View RSS Feed

NiKoLaI

  1. Exploring ETH 2.0 (Part 2)

    Unlike in a centralized system where a few people of influence can conspire to twist the truth, if a miner behaves dishonestly, their block will be rejected and this dishonest actor will have wasted time and incurred hefty electricity costs in the process.


    This is what makes PoW so secure: The combined computational power required for an individual to compromise a well-established Proof of Work blockchain like Bitcoin or Ethereum is too cost-prohibitive. Maybe if an attacker ...
MetroVB Theme By XiTCLUB