I think this vulnerability is not overcome in a proof-of-stake protocol without centralization.

Reply to this note

Please Login to reply.

Discussion

No replies yet.