Attacking block creation

The block creation process is designed to implement a distributed, decentralized ledger

Ideally, all users will be incentivized to behave properly. However, this is not always the case

A malicious user can take advantage of the block creation process in several different ways:

  • Denial-of-Service attacks

  • Frontrunning

  • Selfish mining

  • SPV mining

Last updated