Difference between revisions of "Attacks on Bitcoin"
Todd Price (talk | contribs) (Created page with "A hypothetical attack where a node with a majority of hash power seeks to produce blocks with double spends, invalid transactions or ruleset violations. Such an attack cannot...") |
Todd Price (talk | contribs) |
||
Line 1: | Line 1: | ||
− | A hypothetical attack where a node with a majority of hash power seeks to produce blocks with double spends, invalid transactions or ruleset violations. Such an attack cannot be performed without a node committing significant resources | + | A hypothetical attack where a node with a majority of hash power seeks to produce blocks with double spends, invalid transactions or ruleset violations. Such an attack cannot be performed without a node committing significant costly resources while leaving an immutable evidence trail which can be forensically analysed. |
Revision as of 05:13, 20 April 2022
A hypothetical attack where a node with a majority of hash power seeks to produce blocks with double spends, invalid transactions or ruleset violations. Such an attack cannot be performed without a node committing significant costly resources while leaving an immutable evidence trail which can be forensically analysed.