📢 Gate Square Exclusive: #WXTM Creative Contest# Is Now Live!
Celebrate CandyDrop Round 59 featuring MinoTari (WXTM) — compete for a 70,000 WXTM prize pool!
🎯 About MinoTari (WXTM)
Tari is a Rust-based blockchain protocol centered around digital assets.
It empowers creators to build new types of digital experiences and narratives.
With Tari, digitally scarce assets—like collectibles or in-game items—unlock new business opportunities for creators.
🎨 Event Period:
Aug 7, 2025, 09:00 – Aug 12, 2025, 16:00 (UTC)
📌 How to Participate:
Post original content on Gate Square related to WXTM or its
NEST Oracle Machine faces the risk of Mining Pool attacks, Decentralization is under challenge.
Challenges of Mining Pool Attacks Faced by NEST Distributed Oracle Machine
The NEST distributed Oracle Machine aims to improve the reliability of Oracle Machine data and the security of the system by allowing more on-chain users to participate in the price determination process. To address potential malicious quoting issues, NEST has designed a quote-eat order verification mechanism that allows validators to trade based on the quote and propose corrections.
However, the effective operation of this mechanism relies on the timely appearance of order eating and new quoted transactions in new blocks. With the rise of mining pools, some large mining pools may take advantage of their computational power to selectively package transactions that are beneficial to themselves, thereby affecting the normal operation of the NEST Oracle Machine.
The mining pool against the NEST Oracle Machine for rejecting packing attacks mainly includes the following steps:
Malicious Mining Pool accumulates cryptocurrency in advance for arbitrage.
Submit a quote to NEST that significantly deviates from the actual market price.
During the verification period, normally there will be validators proposing eating single transactions and correcting quotes.
Malicious Mining Pools may choose not to package these corrected transactions, resulting in erroneous quotes not being verified in a timely manner.
Ultimately, NEST may output incorrect price data, giving malicious mining pools the opportunity to arbitrage.
From the perspective of game theory, each Mining Pool weighs two types of gains when deciding whether to package and correct transactions: the gains from immediately correcting the quote, and the potential arbitrage gains from not correcting the quote. The Mining Pool makes a choice based on its share of computing power and profit ratio, ultimately reaching a Nash equilibrium state.
This type of attack not only threatens the NEST Oracle Machine but also reflects the challenge that mining pool centralization poses to the entire blockchain decentralization concept. How to address the issues brought by mining pools while maintaining decentralization is an important topic on the road to the development of blockchain technology.