Hardware Backdoors Another possibility for disrupting or destroying the Bitcoin network is through corrupting hardware that runs bitcoin software to be accessible by outside parties. Nodes that perform mining could, for example, be fitted with undetectable malware that allows outsiders to commandeer the hardware. This equipment could then be deactivated or remotely controlled at a time when a 51% attack is launched. Another example would be through spying technology installed on user computers allowing access to users' bitcoins by accessing their private keys. Such attacks on a mass scale
...more