. “I still don’t understand it. What that person did was extremely unethical.”


Black Hat returns and they start a showdown


On Thursday, four days after the attack, the hackers returned and somehow resumed the heist. The Robin Hood White Hat group feared this moment would come and prepared for it. On Sunday morning they finally managed to muster up and successfully infiltrate an escape pod online, but had stopped fighting back. Now they had no choice.


"Honestly, I'm thrilled," Green said. "This is the craziest thing that's ever happened to me."


Whether it is legal or not remains an open question.


"What they were doing was almost certainly illegal, but they claimed it was for the greater good," said Vessenes, a programming expert. Now, Van de Sande's work has let the Ethereum community know that Robinhood's counterattack is benign. On Twitter, he wrote: "The DAO is safely drained, don't panic."


“We escaped the mothership, but now we’re escaping in space with the aliens,” Van de Sande said. That’s a big problem. Since Jentzsch wrote his code, the Robinhood group will have to wait several weeks to secure their recovered ether.


However, if the attacker is on the run with the group, he could follow them — a so-called stalking attack. If the hacker is following the Robinhood group, Ether isn’t really safe at all.


“It will only end when one of the parties stops fighting,” Van de Sande said. This is essentially the core of the DAO Wars, an endless battle that has to be fought to keep the recovered ether safe. Hopefully there will be a way to reverse the theft once and for all.


DAOs and the Death Principle


What happened next is one of the strangest and most controversial things to happen in the history of blockchain.


As the Robinhood white hat team's rescue efforts proceeded in private, heated discussions arose. White hat hackers weren't the only ones who wanted to save the DAO. Jentzsch worked almost around the clock, issuing hundreds of requests to DAO investors on what they should do. 23-year-old Vitalik Buterin, who created the Ethereum blockchain before he was 20, became the community's focus.


In short, what they could do is change the Ethereum blockchain to fix the DAO, but only if a majority of the computers running the network agree can the software be updated to get rid of the vulnerability, as if the attack had never happened.


The decision sparked a backlash that remains controversial a year later, both in the ethereum community, which insists the blockchain’s history cannot be altered, and in bitcoin, where some users see hard forks as violating fundamental values.


Some Bitcoin users saw the hard fork as violating some of its most fundamental values. Within the Ethereum community, computer nodes around the world accepted this view. Included in block 1,920,000, the fix for the DAO was simple and did just one thing - if you had invested in the DAO, you could now withdraw it.


Everything about the DAO was a parameter: rules, if-then statements, and more rules, all put in place before the program was set loose. One of the parameters stated that anyone who wanted to be taken out of the DAO had to wait a certain period of time, 27 days after the initial request, and then another seven days.


This failsafe written by Jentzsch also applies to the attacker. So even if someone effectively robbed the bank, he would have to wait 34 days before crossing the street, allowing him to escape. While waiting, the money was stolen back again.


Back on the Cornell campus, Gün brought champagne to a class he was teaching, and he labeled the bottle: “Congratulations on Fork.”


Then something unexpected happened. The original Ethereum blockchain that was attacked continued to grow. A hard fork is like a branch of a tree that sprouts in a different direction from the end of the main stem. That branch should have withered after the hard fork, but as a small group of users continued to process transactions on that version of the blockchain, it continued to grow instead of dying.


Nearly $53 million worth of ether was transferred to a contract object nicknamed "Dark DAO". The mechanism of this attack has been widely discussed. Since then, white hat hackers have used the same vulnerability to transfer the remaining funds of the DAO to the "White Hat DAO". The Robin Hood white hat team holds approximately $8.4 million because in this parallel universe, they still control 70% of the recovered DAO funds.


The Robin Hood White Hat team was in disbelief. “We did everything we could to avoid this, but now we’re being dragged back into this fight,” Van de Sande said.


Current Bitcoin supporters can back their former selves by buying Ethereum Classic, which is what Bitcoin heavyweight entrepreneur Barry Silbert does. “Remember, the original blockchain is Ethereum Classic.” His company recently released an investment paper outlining the advantages of Ethereum Classic. A section titled “DAO and the Death Principle” summarizes the theoretical basis.


Alexis Roussel, co-founder of Swiss cryptocurrency broker Bity.com, still marvels at the wild world of hard forks and blockchain. “This is something that doesn’t happen in traditional finance,” he said. “If something happens to Apple, you don’t suddenly have a clone of Apple.”


What went wrong?


It’s been a year since the DAO attack, which is plenty of time to assess what went wrong.


Van de Sande is eager to move on. “This is really just a one-time incident,” he said. “We’re ready to turn the page and put the DAO story behind us.”


Green, who organized an Ethereum conference at Burning Man, still has his sense of humor. "The Robin Hood white hat team is just a show," he said with a laugh. "I hope the movie turns out better than it actually is."


Green, who organized a panacea at the Burning Man festival in the Nevada desert this summer, has kept his sense of humor. "The Robin Hood group is just a show," he said with a laugh. "I hope the movie turns out better than it actually is."


As for the bug itself, it’s clear that many smart people looked at the code before Gün and missed a major flaw: the sequence of commands in the code allowed DAO token holders to reap any profits from their investment.


"If the code was in the right order, the attack would have been impossible," Jentzsch said, but in reality it became one of the biggest backdoors in hacker history.


If the first letter "T" on line 666 was a lowercase "t", that would also prevent hackers from breaking in.

Jentzsch has many regrets but insists that no one knew about the specific problem in lines 666-667. (Other observers point to flaws elsewhere, just not here.) "It makes no difference at all," he said. "If you don't know what to look for in a security review, you won't find it."


Gün still let the bug go, and Green's emotions were related to Gün. "I was actually really angry," Green said. "He started bragging about how he found the bug." He added, "Don't tell anyone, he's very irresponsible." However, Green still respects Gün very much and said that they have made changes.


“I think it’s a potential problem,” Gün said. But he consulted with his student Daian. Daian said the vulnerability was “unexploitable,” and Gün said that if he determined the danger, “then I would tell people.”


Gün said of the attacker (whoever he was) and the stupidity of Ethereum Classic (the original Ethereum chain): “Excellent, he should cash out.” The hard fork proved that it wasn’t just the DAO that needed fixing, but the Ethereum blockchain itself. “The bug was also on the system side,” he said.


Concerns about smart contracts and the Ethereum blockchain have evaporated, at least according to the market’s reaction based on the price of Ether.


In the approximately nine months following the attack, Ether rose from $10 to $12, then began to soar in March, reaching $341.19 as of June 12.


The original Ethereum has also risen and is now trading at $18.71. In other words, both versions of Ethereum are viable. Looking ahead, who would you rather trust? After the hard fork, the attacker has finally left the classic Ethereum, taking away approximately $67.4 million.


Source:Bloomberg

Reader Benefits


5 coupons worth 650 RMB off will be available for free on June 26 , only for "Conference Tickets"


Click "Read original text" to receive it immediately

Featured Posts


Latest articlesabout

Database "Suicide Squad" 
Exclusive: Yin Shiming takes over as President of Google Cloud China 
After more than 150 days in space, the US astronaut has become thin and has a cone-shaped face. NASA insists that she is safe and healthy; it is reported that the general manager of marketing of NetEase Games has resigned but has not lost contact; Yuanhang Automobile has reduced salaries and laid off employees, and delayed salary payments 
Exclusive: Google Cloud China's top executive Li Kongyuan may leave, former Microsoft executive Shen Bin is expected to take over 
Tiktok's daily transaction volume is growing very slowly, far behind Temu; Amazon employees exposed that they work overtime without compensation; Trump's tariff proposal may cause a surge in the prices of imported goods in the United States 
OpenAI's 7-year security veteran and Chinese executive officially announced his resignation and may return to China; Yan Shuicheng resigned as the president of Kunlun Wanwei Research Institute; ByteDance's self-developed video generation model is open for use丨AI Intelligence Bureau 
Seven Swordsmen 
A 39-year-old man died suddenly while working after working 41 hours of overtime in 8 days. The company involved: It is a labor dispatch company; NetEase Games executives were taken away for investigation due to corruption; ByteDance does not encourage employees to call each other "brother" or "sister" 
The competition pressure on Douyin products is getting bigger and bigger, and the original hot-selling routines are no longer effective; scalpers are frantically making money across borders, and Pop Mart has become the code for wealth; Chinese has become the highest-paid foreign language in Mexico丨Overseas Morning News 
ByteDance has launched internal testing of Doubao, officially entering the field of AI video generation; Trump's return may be beneficial to the development of AI; Taobao upgrades its AI product "Business Manager" to help Double Eleven丨AI Intelligence Bureau 

 
EEWorld WeChat Subscription

 
EEWorld WeChat Service Number

 
AutoDevelopers

About Us About Us Service Contact us Device Index Site Map Latest Updates Mobile Version

Site Related: TI Training

Room 1530, Zhongguancun MOOC Times Building,Block B, 18 Zhongguancun Street, Haidian District,Beijing, China Tel:(010)82350740 Postcode:100190

EEWORLD all rights reserved 京B2-20211791 京ICP备10001474号-1 电信业务审批[2006]字第258号函 京公网安备 11010802033920号 Copyright © 2005-2021 EEWORLD.com.cn, Inc. All rights reserved