The kind of malicious stated in the article is when the attacker has control of the network and can manipulate or delete messages of their choice hence disrupting the operation of the network. Manipulating or deleting messages require CPU power hence in the article we have mentioned enough CPU power to block more than one-third of the nodes in the network.

We are not referring to DDoS attacks.

Written by

Delivering. Digital. Excellence.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store