Learn Before
Relation
Collusion with PoH Generator
If an attacker were to know the randomly selected bytes, they could delete the bytes that are not going to be checked. They could also inject transactions at the end of the block to steal from the network. This is combated by the use of cryptographic hashes. A created hash would differ from the others.
0
1
Updated 2021-11-03
Tags
Cryptoeconomics
Economics
Social Science
Empirical Science
Science