The system operates on consensus, everyone has to accept any change to the system for it to be effective. After a 51% attack, other nodes and miners can identify the malicious player and choose to orphan blocks created during the attack and reject at protocol change.
This still requires a hard fork and a change of algorithm, right? Or is there another easier way around?
-
Regards,
PrivacyG