On Aug 17, 2015 5:29 PM, "Peter Todd via bitcoin-dev" < bitcoin-dev@lists.linuxfoundation.org> wrote: From the point of view of a > wallet, it's not very secure to use Hearn-style SPV mode, and volunteers > running full nodes doesn't help things. Sybil attacking the IP address > space is pretty easy in comparison to aquiring hashing power sufficient > to create false confirmations, so any attacker able to do the former > will likely be running the full node you're connecting too anyway. > Ultimately, Hearn-style SPV is a close approximation to just trusting > anyone with a non-trivial amount of hashing power. (and getting that is > surprisingly easy, e.g. w/ SPV mining) Can you explain how the spv node fails against an attacker with a non-trivial amount of hash power where a full node doesn't? To attack an spv wallet that is waiting for 6 or 10 confirmations, you would not only need to Sybil them but also summon a massive amount of hashing power to create a chain of headers (while forgoing the opportunity to mine valid blocks with that hash power). But could someone with that much hash power not Sybil a full node and give them a chain for valid blocks (but on an orphan fork)? The failure model doesn't seem specific to spv to me.