On Wed, Feb 29, 2012 at 5:05 PM, Ben Reeves <supp...@pi.uk.com> wrote: > A malicious miner can produce a duplicate coinbase which the majority > of clients will accept but the majority of hashing power won't. > Spending the coinbase output after....
That can't happen until the coinbase matures, which takes 100 blocks. And it won't mature because a majority of hashing power is rejecting it, right? -- -- Gavin Andresen ------------------------------------------------------------------------------ Virtualization & Cloud Management Using Capacity Planning Cloud computing makes use of virtualization - but cloud computing also focuses on allowing computing to be delivered as a service. http://www.accelacomm.com/jaw/sfnl/114/51521223/ _______________________________________________ Bitcoin-development mailing list Bitcoin-development@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/bitcoin-development