Why Nostr? What is Njump?
2023-06-07 03:10:11
in reply to

Ben Reeves [ARCHIVE] on Nostr: 📅 Original date posted:2012-02-29 📝 Original message:I'm not sure. What if they ...

📅 Original date posted:2012-02-29
📝 Original message:I'm not sure. What if they use a coinbase of a block that has already matured?

On Wed, Feb 29, 2012 at 10:46 PM, Gavin Andresen
<gavinandresen at gmail.com> wrote:
> On Wed, Feb 29, 2012 at 5:05 PM, Ben Reeves <support at pi.uk.com> wrote:
>> A malicious miner can produce a duplicate coinbase which the majority
>> of clients will accept but the majority of hashing power won't.
>> Spending the coinbase output after....
>
> That can't happen until the coinbase matures, which takes 100 blocks.
> And it won't mature because a majority of hashing power is rejecting
> it, right?
>
> --
> --
> Gavin Andresen
Author Public Key
npub1t26xr0r383eh8xkmc4pluqs42wkqyml33eszv7sfn829llwr49psfpvrwu