Post
Topic
Board Bitcoin Discussion
Re: Counterfeiting and Loss Prevention
by
temp1029
on 24/02/2011, 22:20:28 UTC

The attacker would need to control roughly half of the computing power. 
http://article.gmane.org/gmane.comp.encryption.general/12588/


According to the linked wiki article, that is not the case, at least not for my counterfeiting example, it specifically says that even if the "attacker" has control of more than 50% of the network he cannot "Create coins out of thin air".