Summary
In blockchain, a fork is defined variously as: "what happens when a blockchain diverges into two potential paths forward" "a change in protocol", or a situation that "occurs when two or more blocks have the same block height" Forks are related to the fact that different parties need to use common rules to maintain the history of the blockchain. When parties are not in agreement, alternative chains may emerge. While most forks are short-lived some are permanent. Short-lived forks are due to the difficulty of reaching fast consensus in a distributed system. Whereas permanent forks (in the sense of protocol changes) have been used to add new features to a blockchain, they can also be used to reverse the effects of hacking such as the case with Ethereum and Ethereum Classic, or avert catastrophic bugs on a blockchain as was the case with the bitcoin fork on 6 August 2010. The concept of blockchain technology was first introduced in 2008 by an unknown person or group of people using the pseudonym “Satoshi Nakamoto” in a white paper describing the design of a decentralized digital currency called Bitcoin. Blockchain forks have been widely discussed in the context of the bitcoin scalability problem. Forks can be classified as accidental or intentional. Accidental fork happens when two or more miners find a block at nearly the same time. The fork is resolved when subsequent block(s) are added and one of the chains becomes longer than the alternative(s). The network abandons the blocks that are not in the longest chain (they are called orphaned blocks). Intentional forks that modify the rules of a blockchain can be classified as follows: A hard fork is a change to the blockchain protocol that is not backward-compatible and requires all users to upgrade their software in order to continue participating in the network. In a hard fork, the network splits into two separate versions: one that follows the new rules and one that follows the old rules. For example, Ethereum was hard-forked in 2016 to "make whole" the investors in The DAO, which had been hacked by exploiting a vulnerability in its code.
About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.