Post
Topic
Board Development & Technical Discussion
Topic OP
Proof of Presence?
by
MoMoneyMonetarism
on 17/12/2013, 19:12:40 UTC
Could it be possible to thwart secret chains by forbidding consecutive block verifications by a single mining address or something more complex?

It seems that if bad actors were forced to find and incorporate others' verified blocks in a chain, it would be more costly for them to attempt this kind of double spend attack in a high verification speed environment.

I realize that pools can simply use multiple addresses, but with payout thresholds, the threshold effectively doubles because of the use of two addresses.

Could some more elaborate rule based upon this concept be employed to thwart this kind of attack?