- Dec 16, 2015
- 2,806
- 6,088
@achow101 : Since we are talking about an attacker ...
What if we assume he is running a modified version of the software which does allow him to self-mine such an invalid tx .
He is basing his attack on the premise that the majority of hashing power (not running SegWit at that time) will be unable to reject the block.
How is he wrong?
What if we assume he is running a modified version of the software which does allow him to self-mine such an invalid tx .
He is basing his attack on the premise that the majority of hashing power (not running SegWit at that time) will be unable to reject the block.
How is he wrong?