You know you've lost the plot when you try to rationalize Proof of Stake as more secure than Proof of Work because "an attacker would need to acquire a bunch of coins in order to attack the network."

Reply to this note

Please Login to reply.

Discussion

No replies yet.