Open DheerajDadhich opened 1 year ago
Following doesn't have a risk assessment section: "An attacker could create a variety of implementations of Bitcoin in order to add a security flaw."
Same with "An attacker could create an insecure second layer network on top of Bitcoin."
Following doesn't have a risk assessment section: "An attacker could create a variety of implementations of Bitcoin in order to add a security flaw."