Back to Course

3. Advanced Course

0% Complete
0/0 Steps
  1. 1. What is Taproot?
  2. 2. Blockchain bridges – what are they?
  3. 3. What is Ethereum Plasma?
  4. 4. What is Ethereum Casper?
  5. 5. What is Zk-SNARK and Zk-STARK? 
  6. 6. What is Selfish Mining? 
  7. 7. What is spoofing in the cryptocurrency market? 
  8. 8. Schnorr signatures - what are they? 
  9. 9. MimbleWimble - what is it? 
  10. 10. What is digital property rights in NFT?
  11. 11. What are ETFs and what role do they play in the cryptocurrency market? 
  12. 12. How to verify a cryptocurrency project – cryptocurrency tokenomics 
  13. 13. What is the 51% attack on blockchain?
  14. 14. What is DAO, and how does it work?
  15. 15. Zero-knowledge proof – a protocol that respects privacy 
  16. 16. What is EOSREX?
  17. 17. What is Proof of Elapsed Time (PoET)?
  18. 18. Mirror Protocol – what it is? 
  19. 19. What are synthetic assets? 
  20. 20. How to create your own NFT? 
  21. 21. Definition of DeFi, and what are its liquidations?
  22. 22. New identity system - Polygon ID
  23. 23. Ethereum Foundation and the Scroll protocol - what is it?
  24. 24. What is Byzantine fault tolerance in blockchain technology?
  25. 25. Scalability of blockchain technology - what is it?
  26. 26. Interchain Security - new Cosmos (ATOM) protocol
  27. 27. Coin Mixing vs. Coin Join - definition, opportunities, and threats
  28. 28. What is Ethereum Virtual Machine (EVM) and how does it work?
  29. 29. Soulbound Tokens - what are they, and how do they work?
  30. 30. Definition of LIDO - what is it?
  31. 31. What are Threshold Signatures, and how do they work?
  32. 32. Blockchain technology and cyberattacks.
  33. 33. Bitcoin script - what it is, and what you should know about it.
  34. 34. What is zkEVM, and what are its basic features?
  35. 35. Do confidential transactions on blockchain exist? What is a Confidential Transaction?
  36. 36. Algorithmic stablecoins - everything you should know about them.
  37. 37. Polygon Zk Rollups ZKP - what should you know about it?
  38. 38. What is Web3 Infura?
  39. 39. Mantle - Ethereum L2 scalability - how does it work?
  40. 40. What is the NEAR Rainbow Bridge?
  41. 41. Liquid Staking Ethereum and LSD tokens. What do you need to know about it?
  42. 42. Top 10 blockchain oracles. How do they work? How do they differ?
  43. 43. What are Web3.js and Ether.js? What are the main differences between them?
  44. 44. What is StarkWare, and recursive validity proofs
  45. 45. Quant Network: scalability of the future
  46. 46. Polygon zkEVM - everything you need to know
  47. 47. What is Optimism (OP), and how do its roll-ups work?
  48. 48. What are RPC nodes, and how do they work?
  49. 49. SEI Network: everything you need to know about the Tier 1 solution for DeFi
  50. 50. Types of Proof-of-Stake Consensus Mechanisms: DPoS, LPoS and BPoS
  51. 51. Bedrock: the epileptic curve that ensures security!
  52. 52. What is Tendermint, and how does it work?
  53. 53. Pantos: how to solve the problem of token transfer between blockchains?
  54. 54. What is asymmetric encryption?
  55. 55. Base-58 Function in Cryptocurrencies
  56. 56. What Is the Nostr Protocol and How Does It Work?
  57. 57. What Is the XDAI Bridge and How Does It Work?
  58. 58. Solidity vs. Rust: What Are the Differences Between These Programming Languages?
  59. 59. What Is a Real-Time Operating System (RTOS)?
  60. 60. What Is the Ethereum Rinkeby Testnet and How Does It Work?
  61. 61. What Is Probabilistic Encryption?
  62. 62. What is a Pinata in Web 3? We explain!
  63. 63. What Is EIP-4337? Will Ethereum Account Abstraction Change Web3 Forever?
  64. 64. What are smart contract audits? Which companies are involved?
  65. 65. How does the AirGapped wallet work?
  66. 66. What is proto-danksharding (EIP-4844) on Ethereum?
  67. 67. What is decentralised storage and how does it work?
  68. 68. How to Recover Cryptocurrencies Sent to the Wrong Address or Network: A Practical Guide
  69. 69. MPC Wallet and Multilateral Computing: Innovative Technology for Privacy and Security
  70. 70. Threshold signature in cryptography: an advanced signing technique!
  71. 71. Vanity address in cryptocurrencies: what is it and what are its characteristics?
  72. 72. Reentrancy Attack on smart contracts: a threat to blockchain security!
  73. 73. Slither: a static analyser for smart contracts!
  74. 74. Sandwich Attack at DeFi: explanation and risks!
  75. 75. Blockchain RPC for Web3: A key technology in the world of decentralized finance!
  76. 76. Re-staking: the benefits of re-posting in staking!
  77. 77. Base: Evolving cryptocurrency transactions with a tier-2 solution from Coinbase
  78. 78. IPFS: A new era of decentralized data storage
Lesson 6 of 78
In Progress

6. What is Selfish Mining? 

Selfish mining is a cryptocurrency mining strategy that involves fraud. What exactly it is and the implications of doing so will be outlined in today’s lesson. 

Selfish Mining – definition 

Selfish Mining is one method of cryptocurrency mining where a group of miners joins together to maximise their profits and gain control of the main blockchain. The group solves a cryptocurrency puzzle and opens a new block that it does not attach to the main blockchain. It creates a new fork that is designed to overtake the public blockchain. 

If the blockchain thus created overtakes the honest one, the latest blocks on the network are inserted into it. In effect, the fraudulent group’s fork overwrites the original blockchain and allows it to effectively steal digital assets from other users, altering the main blockchain. 

How it works

Selfish Mining was first discovered in 2013. This is thanks to two Cornell researchers – Emin Gun Sirera and Ittay Eyal. To understand exactly what it is about, we need to go back to basics and recall the definition of mining. 

As you remember from previous lessons, to obtain bitcoins, miners have to solve difficult mathematical puzzles. The process depends on many factors-difficulty of the puzzle, computing power consumption, price of electricity and internet access. Most cryptocurrencies rely on a proof-of-work mechanism that relies entirely on miners. When they solve a puzzle, a new block is created on the blockchain. The miner who created it receives a transaction fee and the aforementioned reward. 

Selfish mining, or how to increase your revenue. Miners hide the newly created blocks and make them available on private networks or private chains. This practice accelerates the process of discovering a new block and minimises network latency issues and the cost of the whole operation. A forked blockchain is initially shorter than a public blockchain. Is this possible? As much as possible. The nodes of the network form different blocks. The creation of two at the same time is as feasible as possible. When both chains are published simultaneously and connected by the last block, the blockchain is forked

The private chain created in this way generates new blocks while hiding them. The entire process is repeated until the private blockchain reaches a block height greater than that of the public blockchain. The selfish miners then insert the newly created blocks into the public blockchain. In effect, the public, ‘honest’ blockchain joins the forked chain. The public chain mines the new blockchain, and the miners are rewarded with cryptocurrencies and newly adopted blocks

To further illustrate this to you, we will use an example. Selfish miners mined block 90,00,001. The node that added it to the blockchain did not send this information to the others. Unaware of what has occurred, the nodes in the public blockchain, add new blocks from block 1,000. We now have the situation that there are two blockchains associated with block 1,000. One public and one private. Meanwhile, the miners continue to dig on their private chain and add new blocks to it, and it keeps getting longer. When it gains an advantage over the public blockchain, it lets the public chain know that block 1,001 has been created. After analysis, the chain recognises that the selfish miners’ block was mined first and makes it the main chain, invalidating the one the ‘honest’ nodes were working on. As a result, they receive no rewards and all their work goes into the pockets of the dishonest 

miners. The rewards for mining go into the greedy hands of the selfish miners because their chain has become the new public blockchain. 

Interesting fact: According to research by Sier and Eyal, miners practising the above method have a competitive advantage over honest miners. Their rewards are significantly higher,  even after considering wasted resources. 

Is selfish mining a threat? 

It is true that by creating a forked block, it is possible to alter the public blockchain and earn more than honest miners. However, there are many theories about the threat from Selfish  Mining. Let’s take a look. Craig Wright, who we all know, stated back in 2017 that selfish miners are unable to create more blocks than honest miners. By the same token, they are unlikely to win more awards. 

Jake Gober argues that if such a practice were really that profitable, it would be far more  popular. Hardly any miner in the crypto industry would be honest. In contrast, researcher Zhaojie Wang proved that as of the end of 2021, there were no known cases of such a precedent in the crypto world. 

Furthermore, combining a node’s computing power with other systems results in an increase in its hash rate. The corollary of such an action is that the cryptocurrency puzzle is more likely to be solved. Thinking logically, if the power of selfish miners grows, at some point it will be so large that it will start to control the blockchain. How? And remember the 51%  attack? Exactly. The PoW consensus mechanism requires the majority of nodes in the network, to be honest. Then the transaction is accepted and creates the next block.  However, if 51% of the publicly available hash rate comes from a private pool, it ignores transactions with small fees and stops many of them for no reason. This results in the centralization of blockchain and the original premise – decentralisation – is gone. Such fraud will result in a drastic decrease in the value of the cryptocurrency in question, and consistent in the rewards for the miners. We believe that they are not so stupid and prefer to act honestly. 


Most networks need miners to validate blocks and transaction information. Without them, all the verification and validation would not be as easy and the network would not function. Of course, it is not only in this industry, as in many others too, there will be someone willing to go ‘easy’ to make more money. However, we believe in the integrity of the miners and their good intentions.

Test your knowledge on Kanga Exchange