Chain Reorg (Reorganization)

Chain Reorg (Reorganization): Blockchain History Changes

Chain reorgs occur when a blockchain adopts a different version of transaction history, potentially reversing confirmed transactions. It’s like time travel, but messier and more expensive.

A chain reorganization (reorg) happens when a blockchain network adopts an alternative chain of blocks as the canonical history, potentially reversing previously confirmed transactions. This can occur due to network splits, competing miners, or consensus failures.

How Chain Reorgs Work

Competing chains develop when different groups of miners or validators work on different versions of blockchain history simultaneously.

Longest chain rule (or other consensus mechanisms) eventually determines which chain becomes official, potentially orphaning blocks from the alternative chain.

Transaction reversal affects any transactions that were included in orphaned blocks, requiring them to be re-confirmed in the new canonical chain.

Chain reorganization diagram showing canonical blockchain branch versus orphaned competing branch

Real-World Examples

  • Ethereum Classic experienced deep reorgs during 51% attacks that reversed thousands of blocks
  • Bitcoin Cash has had several reorgs during periods of hash rate instability
  • Polygon faced a 157-block reorg in 2023 due to infrastructure issues

Why Beginners Should Care

Confirmation security requires waiting for multiple block confirmations to reduce the risk of transaction reversal from reorgs.

Exchange impacts as platforms may halt deposits/withdrawals during suspected reorgs to prevent double-spending attacks.

Network stability indicators include reorg frequency and depth, which signal overall blockchain health and security.

Related Terms: 51% Attack, Block Confirmation, Consensus Mechanism, Double Spending

Back to Crypto Glossary

Similar Posts

  • Wrapped Token

    Wrapped Token: Bringing Assets Cross-Chain Wrapped tokens let you use Bitcoin on Ethereum, Ethereum on Solana, and any asset on any blockchain. They’re the universal adapters of crypto. A wrapped token is a cryptocurrency that represents another asset on a different blockchain, maintaining a 1:1 peg through collateralization. The original asset gets locked in a…

  • Hash Rate

    Hash Rate: Network Security Measurement Hash rate measures how much computational power secures a blockchain network. Higher hash rates mean stronger security against attacks and manipulation. Hash rate is the total computational power used by miners to process transactions and secure a proof-of-work blockchain network. It’s measured in hashes per second – calculations attempting to…

  • Real Yield

    Real Yield: Sustainable Return GenerationReal yield refers to returns generated from actual economic activity and revenue rather than token emissions or inflationary rewards. It's like earning interest from a bank's profitable lending operations instead of them just printing more money to pay you.Real yield describes investment returns generated from genuine economic activity, protocol revenue, or…

  • Consensus Rules

    Consensus Rules: Network Agreement ProtocolsConsensus rules define how blockchain networks validate transactions and maintain agreement about the ledger state. They're like the constitution for digital money systems.Consensus rules are the specific protocols and requirements that all network participants must follow to validate transactions, create blocks, and maintain agreement about the blockchain's current state. These rules ensure…

  • Self-Custody

    Self-Custody: Direct Asset ControlSelf-custody means personally controlling your cryptocurrency private keys rather than trusting third parties to hold your assets. It's like keeping cash in your own safe instead of depositing it in someone else's bank account.Self-custody refers to the practice of personally maintaining control over cryptocurrency private keys and digital assets without relying on…

  • Wallet Signature Spoofing

    Wallet Signature Spoofing: Fake Authorization Attacks Wallet signature spoofing tricks users into signing malicious transactions that appear legitimate but actually authorize harmful actions. It’s like signing a contract where the fine print changes after you sign. Wallet signature spoofing involves presenting misleading information about transaction contents to trick users into signing authorizations for unintended actions….