How Do ‘Checkpointing’ Mechanisms Help Prevent Malicious Reorgs?

Checkpointing involves embedding a cryptographic commitment to a specific block's hash at a certain height into the protocol or client software. This hardens the chain's history.

Nodes are instructed not to accept any chain that does not include this checkpoint, regardless of whether a longer chain exists. This effectively prevents malicious deep reorgs by setting an irreversible historical anchor for the network's consensus.

What Are the Trade-Offs of Implementing Centralized Checkpointing in a Decentralized Network?
How Does a BFT-based Consensus Mechanism Prevent a Malicious Node from Disrupting the Network?
If an Attacker Controls 100% of the Hash Power, Can They Change the Block Reward?
How Do Various Blockchain Consensus Mechanisms Impact the Speed of Settlement Finality?
How Do “Checkpointing” Mechanisms Enhance Finality in Some Blockchains?
Which Type of Cryptocurrency Chains Are Most Vulnerable to a 51% Attack?
What Cryptographic Mechanism Is Used to Protect against Malicious Alteration of Transaction Data?
How Does “Checkpointing” or “Social Consensus” Mitigate the Long-Range Attack Risk in PoS?

Glossar