Relation

Collusion with PoH Generator

If an attacker were to know the randomly selected bytes, they could delete the bytes that are not going to be checked. They could also inject transactions at the end of the block to steal from the network. This is combated by the use of cryptographic hashes. A created hash would differ from the others.

0

1

Updated 2021-11-03

Tags

Cryptoeconomics

Economics

Social Science

Empirical Science

Science

Related