Questions on: majority-attack

You are guessing that even with 51% of the network hashrate, an attacker can still not benefit from invalid transactions. However, the usual idea of a 51% attack is not to create invalid transactions, but to remove valid transactions, as if they had
Generally, no, not until it's too late. A typical 51% attack would look like this: Attacker privately starts mining their own chain, which diverges from the main chain at some block N. Attacker deposits coins to your business, sending them from addre
When a previously unknown chain fork of at least 7 blocks length is published, how does Bitcoin Core react? It reorganizes to that chain, any transactions that were lost are returned to the nodes mempool. Would Bitcoin Core accept the chain fork if i
A standard laptop CPU provides around 2-8 Mhash/sec. An ATI 5870 video card, which has one the best efficiency/cost ratios, mines at about 400 Mhash/sec, and at the moment, the Bitcoin network has a total hashing power of about 12,460,000 Mhash/sec,
From what I understand, Proof of Activity and Proof of Stake are methods of preventing a 51% attack. Proof of Stake basically means that the people that hold the most coins sign the blocks that will be part of the block chain. This means that the peo
Anyone holding a large amount of computing power can be seen as a potential threat to the Bitcoin Network. However, those pools have been around for a long while and their owners have earned their reputation in the Bitcoin community, so they can be m
If transactions in a block are valid, in order to add that block in the block chain, a proof of work needs to be found. I have read the bitcoin paper by Satoshi. If the difficulty of the proof of work requires say 2^52 computations (13 hex zeros) on
Google has been awarded a U. S. patent for its floating data centers that are powered by waves and cooled by sea water