Books

Books about cryptocurrencies & blockchain

"As such, the verification is reliable as long as honest nodes control the network, but is more vulnerable if the network is overpowered by an attacker. While network nodes can verify transactions for themselves, the simplified method can be fooled by an attacker's fabricated transactions for as long as the attacker can continue to overpower the network." (S. Nakamoto)

Add a link



Suggest a link:

In order to add a link, you should post it from a personal Facebook account (not from a page); posts by pages are deleted by Facebook if they contain links.


Post a featured link


Follow us: Facebook Twitter Medium Telegram

HOME