|
|
|
@ -1583,7 +1583,7 @@ Security research groups have used statistical modeling to claim that
|
|
|
|
|
various types of hashrate attacks are possible with as little as 30% of
|
|
|
|
|
the hashing power.
|
|
|
|
|
|
|
|
|
|
The centralization of control caused by mining pools has
|
|
|
|
|
The centralization of control ((("mining pools")))caused by mining pools has
|
|
|
|
|
introduced the risk of for-profit attacks by a mining pool operator. The
|
|
|
|
|
pool operator in a managed pool controls the construction of candidate
|
|
|
|
|
blocks and also controls which transactions are included. This gives the
|
|
|
|
|