Edited ch12_mining.adoc with Atlas code editor

develop
clenser 8 months ago
parent 64d75463f7
commit 9c661dc8c1

@ -1583,7 +1583,7 @@ Security research groups have used statistical modeling to claim that
various types of hashrate attacks are possible with as little as 30% of various types of hashrate attacks are possible with as little as 30% of
the hashing power. the hashing power.
The centralization of control caused by mining pools has The centralization of control ((("mining pools")))caused by mining pools has
introduced the risk of for-profit attacks by a mining pool operator. The introduced the risk of for-profit attacks by a mining pool operator. The
pool operator in a managed pool controls the construction of candidate pool operator in a managed pool controls the construction of candidate
blocks and also controls which transactions are included. This gives the blocks and also controls which transactions are included. This gives the

Loading…
Cancel
Save