Low-Cost Attacks on Ethereum 2.0 by Sub-1/3 Stakeholders
Michael NeuderDaniel J. MorozRithvik RaoDavid C. Parkes
![](/resources/c6.jpg)
We outline two dishonest strategies that can be cheaply executed on the Ethereum 2.0 Beacon Chain, even by validators holding less than one-third of the total stake: malicious chain reorganizations ('reorgs') and finality delays.