"As such, the verification is reliable as long as honest nodes control the network, but is more vulnerable if the network is overpowered by an attacker. While network nodes can verify transactions for themselves, the simplified method can be fooled by an attacker's fabricated transactions for as long as the attacker can continue to overpower the network." (S. Nakamoto)
Add a link
- Mastering Bitcoin - Mostly for developers. The second edition was published in June 2017.
- The Internet of Money - Significance of bitcoin through series of essays spanning the exhilarating maturation of this technology.
- Ethereum - Non-technical guide to understand blockchains. Mostly focused on Ethereum.
- The Age of Cryptocurrency - Insight into the modern financial system and the Bitcoin industry.
- Programming Cryptocurrencies and Blockchains - Learn to build your own blockchains and peer-to-peer central bank nodes from scratch.
Suggest a link:
In order to add a link, you should post it from a personal Facebook account (not from a page); posts by pages are deleted by Facebook if they contain links.
Post a featured link