if non-mining nodes controlled the network we would be vulnerable to sybil attacks... this is what proof of work and proof of stake are for...

Reply to this note

Please Login to reply.

Discussion

No replies yet.