Hi everyone, i want to know a few questions for research purposes.
1.) what is a 51% attack?
2.) how do these people carry out these 51% attacks?
3.) do you need a hardware miner or can you just do it from a online miner?
thnx for helping me understand
again im not gonna do this i just wanna learn about how they are doing it
1.) The most simplest explanation is that it's an attack that undertakes by owning or dominate more than 51% of hash power (it's called overhashing I think)
2.) They buy more and more computing power, buying more mining rig, ASIC, etc.
3.) You absolutely needs lots of hardware miner.
There are some project offering solution like KOMODO security project.