Questions tagged [security]

For questions relating to the security of IoTA and how to mitigate these issues or avoid them altogether.

92 questions
23
votes
1 answer

What can an attacker with 34% of total hash power do?

At the moment the coordinator protects the network from 34% attacks. What exactly can and can't such an attacker do when the coordinator is shut down?
Ian Metten
  • 651
  • 4
  • 15
7
votes
1 answer

What prevents a malicious node from receiving a transaction and, instead of relaying it, attempting to compromise the now-weakened address?

For example, this scenario: I broadcast a transaction from a previously-unspent-from address, for a large amount, say 1 Ti. The full node I broadcast to is a malicious actor who has been waiting for a large transaction to be broadcast to him. Since…
dreid
  • 1,102
  • 9
  • 16
3
votes
1 answer

How secure is storing IOTA in Ledger Nano S?

Is storing IOTA in Ledger Nano S completely secure? I am asking because IOTA doesn't use elliptic-curve cryptography. Does storing and using IOTA in Ledger Nano S may make it easier for an attacker to find a private key of another cryptocurrency…
Greg Zuber
  • 131
  • 2
2
votes
0 answers

what happen if we are in an untrusted network

I am discovering Iota and I am trying to find out if I it can be applied to securely send command between iot device, being 100% sure the command has been received. My concern is about the network, what happen if we are in an untrusted network with…
iliès
  • 21
  • 1
2
votes
0 answers

Can the coordinator be found or identified?

The coordinator is currently vital to the operation of the Iota network. There are both security (leaking the seed used to generate milestones) and availability (it must be able to issue milestones) impacts if it were to be attacked. Most attacks…
Cybergibbons
  • 305
  • 1
  • 6
2
votes
2 answers

Are inbound/outbound Iota connections encrypted?

If I am running a full node, what can an adversary determine from sniffing the traffic to and from my node, or is it all encrypted?
Cybergibbons
  • 305
  • 1
  • 6
1
vote
1 answer

What could an adversary do with the seed of the coordinator?

The coordinator issues milestones that the Iota network use as a root of trust when validating transactions. These milestones are signed, which in turn means that keys exist for signing the milestones. If an adversary obtained the keys used to sign…
Cybergibbons
  • 305
  • 1
  • 6
0
votes
0 answers

If the coordinator were to be identified or located, what attacks could be carried out against it?

The coordinator is currently vital to the operation of the Iota network. There are both security (leaking the seed used to generate milestones) and availability (it must be able to issue milestones) impacts if it were to be successfully…
Cybergibbons
  • 305
  • 1
  • 6