📢 Exclusive on Gate Square — #PROVE Creative Contest# is Now Live!
CandyDrop × Succinct (PROVE) — Trade to share 200,000 PROVE 👉 https://www.gate.com/announcements/article/46469
Futures Lucky Draw Challenge: Guaranteed 1 PROVE Airdrop per User 👉 https://www.gate.com/announcements/article/46491
🎁 Endless creativity · Rewards keep coming — Post to share 300 PROVE!
📅 Event PeriodAugust 12, 2025, 04:00 – August 17, 2025, 16:00 UTC
📌 How to Participate
1.Publish original content on Gate Square related to PROVE or the above activities (minimum 100 words; any format: analysis, tutorial, creativ
NEST Oracle Machine faces the risk of Mining Pool attacks, Decentralization is under challenge.
Challenges of Mining Pool Attacks Faced by NEST Distributed Oracle Machine
The NEST distributed Oracle Machine aims to improve the reliability of Oracle Machine data and the security of the system by allowing more on-chain users to participate in the price determination process. To address potential malicious quoting issues, NEST has designed a quote-eat order verification mechanism that allows validators to trade based on the quote and propose corrections.
However, the effective operation of this mechanism relies on the timely appearance of order eating and new quoted transactions in new blocks. With the rise of mining pools, some large mining pools may take advantage of their computational power to selectively package transactions that are beneficial to themselves, thereby affecting the normal operation of the NEST Oracle Machine.
The mining pool against the NEST Oracle Machine for rejecting packing attacks mainly includes the following steps:
Malicious Mining Pool accumulates cryptocurrency in advance for arbitrage.
Submit a quote to NEST that significantly deviates from the actual market price.
During the verification period, normally there will be validators proposing eating single transactions and correcting quotes.
Malicious Mining Pools may choose not to package these corrected transactions, resulting in erroneous quotes not being verified in a timely manner.
Ultimately, NEST may output incorrect price data, giving malicious mining pools the opportunity to arbitrage.
From the perspective of game theory, each Mining Pool weighs two types of gains when deciding whether to package and correct transactions: the gains from immediately correcting the quote, and the potential arbitrage gains from not correcting the quote. The Mining Pool makes a choice based on its share of computing power and profit ratio, ultimately reaching a Nash equilibrium state.
This type of attack not only threatens the NEST Oracle Machine but also reflects the challenge that mining pool centralization poses to the entire blockchain decentralization concept. How to address the issues brought by mining pools while maintaining decentralization is an important topic on the road to the development of blockchain technology.