in 51% Attack
Once an attacker has taken control of the network, they can do things like double-spending and rewriting the blockchain
Once an attacker has taken control of the network, they can do things like double-spending and rewriting the blockchain