Ninjastic
Home
Search
Users
Boards
Addresses
Ctrl + K
Toggle theme
Open menu
Post
Edited versions
Quotes to this post
Post
54559
Topic
3832
Board
Bitcoin Discussion
Re: Counterfeiting and Loss Prevention
by
temp1029
on
24/02/2011, 22:20:28 UTC
Quote from: yrral86 on February 24, 2011, 10:10:55 PM
The attacker would need to control roughly half of the computing power.
http://article.gmane.org/gmane.comp.encryption.general/12588/
According to the linked wiki article, that is not the case, at least not for my counterfeiting example, it specifically says that even if the "attacker" has control of more than 50% of the network he cannot "Create coins out of thin air".