Once an attacker has taken control of the network, they can do things like double-spending and rewriting the blockchain
#dyor #ethereumshanghaiupgrade #eth2.0 #Ethereum