if non-mining nodes controlled the network we would be vulnerable to sybil attacks... this is what proof of work and proof of stake are for...
if non-mining nodes controlled the network we would be vulnerable to sybil attacks... this is what proof of work and proof of stake are for...
No replies yet.