How Do Cryptocurrency Exchanges Protect Themselves from 51% Attacks?

Exchanges employ several strategies to protect against 51% attacks and the resulting double-spends. They often require a higher number of block confirmations for deposits from smaller, more vulnerable coins, increasing the time and cost for an attacker to rewrite the chain.

They also monitor network hashrates for sudden, suspicious spikes and may temporarily halt deposits and withdrawals for a specific coin if an attack is suspected. Some exchanges participate in consortiums that share threat intelligence.

In the event of an attack, an exchange might delist the compromised coin to protect its users and itself from further losses.

How Did Uniswap V3’s “Concentrated Liquidity” Feature Attempt to Defend against Vampire Attacks?
How Can Exchanges Protect Themselves from Double-Spending Caused by 51% Attacks?
How Does the Choice of a Time-Weighted Average Price (TWAP) Calculation Defend against This Attack?
What Is a ‘Watching-Only’ Wallet and How Does It Relate to Private Key Security?
How Do Flash Loan Exploits Allow Attackers to Manipulate Prices on a Decentralized Exchange?
How Does a ‘Price Feed Aggregator’ Help Defend against a Single-Point Manipulation?
How Do Centralized Exchanges Typically Protect Themselves from Double-Spend Attacks?
How Does a Time-Weighted Average Price (TWAP) Help Defend against Price Feed Attacks?

Glossar