In proof of work, an attacker has to find a nonce that when hashed will satisfy the "target" requirement. That means it takes computational power to create a fake bloc