Gavin Andresen [ARCHIVE] on Nostr: š Original date posted:2012-02-29 š Original message:On Wed, Feb 29, 2012 at ...
š
Original date posted:2012-02-29
š Original message:On Wed, Feb 29, 2012 at 5:05 PM, Ben Reeves <support at pi.uk.com> wrote:
> A malicious miner can produce a duplicate coinbase which the majority
> of clients will accept but the majority of hashing power won't.
> Spending the coinbase output after....
That can't happen until the coinbase matures, which takes 100 blocks.
And it won't mature because a majority of hashing power is rejecting
it, right?
--
--
Gavin Andresen
š Original message:On Wed, Feb 29, 2012 at 5:05 PM, Ben Reeves <support at pi.uk.com> wrote:
> A malicious miner can produce a duplicate coinbase which the majority
> of clients will accept but the majority of hashing power won't.
> Spending the coinbase output after....
That can't happen until the coinbase matures, which takes 100 blocks.
And it won't mature because a majority of hashing power is rejecting
it, right?
--
--
Gavin Andresen