{"id":16282,"date":"2026-03-18T12:01:09","date_gmt":"2026-03-18T19:01:09","guid":{"rendered":"https:\/\/jasonsblog.ddns.net\/?p=16282"},"modified":"2026-03-18T12:26:46","modified_gmt":"2026-03-18T19:26:46","slug":"bitcoin-is-so-resilient-it-could-survive-as-much-as-90-of-the-worlds-undersea-cables-failing-simultaneously-study-reveals-bitcoin-could-still-be-very-vulnerable-to-targeted-attacks","status":"publish","type":"post","link":"https:\/\/jasonsblog.ddns.net\/index.php\/2026\/03\/18\/bitcoin-is-so-resilient-it-could-survive-as-much-as-90-of-the-worlds-undersea-cables-failing-simultaneously-study-reveals-bitcoin-could-still-be-very-vulnerable-to-targeted-attacks\/","title":{"rendered":"Bitcoin Is So Resilient It Could Survive As Much as 90% of the World\u2019s Undersea Cables Failing Simultaneously"},"content":{"rendered":"\n<p>There are a lot of personal nodes distributed around the world, so I doubt the secondary conclusion about a directed attack at hosting providers. And really, anyone interested in using <a href=\"https:\/\/jasonsblog.ddns.net\/index.php\/2025\/09\/12\/the-case-for-the-only-cryptocurrency-of-value-bitcoin\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bitcoin<\/a> should have their own node to verify the transactions for themselves, as well as protecting their privacy. For instance my nodes use I2P and Tor, and recently one node had an issue with Tor which required me to refresh its keys and get a new hidden service address, so some nefarious nodes on the Tor network were working to deanonymize hidden services. Of course, unknown if this was academic research or a government contractor. Consequently, I do notice some issues with Tor while browsing, even with me running my own bridge with obfuscation. And the Tor devs are slow to act on fixing a couple ways Tor can be attacked at the moment to identify hidden services, which might point to government actors.<\/p>\n\n\n\n<p><a href=\"https:\/\/www.tomshardware.com\/tech-industry\/cryptocurrency\/bitcoin-is-so-resilient-it-could-survive-as-much-as-90-percent-of-the-worlds-undersea-cables-failing-simultaneously-study-reveals-bitcoin-could-still-be-very-vulnerable-to-targeted-attacks-however\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.tomshardware.com\/tech-industry\/cryptocurrency\/bitcoin-is-so-resilient-it-could-survive-as-much-as-90-percent-of-the-worlds-undersea-cables-failing-simultaneously-study-reveals-bitcoin-could-still-be-very-vulnerable-to-targeted-attacks-however<\/a><\/p>\n\n\n<div class=\"wp-block-ub-divider ub_divider ub-divider-orientation-horizontal\" id=\"ub_divider_e0e84dfd-af28-4fdb-a0e2-d8f6e82ca9d0\"><div class=\"ub_divider_wrapper\" style=\"position: relative; margin-bottom: 2px; width: 100%; height: 2px; \" data-divider-alignment=\"center\"><div class=\"ub_divider_line\" style=\"border-top: 2px solid #ccc; margin-top: 2px; \"><\/div><\/div><\/div>\n\n\n<p>By Mark Tyson <\/p>\n\n\n\n<p>Cambridge scientists have completed the first longitudinal study of the cryptocurrency&#8217;s resilience.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/cdn.mos.cms.futurecdn.net\/ZqRDGn3Uz3tnD9UV73Jz6M.jpg\" alt=\"Undersea cable\"\/><figcaption class=\"wp-element-caption\">(Image credit: Getty)<\/figcaption><\/figure>\n\n\n\n<p id=\"8f41f658-8acf-4d57-90a7-a7de7b09192f\">Cambridge scientists have completed the first longitudinal study of Bitcoin\u2019s resilience to network infrastructure disruption, with a particular eye on <a href=\"https:\/\/www.tomshardware.com\/tech-industry\/congressional-report-warns-of-chinese-undersea-cable-cutting-capabilities\">submarine data cable<\/a> incidents (<a href=\"https:\/\/arxiv.org\/pdf\/2602.14372\" target=\"_blank\" rel=\"noreferrer noopener\">PDF paper<\/a>). The conclusion is that \u201cBitcoin is highly resilient to random cable failures,\u201d with the scientists saying that between 72% and 92% of the world&#8217;s submarine cables would need to be severed simultaneously to result in significant mode disconnection. Nevertheless, the research team observed that <a href=\"https:\/\/www.tomshardware.com\/tech-industry\/cryptomining\/3d-printer-that-can-mine-bitcoin-uses-excess-heat-for-temperature-control-throttled-asics-use-printing-bed-as-a-heatsink\">Bitcoin <\/a>could be very vulnerable to targeted attacks.<\/p>\n\n\n\n<figure class=\"wp-block-image\" id=\"47535738-b591-4f5a-b18a-ce216a49fab3\"><a class=\"expand-button icon-expand-image icon\" href=\"https:\/\/cdn.mos.cms.futurecdn.net\/uz2cxUTSAAxjT9AXCJPw9o.jpg\" target=\"_blank\" rel=\"noreferrer noopener\"><img decoding=\"async\" src=\"https:\/\/cdn.mos.cms.futurecdn.net\/uz2cxUTSAAxjT9AXCJPw9o.jpg\" alt=\"Bitcoin Under Stress: Measuring InfrastructureResilience 2014&amp;ndash;2025\"\/><\/a><figcaption class=\"wp-element-caption\">(Image credit: <a href=\"https:\/\/arxiv.org\/pdf\/2602.14372\" target=\"_blank\" rel=\"noreferrer noopener\">Cambridge Centre for Alternative Finance<\/a>)<\/figcaption><\/figure>\n\n\n\n<p id=\"00680f26-eef7-4a02-b2e2-2f79e95a3f78\">The study took data from 11 years of P2P network traffic and measured the impacts of 68 verified cable fault events (though Bitcoin has been a thing since 2009). As hinted at in the intro, there is a stark contrast between the impacts of \u2018random\u2019 cable failure events and what could happen if someone were intent on disrupting this iconic <a href=\"https:\/\/www.tomshardware.com\/news\/irs-warns-cryptocurrency-owners-taxes,40033.html\">cryptocurrency<\/a>.<a><\/a><\/p>\n\n\n\n<p id=\"00680f26-eef7-4a02-b2e2-2f79e95a3f78-1\">Central to the resiliency report is the application of a Buldyrev\u2011style cascade model to the data. This helps assess real-world systems full of interdependencies: things like computer networks, power grids, and transportation systems.Article continues below You may like<\/p>\n\n\n\n<p>Using this math, the Cambridge scientists reckon Bitcoin\u2019s failure threshold for random failures is between 72% and 92%. It is also observed that the adoption of the Tor protocol has proven to be a barrier to disruption. \u201cBitcoin\u2019s shift to Tor represents a self-organized response to regulatory pressure that simultaneously enhances infrastructure resilience, where censorship resistance and physical robustness are complementary rather than competing properties,\u201d say the Cambridge scientists in their conclusion.<\/p>\n\n\n\n<p>As for targeted attacks on the network, that\u2019s a different story. Bitcoin is \u201cfar more vulnerable to targeted attacks,\u201d note the researchers. A malicious actor targeting just five of the largest routing domains (Hetzner, OVH, Comcast, <a href=\"https:\/\/www.tomshardware.com\/tag\/amazon\">Amazon<\/a>, and <a href=\"https:\/\/www.tomshardware.com\/tag\/google\">Google<\/a> Cloud) would cripple the Bitcoin network.<\/p>\n\n\n\n<p>Image 1 of 2<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/cdn.mos.cms.futurecdn.net\/AoqkmmETTEwawFgBdx5q9o.jpg\" alt=\"Bitcoin Under Stress: Measuring InfrastructureResilience 2014\u20132025\"\/><figcaption class=\"wp-element-caption\">(Image credit: <a href=\"https:\/\/arxiv.org\/pdf\/2602.14372\" target=\"_blank\" rel=\"noreferrer noopener\">Cambridge Centre for Alternative Finance<\/a>)<\/figcaption><\/figure>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/cdn.mos.cms.futurecdn.net\/NWXm7uAGbTaAh5DW8EZcd.jpg\" alt=\"Bitcoin Under Stress: Measuring InfrastructureResilience 2014\u20132025\"\/><figcaption class=\"wp-element-caption\">(Image credit: <a href=\"https:\/\/arxiv.org\/pdf\/2602.14372\" target=\"_blank\" rel=\"noreferrer noopener\">Cambridge Centre for Alternative Finance<\/a>)<\/figcaption><\/figure>\n\n\n\n<p id=\"4e8e09d7-dd47-42e7-8c3e-06a8959bb128\">Overall, the study conclusions are quite positive for cryptocurrency fans. However, the resiliency of the networks that crypto needs to be maintained is under more pressure than ever before, with cables in the <a href=\"https:\/\/www.tomshardware.com\/networking\/undersea-cable-cutting-shenanigans-lead-finland-to-create-a-dedicated-maritime-surveillance-center-russian-shadow-fleet-operations-heighten-concerns-in-the-baltic-sea\">Baltic<\/a>, waters around the Middle East, and the <a href=\"https:\/\/www.tomshardware.com\/networking\/taiwanese-authorities-detain-fishy-chinese-freighter-suspected-of-cutting-undersea-internet-cable\">Taiwan Strait<\/a> all attracting unwelcome disruptions in recent months.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>There are a lot of personal nodes distributed around the world, so I doubt the secondary conclusion about a directed attack at hosting providers. And really, anyone interested in using Bitcoin should have their own node to verify the transactions for themselves, as well as protecting their privacy. For instance my nodes use I2P and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-16282","post","type-post","status-publish","format-standard","hentry","category-tech"],"blocksy_meta":[],"featured_image_src":null,"author_info":{"display_name":"Jason","author_link":"https:\/\/jasonsblog.ddns.net\/index.php\/author\/jturning\/"},"_links":{"self":[{"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/posts\/16282","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/comments?post=16282"}],"version-history":[{"count":3,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/posts\/16282\/revisions"}],"predecessor-version":[{"id":16287,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/posts\/16282\/revisions\/16287"}],"wp:attachment":[{"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/media?parent=16282"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/categories?post=16282"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jasonsblog.ddns.net\/index.php\/wp-json\/wp\/v2\/tags?post=16282"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}