Skip to main content

How Do ‘Checkpointing’ Mechanisms Help Prevent Malicious Reorgs?

Checkpointing involves embedding a cryptographic commitment to a specific block's hash at a certain height into the protocol or client software. This hardens the chain's history.

Nodes are instructed not to accept any chain that does not include this checkpoint, regardless of whether a longer chain exists. This effectively prevents malicious deep reorgs by setting an irreversible historical anchor for the network's consensus.

How Do ‘Reorgs’ (Reorganizations) in a Blockchain Relate to the Success of a 51% Attack?
What Is a “Chain Reorg” and How Do Checkpoints Prevent It?
If an Attacker Controls 100% of the Hash Power, Can They Change the Block Reward?
Can a Token Sale Be Fully Compliant without KYC?