Attack vectors describe ways in which actors can attack a network.
With Distributed Ledger Technologies there are a number of potential attack vectors some are easier to prevent than others. Examples include:
- 51% Attack
- Adding random blocks
- Computational imposters
- Denial of Service (DoS)
- Double spend
- Including invalid transactions
- Mining on top of invalid blocks
- Mining on top of suboptimally scoring blocks
- Sybil Attack
3 thoughts on “Attack Vectors”