What prevents attackers from faking stakes in proof of stake chains since they don't have to solve computational puzzles?

前端 未结 0 1775
独厮守ぢ
独厮守ぢ 2021-02-14 07:55

In proof of work, an attacker has to find a nonce that when hashed will satisfy the "target" requirement. That means it takes computational power to create a fake bloc

相关标签:
回答
  • 消灭零回复
提交回复
热议问题