Bitcoin Forum
May 10, 2024, 07:04:50 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Legal deterrent to 51% attack  (Read 1105 times)
HELP.org (OP)
Hero Member
*****
Offline Offline

Activity: 510
Merit: 500



View Profile WWW
March 11, 2013, 06:23:05 PM
Last edit: September 15, 2013, 05:27:12 PM by HELP.org
 #1

..

Certified Bitcoin Professional
Bicoin.me - Bitcoin.me!
1715324690
Hero Member
*
Offline Offline

Posts: 1715324690

View Profile Personal Message (Offline)

Ignore
1715324690
Reply with quote  #2

1715324690
Report to moderator
In order to get the maximum amount of activity points possible, you just need to post once per day on average. Skipping days is OK as long as you maintain the average.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1715324690
Hero Member
*
Offline Offline

Posts: 1715324690

View Profile Personal Message (Offline)

Ignore
1715324690
Reply with quote  #2

1715324690
Report to moderator
Come-from-Beyond
Legendary
*
Offline Offline

Activity: 2142
Merit: 1009

Newbie


View Profile
March 11, 2013, 06:40:05 PM
 #2

Funny post. But most of miners don't really care about FinCEN. Every bitcoiner is a terrorist from USA's point of view and money-laundering accusations make no difference.
Stephen Gornick
Legendary
*
Offline Offline

Activity: 2506
Merit: 1010


View Profile
March 11, 2013, 07:54:51 PM
 #3

https://bitcoinfoundation.org/blog/?p=131

I noticed this blog post that speculates that a 51% attacker could be prosecuted under fincen rules.  If that were true wouldn't that also mean that all miners would also be subject to the fincen rules (even though they don't have 51%)?

I think it is a moot point, essentially.

The reason a 51% attacker would do that attack is to either harm bitcoin (and thus has no intention of selling newly mined coins) or to gain economically by double spending transactions the attacker previously made (i.e., to where the attacker obtained value which was paid for prior to the attack, but then was able to double spend as part of the attack and thus defraud the seller who accepted bitcoin payment from the attacker.)

Unichange.me

            █
            █
            █
            █
            █
            █
            █
            █
            █
            █
            █
            █
            █
            █
            █
            █


Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!