After Monero suffered a 51% attack, did the Qubic community shift the pressure towards Dogecoin?

CN
3 hours ago

Did the Qubic Community Shift Pressure to Dogecoin After Monero's 51% Attack?

Recently, the AI public chain Qubic, driven by the "useful proof of work (uPoW)" mechanism, reorganized Monero blocks in a short period, leading to 60 blocks being isolated. Although there is still debate over whether this attack constitutes a strict 51% attack, its impact on the market has surpassed technical aspects. The uncertainty regarding network integrity has forced exchanges to adopt risk control measures, putting pressure on the price of Monero. This attack event reveals that the security budget under the PoW mechanism may be penetrated under external incentives, exposing the structural vulnerabilities of power concentration and security boundaries.

More concerning is that the Qubic community's subsequent vote listed Dogecoin, with a market capitalization exceeding $35 billion, as a potential attack target. This trend not only deepens market concerns but also reignites discussions on the relationship between incentive power distribution and network integrity. The mobility of computing power and the boundaries of the security budget are being re-examined. In this context, the following analysis by CoinW Research Institute will delve deeper into this event.

  1. Qubic's "51% Attack": Marketing Narrative or Technical Threat

1.1. How the uPoW Mechanism Breaks Through Traditional Security Budgets

In a standard PoW architecture, the cornerstone of computing power stability is the on-chain security budget, which is an incentive closed loop formed by block rewards and transaction fees. Taking Monero as an example, the network has entered a tail emission mode, with a fixed block reward of 0.6 XMR, producing a block approximately every two minutes, resulting in about 720 blocks mined daily, with a total security budget (approximately equal to miner block subsidies * XMR market price) of about $110,367 per day. This is also the economic lower limit that attackers must bear to maintain control over the majority of computing power.

Qubic's introduction of useful proof of work (uPoW) breaks this traditional limitation. Unlike a model that solely relies on block rewards, Qubic provides miners with QUBIC block rewards while directing computing power towards Monero mining and converting this portion of rewards into USDT for repurchasing and destroying QUBIC on the open market. In this case, miners can not only directly obtain QUBIC block subsidies but also gain indirect benefits from the deflationary effect of repurchase and destruction, resulting in a higher overall return than mining XMR alone. This allowed Qubic to rapidly mobilize a large amount of computing power in a short time, leading to the reorganization of six blocks and the abnormal phenomenon of nearly 60 isolated blocks. In fact, as early as June of this year, Qubic began mining Monero and Tari, converting all rewards into USDT for repurchasing QUBIC tokens and then destroying them. According to Qubic's official disclosure, this mining mechanism is over 50% more profitable than mining XMR and Tari alone.

Source: qubic.org

1.2. Doubts About the Credibility of Qubic's 51% Attack

Although Qubic claims to have achieved a "51% attack" on Monero, this statement has been questioned by the community. According to publicly available data from the research institution RIAT, its peak computing power was only about 2.6 GH/s, while the total computing power of Monero during the same period was around 6.25 GH/s. In other words, Qubic's computing power accounted for less than 42%, which is significantly different from a true 51% attack. Further data supports this judgment; CoinWarz data shows that on the day of the incident, Monero's total network reached a peak of 6.77 GH/s, while MiningPoolStats recorded approximately 5.21 GH/s that day. This further indicates that Qubic's peak computing power was a momentary fluctuation rather than stable control. According to MiningPoolStats data, Qubic's current pool computing power is about 2.16 GH/s, with a computing power share of 35.3%. The data discrepancies indicate instability in its control capability and a lack of sustained recognition.

Source: miningpoolstats

Despite doubts about majority control, Monero's network security has not been significantly affected. However, Qubic's computing power disturbance impacted the market in the short term. Kraken suspended XMR deposits due to network integrity risks, and upon resuming, raised the confirmation threshold to 720 blocks, reserving the right to suspend again. This indicates that even if it is not a true 51% attack, as long as there is a possibility of computational manipulation, the security chain of transactions will come under pressure, challenging liquidity and confidence simultaneously.

  1. Dogecoin Becomes the Next Potential Attack Target

2.1. Dogecoin as the Next Potential Target

After Monero, Qubic has now identified Dogecoin as the next potential attack target. Recently, the Qubic community initiated a new vote to decide the next potential target for a 51% attack. The final results showed that Dogecoin received over 300 votes, significantly higher than candidates like Kaspa and Zcash. This vote has drawn market attention, indicating that Qubic's focus has shifted from the privacy coin Monero to a mainstream meme coin with a higher market cap and broader user base.

The market's attention to Qubic stems from its demonstration of a new economic incentive model during the Monero attack. This is not a traditional hacking behavior but rather a way to "rent" computing power through economic incentives, thereby reshaping the security assumptions of PoW. Currently, this model may be projected onto Dogecoin, amplifying market unease. Interestingly, after the vote, the Qubic community stated that they are mining Dogecoin rather than "attacking." From Qubic's official statements, the community generally interprets this event as a marketing maneuver rather than a purely technical attack.

Source: @_Qubic_

2.2. Can Qubic Attack Dogecoin?

It is important to note that Qubic also adopted a method of mining first and then "attacking" Monero. Therefore, the community speculates that Qubic may also "attack" Dogecoin in the future. Can it be realized? To understand the risks, one must first examine the scale of Dogecoin's computing power. According to CoinWarz data, Dogecoin's total network computing power is currently about 2.69 PH/s, with a historical peak of 7.68 PH/s, indicating the scale of miners' investment in hardware and electricity. According to the network mechanism, Dogecoin produces a block approximately every minute, with a fixed reward of 10,000 DOGE, resulting in a daily supply increase of about 14.4 million DOGE; at the current price of about $0.21, Dogecoin's daily security budget is approximately $3 million. In contrast, Monero, in its tail emission phase, adds only 432 XMR daily, corresponding to a security budget of about $110,000, far lower than Dogecoin. This gap indicates that under the same conditions, if Qubic attempts to launch a 51% attack on Dogecoin, the financial and technical barriers to attacking Dogecoin are much higher than those for Monero.

Source: coinwarz

Qubic's strategy is not to directly invest large sums of money but to attract temporary migration of computing power through a subsidy model. If a sufficient number of miners are incentivized by QUBIC to leave other chains and turn to Dogecoin in the short term, it could still impact block stability. Even if a true "double spend" cannot be achieved, it may lead to increased block delays and a higher rate of orphaned blocks, thereby disrupting the normal operation of the network. It can also be understood that Qubic's attack does not necessarily have to be "successful"; creating chaos is enough to undermine market confidence.

  1. New Game of PoW Under AI Computing Power from the Qubic Incident

3.1. The Liquidity and Loyalty Dilemma of Miners

Traditional PoW consensus relies on the logic that computing power equals security, meaning that the higher the computing power, the greater the cost of attacking the network, forming a solid moat. However, the Qubic incident has exposed a new reality: computing power is not locked in a single chain for the long term but is a resource that can be quickly transferred, rented, or even speculated. When computing power has high liquidity, its attributes resemble liquid capital in the capital market, ready to flow into areas with higher returns.

This liquidity of computing power directly changes the relationship between miners and the network. In the past, miners' incentives primarily came from block rewards and transaction fees, forming a long-term binding with the chain. However, under the Qubic model, the sources of miners' income have been redefined. This has led miners to gradually transform into computing power arbitrageurs rather than long-term guardians of a specific chain.

The more profound impact is that the security of PoW networks will no longer depend on the scale of computing power itself but rather on the stability of that computing power. Once computing power can be bought by higher bidders at any time, the cost of attacking the network is no longer a static absolute number but is highly correlated with fluctuations in the external market. The result is that PoW is no longer a solid security foundation but has become a temporary defense subject to external market dynamics, with security boundaries potentially breached at any time.

3.2. New Game of PoW in the Era of AI Computing Power

In the context of continuously rising demand for AI computing power, the security of PoW networks is being redefined. In the traditional model, computing power circulates only within the chain, and the security budget entirely relies on block rewards and transaction fees. However, the Qubic model has proven that computing power can also be directed outside the chain. For miners, computing power will naturally flow to the market offering the highest returns. This means that the security budget of PoW is no longer a static cost within the chain but is linked to the global computing power market, and may even experience a security flash crash when AI computing power prices soar.

In this environment, PoW is likely just a transitional solution for AI public chains. Relying solely on PoW to maintain security will be difficult in the long-term context of computing power outflow. In the future, more similar projects may shift to PoS or hybrid consensus mechanisms. Whether the transition of consensus mechanisms can be completed smoothly will become an important factor in assessing the long-term competitiveness of AI+PoW public chains.

At the same time, external security binding is becoming a more feasible path for the integration of PoW and AI public chains. For example, through a security leasing market, mechanisms like EigenLayer's re-staking can outsource Ethereum's staking capital for use by AI public chains, providing them with a more stable and attack-resistant security budget. In this approach, it no longer relies on its own computing power scale but hedges the liquidity risk of computing power by binding the long-term security of a mature network. This could become an important direction for AI public chains to break through the limitations of PoW.

Reference links:

  1. https://status.kraken.com/

  2. https://www.coinwarz.com/mining/dogecoin/hashrate-daily-chart

  3. https://riat.at/qubic-attack-on-xmr-monero-no-51-attack-proven

  4. https://qubic.org/pr/qubic-mines-monero

  5. https://rfc.tari.com/RFCD-0130_Mining

免责声明:本文章仅代表作者个人观点,不代表本平台的立场和观点。本文章仅供信息分享,不构成对任何人的任何投资建议。用户与作者之间的任何争议,与本平台无关。如网页中刊载的文章或图片涉及侵权,请提供相关的权利证明和身份证明发送邮件到support@aicoin.com,本平台相关工作人员将会进行核查。

5折买ETH,注册立返20%
Ad
Share To
APP

X

Telegram

Facebook

Reddit

CopyLink