The Bitcoin hack demonstrated that there are circumstances in which the principles of blockchain must be violated to protect the blockchain.
In which blockchain consensus algorithm does a user pay (give up coin forever) to participate in consensus?
This sample code is vulnerable to which of the following attacks? Select all that apply.
Which of the following are necessary properties for a cryptographic hash function to be secure? Select all that apply
Using a distributed ledger decreases risk of data loss since all data is not stored in the same place.
Which smart contract auditing strategy determines the inputs that will cause different parts of the code to run?
In both blockchain and DAG-based distributed ledgers, the trust in all transactions that are part of the ledger Increases as additional transactions are added to the ledger.
Which of the following attacks takes advantage of the fact that transaction information is posted on the blockchain to infer sensitive information?
Malicious smart contracts can potentially infect the nodes running the blockchain software
Which smart contract auditing strategy involves graphing how the code executes and looks for anomalies?