Flaw in PoS: incentivising availability leads to centralisation through clustered physical network topology @IOHK_Charlespic.twitter.com/xAmuRsV9Up
You can add location information to your Tweets, such as your city or precise location, from the web and via third-party applications. You always have the option to delete your Tweet location history. Learn more
Depends on the economics of the attack. In practical terms it usually doesn't
If the price of the coin is low and not many yet participated in pos, then attacker has a chance.
a chance to do what?
51% attack.
what does that let the attacker do, and why would they want to do it?
based on bribery scenario, cartel which has large investment in another crypto attacks pos crypto to kill competition.
1/the value of the monetary base of crypto is much less than the market cap: spot x total nominal supply. However to buy enough
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.