Question: Users who do not wait for their transactions to be buried under a sufficient number of blocks expose themselves to a) De-anonymisation attack b) All
Users who do not wait for their transactions to be buried under a sufficient number of blocks expose themselves to
a) De-anonymisation attack
b) All of the listed choices
c) Double spending attack
d) DDOS attack
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
