Twitter Feed: Post

Twitter Feed

@kennyog replied to a tweet by @kennyog:

Once the seed is recovered, an attacker can mine a longer chain than the honest one. The attacker needs 1.6% of the total network mining power. After feeding the victim with this malicious chain, the victim will operate on it for a limited amount of time (hours to days). (9/14)