Answer the question
In order to leave comments, you need to log in
How do consensus algorithms counter different types of attacks?
I looked through a sufficient number of articles, but found very little information on how the pow and pos algorithms counteract various types of attacks. Can anyone suggest where to look for information on the vulnerability of these algorithms to attacks? In order not to consider specific projects, and specifically these consensus algorithms without additional proposals, about what mechanisms could be screwed for protection, but simply the vulnerability of these algorithms to various attacks
Answer the question
In order to leave comments, you need to log in
Didn't find what you were looking for?
Ask your questionAsk a Question
731 491 924 answers to any question