In a significant security experiment conducted on August 15th, Qubic mining pool successfully demonstrated control over the Monero network, achieving a 51% attack rate that resulted in substantial network disruptions. The experiment revealed vulnerabilities through six confirmed block reorganizations and the isolation of 60 additional blocks—a clear indication of how an attack rate exceeding 50% can destabilize blockchain consensus.
Experimental Dominance and Hash Rate Control
The Qubic mining operation achieved approximately 80% of Monero block production within a two-hour window, establishing a peak hash rate of 2.71 GH/s. This figure represented 52% of the global Monero network’s total hash rate, demonstrating the critical threshold at which a single entity can exercise majority control and execute reorganizations. The 51% attack rate achieved during this period provided concrete evidence of network vulnerability when hash power concentration exceeds safety margins.
Financial Outcomes and Rewards Distribution
The experiment generated 750 XMR and 7 million XTM in mining earnings during the operational period. However, the project took a significant step by destroying the remaining unsold Tari and newly mined XTM reserves, totaling 1.72 billion Qubic tokens valued at approximately $55,000. This destruction served as a mechanism to offset potential network damage.
Miners and hash rate contributors who participated in the experiment received 6.22 billion Qubic rewards, equivalent to approximately $200,000 in compensation for their participation in this high-risk security assessment.
Ongoing Evaluation and Impact Assessment
The experiment remains active, with independent security experts currently analyzing the full implications of this 51% attack rate demonstration. Their findings will contribute to understanding how the Monero network can strengthen its defense mechanisms against similar concentration scenarios and improve its resilience to majority hash rate attacks in the future.
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
Qubic's Monero Network Experiment: Understanding the 51% Attack Rate and Its Network Implications
In a significant security experiment conducted on August 15th, Qubic mining pool successfully demonstrated control over the Monero network, achieving a 51% attack rate that resulted in substantial network disruptions. The experiment revealed vulnerabilities through six confirmed block reorganizations and the isolation of 60 additional blocks—a clear indication of how an attack rate exceeding 50% can destabilize blockchain consensus.
Experimental Dominance and Hash Rate Control
The Qubic mining operation achieved approximately 80% of Monero block production within a two-hour window, establishing a peak hash rate of 2.71 GH/s. This figure represented 52% of the global Monero network’s total hash rate, demonstrating the critical threshold at which a single entity can exercise majority control and execute reorganizations. The 51% attack rate achieved during this period provided concrete evidence of network vulnerability when hash power concentration exceeds safety margins.
Financial Outcomes and Rewards Distribution
The experiment generated 750 XMR and 7 million XTM in mining earnings during the operational period. However, the project took a significant step by destroying the remaining unsold Tari and newly mined XTM reserves, totaling 1.72 billion Qubic tokens valued at approximately $55,000. This destruction served as a mechanism to offset potential network damage.
Miners and hash rate contributors who participated in the experiment received 6.22 billion Qubic rewards, equivalent to approximately $200,000 in compensation for their participation in this high-risk security assessment.
Ongoing Evaluation and Impact Assessment
The experiment remains active, with independent security experts currently analyzing the full implications of this 51% attack rate demonstration. Their findings will contribute to understanding how the Monero network can strengthen its defense mechanisms against similar concentration scenarios and improve its resilience to majority hash rate attacks in the future.