Difference between revisions of "Attacks on Bitcoin"

(Created page with "A hypothetical attack where a node with a majority of hash power seeks to produce blocks with double spends, invalid transactions or ruleset violations. Such an attack cannot...")
 
Line 1: Line 1:
A hypothetical attack where a node with a majority of hash power seeks to produce blocks with double spends, invalid transactions or ruleset violations. Such an attack cannot be performed without a node committing significant resources to such an attack and leaving an immutable evidence trail of their attack which can be forensically analysed.
+
A hypothetical attack where a node with a majority of hash power seeks to produce blocks with double spends, invalid transactions or ruleset violations. Such an attack cannot be performed without a node committing significant costly resources while leaving an immutable evidence trail which can be forensically analysed.

Revision as of 05:13, 20 April 2022

A hypothetical attack where a node with a majority of hash power seeks to produce blocks with double spends, invalid transactions or ruleset violations. Such an attack cannot be performed without a node committing significant costly resources while leaving an immutable evidence trail which can be forensically analysed.