Learn Before
Concept

Vulnerability of Verification

Verification is reliable as long as honest nodes control the network, but is more vulnerable if the network is overpowered by an attacker using fabricated transactions. One strategy to protect against this is to accept alerts from network nodes when they detect an invalid block, then download the full block and alerted transactions to confirm the inconsistency. Users that receive frequent payments may choose to run their own nodes for more independent security and quicker verification.

0

1

Updated 2021-10-20

Tags

Cryptoeconomics

Economics

Social Science

Empirical Science

Science