Learn Before
Concept
Vulnerability of Verification
Verification is reliable as long as honest nodes control the network, but is more vulnerable if the network is overpowered by an attacker using fabricated transactions. One strategy to protect against this is to accept alerts from network nodes when they detect an invalid block, then download the full block and alerted transactions to confirm the inconsistency. Users that receive frequent payments may choose to run their own nodes for more independent security and quicker verification.
0
1
Updated 2021-10-20
Tags
Cryptoeconomics
Economics
Social Science
Empirical Science
Science