Monero appears to be in the midst of a successful 51% attack
What Was Alleged to Happen
- A group associated with Qubic claimed to control >50% of Monero’s hashrate, enabling chain reorganizations, censorship, and theoretical double-spends.
- Some users observed unusual reorg activity on their nodes, consistent with elevated hash concentration.
Was It Really a 51% Attack?
- Several commenters argue this was not a sustained, classical 51% attack: reported reorg depth (~6 blocks) is far below the 10-block confirmation window Monero uses.
- Public pool stats didn’t clearly show a single entity above 50%; much of the power was hidden as “unknown,” and Qubic allegedly disabled hashrate reporting, making verification unclear.
- Others suspect exaggeration or marketing: Qubic is called an “unreliable narrator” and its “planned stress test” framing is viewed as unverifiable.
What a 51% Attack Can and Can’t Do
- Consensus: majority hash allows:
- Rewriting recent history (reorgs), double-spending attacker’s own coins, and censoring transactions.
- Potentially capturing all block rewards via selfish mining.
- It does not allow:
- Signing transactions without private keys, directly stealing random users’ coins, or breaking Monero’s anonymity.
Economic Motives and Costs
- Some claim such attacks are “expensive”; others note they can be profitable if hashpower is acquired at normal mining margins or combined with shorting the coin.
- Qubic reportedly subsidized miners (e.g., paying extra in its own token) to redirect CPU power to Monero, possibly profiting from publicity and token demand rather than on-chain theft.
- Debate over whether a successful visible attack would crash XMR and undermine any on-chain profit, but could still be worthwhile for someone betting against Monero or seeking to destroy trust.
Monero’s Design and Possible Mitigations
- Monero’s CPU-oriented RandomX is defended as ASIC-resistant but criticized as making rental/redirected CPU attacks easier.
- Proposed defenses include PoS or hybrid PoW+PoS, ASIC-based PoW, or BFT layers; whitelisting miners is rejected as centralizing.
Views on Qubic and “Proof of Useful Work”
- Qubic’s “decentralized AI” and “useful PoW” marketing is widely mocked; some call it ponzi-like or centralized compute wrapped in crypto rhetoric.
- More rigorous “proof of useful work” research is mentioned, but several argue that if the work has independent value, it weakens PoW’s security assumptions.
Broader Trust & Political Angle
- Some see this as another in a long line of pressures against Monero (delistings, reputational attacks), speculate about state-level hostility to strong financial privacy, and question how users should react if ledger trust is repeatedly challenged.