This article is within the scope of WikiProject Computing, a collaborative effort to improve the coverage of computers, computing, and information technology on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.ComputingWikipedia:WikiProject ComputingTemplate:WikiProject ComputingComputing articles
This article is within the scope of WikiProject Economics, a collaborative effort to improve the coverage of Economics on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.EconomicsWikipedia:WikiProject EconomicsTemplate:WikiProject EconomicsEconomics articles
This article is within the scope of WikiProject Cryptocurrency, a collaborative effort to improve the coverage of cryptocurrency on Wikipedia. If you would like to participate, please visit the project page, where you can join the discussion and see a list of open tasks.CryptocurrencyWikipedia:WikiProject CryptocurrencyTemplate:WikiProject CryptocurrencyWikiProject Cryptocurrency articles
Without doing original research, ha.
if I recall correctly double-spending:
has been demonstrated as a working fraud vector against at least one subway pass card system in use in multiple major cities (as if any minor systems have subways)
is mitigated in the Bitcoin system by distributing the central recording authority function
is mitigated in the MintChip system by embedding a private key and circuitry for using it in EEPROM/FPGA devices which are too small to read and copy without destroying them
In the Bitcoin protocol double spend is possible if the attacker succeeds in getting two contradicting transactions confirmed at the same time. Commonly, the attack is mitigated by requiring a transaction to be consistent with a certain amount of consecutive confirmations before considering it valid. An attacker would very unlikely have the relative computing power share at his hands required to confirm his fraudulent spendings before others in the distributed network invalidate either of the transactions, eliminating the illegal second spending. — Preceding unsigned comment added by Lmx613 (talk • contribs) 11:37, 9 January 2014 (UTC)[reply]
I came here to understand Double Spending, but the page is literally indecipherable. For example:
"...such double-spending are Inflation by "create" a new amount of not-removed currency...".
This makes no sense in English. I appreciate someone taking the time to expand the ideas here, however, the page is unreadable. If someone that is fluent in written English and also highly knowledgeable of cryptocurrency concepts could please edit the page so that it can actually be used that would be great. This is not a criticism. I'm merely trying to bring awareness to this issue in hopes that it can be resolved.
Jonassteinberg (talk) 18:08, 16 July 2017 (UTC)jonassteinbergJonassteinberg (talk) 18:08, 16 July 2017 (UTC)[reply]
The following discussion is closed. Please do not modify it. Subsequent comments should be made in a new section.A summary of the conclusions reached follows.
The result of this discussion was redirect. Uncontested, not much content that ought to be merged right now IMO. Џ13:30, 30 January 2019 (UTC)[reply]
Support this proposal to merge as I think the 2018 double spend attacks article is unlikely to get any more content (as it is a single event page) and merging it will allow the broader double spend attack article to grow its content. Seems like an interesting subject and if there were a few different double spend attacks covered on one general article it might be more encyclopedic. Jtbobwaysf (talk) 06:47, 26 December 2018 (UTC)[reply]
Support The page as it stands is not worthy of an article. There is currently some information on Bitcoin Gold that may be worth merging over, otherwise I would even suggest nominating this article for deletion. Dr-Bracket (talk) 04:08, 16 January 2019 (UTC)[reply]
The discussion above is closed. Please do not modify it. Subsequent comments should be made on the appropriate discussion page. No further edits should be made to this discussion.
Empirical examples of double spending (or lack thereof)
It would be nice to add a few case studies if there're things like that. Otherwise, should say somewhere that no known double spending ever worked in proof of work contexts (that isn't a 51% attack) PolyCreator (talk) 06:12, 20 April 2022 (UTC)[reply]
Double Spend problem, is not a digital problem - its a design problem
"Double-spending is a fundamental flaw in a digital cash protocol" NOOOOO
For something to be Money, it is required to be scarce. This is true of any money, including PAPER CURRENCY
Technology is used in the DESIGN of any currency to prevent Double Spend AKA Counterfeit!
When an issuer of paper currency employs special paper or printing methods and penalties for fraud they are attempting to enforce scarcity, prevent double spending.
Example; 17th century - new france, card money were printed on cards printed in france and signed by intendant, governor, and treasurer.
Double Spend problem, is not a digital problem of electronic cash - its a fundamental design problem of money generally.