This article explores how permission-less networks can be attacked by way of splitting them in order to double spend.
↧