Blockchain的鱼和熊掌系列(14)Sybil Attack

Peer-to-peer systems usually employ the redundancy strategy to resist threats from faulty or hostile peers. However, if a peer presents multiple identities and controls a substantial fraction of the s
相关文章
相关标签/搜索