Can someone help me to explain a little bit? It's an about hacking the network. A saw an article about hacking ETC quite easy. Hashing power hacking is not difficult to do I heard. Is this also possible with Stratis? Of is proof of stake (Stratis) something different