Post
Topic
Board Development & Technical Discussion
Re: Double-spending with 6 confirmations
by
CIYAM
on 06/10/2012, 12:40:23 UTC
Yes. The attacker is the only who has connections to the victim.

And how exactly does the attacker control that (without having first hacked the victim's computer)?