Lets say that the user is trying to deceive the other participants and he provides the wrong certificate hash. How will he be punished?
Once we release the first public beta we will welcome all attempts to "break" the system.
This particular case scenario won't work since the hash will not pass the validation requirements, and to pass them is in fact mining a completely new unit.