1 min readMay 3, 2018
The kind of malicious stated in the article is when the attacker has control of the network and can manipulate or delete messages of their choice hence disrupting the operation of the network. Manipulating or deleting messages require CPU power hence in the article we have mentioned enough CPU power to block more than one-third of the nodes in the network.
We are not referring to DDoS attacks.