I decided
I can't do that (like Craig Wright

). It's simply not so important for me to waste an enormous amount of time I don't really have.
(And now I'm only playing the Devil's advocate, because I'm not part of the anti-PoS fraction.)But the above example should be enough. You have to prove now why the attacker cannot fake one of the steps I detailed.
LOL,
You did not demonstrate even faking the time stamps ,
and you have not given me a way to fake out a real client thru time manipulation.
It's ok, you're off the hook.
Later,
