The attack vector is a mining pool.
0
0
Does the pool manager have the technical ability to organize a 51% attack using miners included in the pool? Let's skip talking about his intentions and his potential gain. Let's say his family was taken hostage and demanded to carry out the attack. What methods do miners use to stop this attack vector?