You know you've lost the plot when you try to rationalize Proof of Stake as more secure than Proof of Work because "an attacker would need to acquire a bunch of coins in order to attack the network."
Discussion
No replies yet.
You know you've lost the plot when you try to rationalize Proof of Stake as more secure than Proof of Work because "an attacker would need to acquire a bunch of coins in order to attack the network."
No replies yet.