Published
5 years ago on
August 13, 2018
âA quick clarification: Bitcoin Cash is a cryptocurrency that is distinct from and incompatible with Bitcoin. It is named as such because it is derived from Bitcoin. The now-fixed bug described below only affected Bitcoin Cash; the only relation to Bitcoin is the similar name.âOf course, the Bitcoin Cash camp would argue that this is totally the other way round. What action did Fields take? Fields struck a problem. He realised that by simply just contacting the Bitcoin ABC team, he could be at risk of having his name used against him, in a hack that exploited the vulnerability. But then how could Fields actually pass the message on, in good time, without actually disclosing any personal details? This had to be posted on a public forum, but then if this was seen by another person, what would stop them from exploiting the hack themselves? Fields was forced to use a complicated encryption key method to spread the message over Github, which was both time consuming and somewhat risky:
âOn April 27, after waiting roughly 48 hours for a response to the disclosure, a pull request was opened to covertly fixed the issue in Bitcoin ABC. The message had apparently been received. Success!âYou can see Fields full story here. It actually shows a very interesting perspective into what happened and shows that even in times of tension, good old human nature always come through. Iâm sure there are 100s of Bitcoin Core fanatics that would have loved to use this as an opportunity to bring their rivals down, but instead, Fields used it as an opportunity to offer a lifeline, even though the risks to himself where apparent. To conclude, in the words of Fields:
âThe Bitcoin Cash vulnerability that I discovered was successfully disclosed and mitigated, and ultimately had no noticeable impact on the cryptocurrency. It would be a shame, though, if the ecosystem did not benefit from an analysis of such a substantial near-miss. As cryptocurrency developers, it is necessary to take a step back now and then to re-evaluate the tools at our disposal, as well as the policies and procedures that we put into place. We may not be able to eliminate the threat of bugs like these, but we can learn from them and be better prepared to handle them in the future.â