May I ask how the solvers of puzzle # 67 and # 68 bypass the public memory pool to prevent transactions from being revoked by others?
Did they use their own machines to mine? Do they have that much computing power?
Which experts can explain the principles and processes in detail? thank you!