Long-Range Attack

A long-range attack is a type of blockchain reorganization attack specific to proof-of-stake (PoS) blockchains, where an adversary constructs an alternative blockchain history starting from a block far in the past — potentially from the genesis block. The attack is possible because in PoS, the cost of signing blocks is computational (cryptographic signing), not physical (electricity/hardware) like in Bitcoin’s proof-of-work. Old private keys can still produce valid block signatures, meaning an attacker who acquires keys from former validators (who withdrew their stake years ago) could replay history and mint an entirely valid alternative chain from any historical point.


Why PoS Is Vulnerable

In proof-of-work (Bitcoin):

  • Rewriting 1 year of blocks requires 1 year’s worth of actual computational work (electricity, hardware)
  • The cost of a long-range rewrite is physically prohibitive — you cannot fake past hash work

In naive proof-of-stake:

  • Old blocks were signed by validators who held stake at that time
  • If those validators later withdrew their stake and their private keys leaked/were sold/were acquired by an attacker, those keys still produce perfectly valid cryptographic signatures for old blocks
  • An attacker can fast-forward signatures computationally (no real-world energy cost) and create an alternative chain from any point in history
  • This alternative chain can be made to look exactly as valid as the real chain to a new node joining the network

Variants of Long-Range Attacks

The following sections cover this in detail.

Simple Long-Range Attack

Posterior Corruption

Stake-Bleeding Attack


Defenses

Weak Subjectivity (Vitalik Buterin’s proposed solution, adopted by Ethereum):

  • New nodes joining the network must accept a recent “checkpoint” from trusted sources (other nodes, clients, social consensus) rather than purely trusting longest-chain rule for chain selection from genesis
  • This checkpoint must be recent enough that all current validators’ stake (potential attackers) hasn’t been fully withdrawn
  • The “weak subjectivity period” defines the window during which historical checkpoints must be within — in Ethereum, approximately 4 months (finality delay makes this practical)

Key Deletion (Forward Security):

  • Validators delete signing keys after use, preventing future acquisition of old keys
  • Technically challenging to guarantee — hardware and backup realities make complete key deletion difficult

Slashing and Liveness:

  • Slashing penalizes equivocation (signing two different blocks at the same height), but slashing requires being on the honest chain to execute — limited help against long-range attacks that start from before the slashing contract existed

Short Finality Windows:

  • Ethereum’s finality (blocks finalized every ~12 minutes) limits the “nothing-at-stake” window to recent, current validators — but doesn’t prevent historical attacks before finality existed

Ethereum’s Implementation

Ethereum’s Casper PoS addresses long-range attacks through weak subjectivity:

  • The Ethereum spec defines a weak subjectivity period (~4 months)
  • New nodes syncing from scratch use hardcoded checkpoint hashes from the Ethereum client software (maintained by client teams)
  • Nodes that have been offline for more than the weak subjectivity period must re-synchronize from a trusted checkpoint, not solely from the P2P network
  • Staking withdrawal delays (originally 18 months+, now shorter post-Shanghai) ensure enough stake is at risk during the weak subjectivity window to deter long-range rewriting

History

Year Event
2012-13 Long-range attacks theorized in early PoS design critiques
2014 Vitalik Buterin publishes “Weak Subjectivity” — the canonical defense framework
2018 Research into stake-bleeding attacks formalized by researchers
2022 Ethereum Merge (to PoS) — uses weak subjectivity checkpoints in all major clients (Prysm, Lighthouse, Teku)
2023-24 Academic papers continue analyzing PoS security assumptions; no successful long-range attack on major chains

Common Misconceptions

“Long-range attacks can happen easily on Ethereum”

No significant PoS network has been successfully long-range attacked. The weak subjectivity defense, combined with large validator sets and hardcoded checkpoints in well-maintained clients, makes practical exploitation extremely difficult. The attack is a theoretical concern addressed in PoS design, not a present operational threat.

“PoW is completely immune to long-range attacks”

PoW chains can also be reorganized historically if enough hash power is acquired — Bitcoin’s 51% attack is a present-tense computation attack, not a temporal one, but massive historic reorgs on PoW are practically impossible due to energy costs. PoW’s advantage is physical cost; PoS compensates via different mechanisms.


Social Media Sentiment

Long-range attacks are primarily discussed in academic blockchain security literature and technical forums rather than mainstream crypto Twitter. They are a standard topic in PoS critique from Bitcoin maximalists, who cite “nothing-at-stake” and related attacks as fundamental weaknesses of PoS. Ethereum researchers (particularly Vitalik Buterin and Justin Drake) have extensively addressed these critiques through the weak subjectivity framework. The debate between PoW’s physical security guarantee and PoS’s weak subjectivity reliance is ongoing and genuinely philosophically interesting — PoS critics argue that requiring trusted checkpoints reintroduces a form of social consensus/trust that undermines pure cryptographic security.


Last updated: 2026-04

Related Terms


Sources

  • Buterin, V. (2014). Proof of Stake: How I Learned to Love Weak Subjectivity. Ethereum Blog.
  • Deirmentzoglou, E., Papakyriakopoulos, G., & Patsakis, C. (2019). A Survey on Long-Range Attacks for Proof of Stake Protocols. IEEE Access.
  • Ethereum Foundation. (2022). The Merge: Casper PoS Consensus Mechanism and Security Properties. Ethereum.org.