Miners secure the network: they ensure that double-spend attacks are impossible, by enforcing an append-only log.
At this point, however: who can potentially pass off a double-spend attack?
Other miners?
submitted by /u/almkglor
[link] [comments]