Difference between revisions of "51% attack"
Todd Price (talk | contribs) (Created page with "A hypothetical attack where a node with a majority of hash power seeks to produce blocks with double spends, invalid transactions or ruleset violations. Such an attack cannot...") |
Todd Price (talk | contribs) |
||
Line 1: | Line 1: | ||
− | A hypothetical attack where a node with | + | A hypothetical attack where a node with more than 50% of the network hash power seeks to produce blocks with double spends, invalid transactions or ruleset violations. |
+ | |||
+ | Such an attack cannot be performed without a node committing significant costly resources while leaving an immutable evidence trail which can be forensically analysed. | ||
+ | |||
+ | No such attack has ever been executed successfully. |
Latest revision as of 05:17, 20 April 2022
A hypothetical attack where a node with more than 50% of the network hash power seeks to produce blocks with double spends, invalid transactions or ruleset violations.
Such an attack cannot be performed without a node committing significant costly resources while leaving an immutable evidence trail which can be forensically analysed.
No such attack has ever been executed successfully.