Quote:
Originally Posted by Zyber
Cryptography
If I understand this right, the strength of this currency relies on the strength of the SHA-256 algorithm?
**CHOMP**
How does the mechanism work which prevents the same coin from being used twice?
Could that system be tampered with if 100 million fake nodes produce manipulated traffic?
|
Instead of answering your technical questions until my hands are purple, I'll let this video explain it.
https://youtube.com/watch?v=XQPSwA2Itbs
(Starts at 0:42:00, explained by Steve Gibson from grc.com)