Bitcoin Forum

Bitcoin => Bitcoin Discussion => Topic started by: elenakretova on March 13, 2018, 09:36:28 AM



Title: Counteracting copy blockchain assault
Post by: elenakretova on March 13, 2018, 09:36:28 AM
Trusting somebody can enable me to answer an inquiry in regards to a potential assault that could happen with a blockchain.

Assume Alice is endeavoring to assault Bob by sending him false blockchains. In this situation, assume Alice needs to more than once send a blockchain that records that Bob owes Alice $10, and she has effectively discovered a proof of work that makes a fitting hash.

What is there to prevent Alice from taking this square, and broadcasting it over and again to Bob so that on his side, he sees a developing blockchain, each with a record that he owes Alice?

From what I comprehend, the way that the "genuine" blockchain (https://tekslate.com/blockchain-training) is resolved is by a matter of size. So as long as Alice communicates her phony piece to Bob rapidly enough, wouldn't her records seem, by all accounts, to be the right blockchain that Bob would then need to acknowledge?