Post
Topic
Board Development & Technical Discussion
Re: Proof that Proof of Stake is either extremely vulnerable or totally centralised
by
Zin-Zang
on 24/08/2018, 04:27:03 UTC
I decided I can't do that (like Craig Wright Wink ). It's simply not so important for me to waste an enormous amount of time I don't really have. (And now I'm only playing the Devil's advocate, because I'm not part of the anti-PoS fraction.)

But the above example should be enough. You have to prove now why the attacker cannot fake one of the steps I detailed.

LOL,
You did not demonstrate even faking the time stamps ,
and you have not given me a way to fake out a real client thru time manipulation.

It's ok, you're off the hook.

Later,
 Smiley