What is a Replay attack?
A Replay Attack is an exploit that can occur when two forked crypto-currencies allow transactions to be valid across both chains.
In this Article:
what does a Replay Attack look like?
Let’s say BTC forks into BT1 and BT2, and before the fork, you held all your BTC in one wallet.
You create a transaction that says “send 3 coins from my wallet to address Y.” You sign it, and you broadcast it to the BT2 network. The transaction circulates the BT2 network and is eventually confirmed, transferring 3 BT2 coins to address Y.
But somewhere along the line, somebody out there sees your transaction data, copies it, and re-uploads it to the BT1 network. Since there is no replay protection, the transaction is valid on the BT1 network as well.
The result is that not only are your 3 BT2 coins sent to address Y but so are your 3 BT1 coins! Except those end up on address Y on the BT1 chain.
What is a Replay Attack?
As we can see with the help of the above example, A Replay Attack does not mean someone else has control over your funds. A Replay Attack can only copy an existing transaction from the new forked blockchain and make an identical one in the old blockchain (or the other way around).
Keep in mind that transactions sent without proper replay protection can be subject to a replay attack months or even years later. This is why not sending or exchanging an asset forked without Replay Protection is the safest way to go if you want to be able to claim your forked coins down the line.
You can read more about replay attacks in this article.
Please Note: The Exodus team has created a way to protect your BCH and BSV with replay protection of our own making.