Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Could an attacker not create lots of transactions between wallets they own so the attacker is given more transactions to verify as well?


Yes, but I think what parent was pointing out was that an honest network user has no reason to do so.


Yes, but attackers being able to create transactions that they themselves can verify would make the situation even worse. What defence does IOTA have against this? It seems an obvious exploit.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: