Learn Before
Relation
Implementation of a double-spending attack in Proof-of-Stake
- An attacker purchases a physical good with a number of native coins
- A merchant transfers possession of the physical good after waiting for a certain number of blocks to be linked to the transaction
- Once the attacker receives the physical good, they create a new branch without the transaction
- For the attack to succeed, the new branch must become as long as the initial branch
0
1
Updated 2021-11-18
Tags
Cryptoeconomics
Economics
Social Science
Empirical Science
Science