Bata Whitepaper


World’s first implementation of connections firewall & artificially intelligent attack detection.
Why a firewall?

“Attackers chosen coins that are traded on big exchanges (in this case our
friends from Bittrex) and made a double spend attack due to owning more
than 51% hashes needed.”

Bitcoin Firewall 1.1 uses a very unique method for detecting potential
hard-fork attacks, coupled with dynamic block chain DDoS flooding. All connected
nodes/peers are examined using a dynamic rule set. By quickly avoiding long-term
acceptance of malicious commands and transactions, Bitcoin based developers of cryptocoins
can easily mitigates risks involved with low network hash-rates, and the costs involved
with attempting to maintain the majority of network hashing.

If rule set criteria are met, the connecting node is further examined to verify that their
blockchain start height is within safe limits of the average among all peers connected. Rangebased
dynamic blockchain checkpoints implementing averages instead of static heights,
further enhance network security by limiting potential attacks known as “more than 51% of
distributed hashing power”. Once a potential attack is detected: the connected node/peer is
forcefully terminated and added to a session blacklist and immediately refused future
connections. This can be considered a temporary session break, for safety.

Bata Website
Bata Whitepaper