Post
Topic
Board Archival
Re: delete
by
markm
on 31/03/2014, 02:11:13 UTC
Math already explained how it works and how it is that Aurora is vulnerable to it, all that remains to be seen is whether Aurora's hash power is sufficiently greater than that of the attacker. If that is not what Math said please do translate what he was trying to explain, as it seemed a pretty clear explanation.

-MarkM-