Spinning up a large number of temporary mining servers is likely part of what type of attack?
Correct : C
Start a Discussions
The List hack demonstrated that biockchains using short addresses are exploitable
Correct : A
Start a Discussions
Which smart contract vulnerabilities can be exploited by a malicious miner? Select all that apply
Correct : C, D
Start a Discussions
Which of the following are necessary properties for a cryptographic hash function to be secure? Select all that apply
Correct : B, C, D
Start a Discussions
In which blockchain consensus algorithm does a user pay (give up coin forever) to participate in consensus?
Correct : A
Start a Discussions