Blockchain的魚和熊掌系列(14)Sybil Attack

Peer-to-peer systems usually employ the redundancy strategy to resist threats from faulty or hostile peers. However, if a peer presents multiple identities and controls a substantial fraction of the s
相關文章
相關標籤/搜索