File tree Expand file tree Collapse file tree 1 file changed +3
-3
lines changed Expand file tree Collapse file tree 1 file changed +3
-3
lines changed Original file line number Diff line number Diff line change @@ -26,7 +26,7 @@ There are two motivating ideas behind this principle:
2626 example, there may be pressure to use that extra time to allow larger script
2727 execution budgets.
2828
29- 2 . Forcing honest nodes to do more work provides an attack opportunity for the
29+ 1 . Forcing honest nodes to do more work provides an attack opportunity for the
3030 adversary. In the worst case, an adversary could potentially force nodes to
3131 fail to adopt or forge blocks, and hence potentially gain control of the
3232 chain.
@@ -57,11 +57,11 @@ various considerations that effect how much we want to follow it:
57571 . The situation we most want to avoid is where an attacker could control an
5858 input such that they can force the worst-case behaviour. The UTxO locality
5959 example above is one such.
60- 2 . Still problematic are cases where an attacker cannot control the performance
60+ 1 . Still problematic are cases where an attacker cannot control the performance
6161 but can predict it, or less serious still, observe it. Either way a
6262 prepared attacker could take advantage of the degraded performance to launch
6363 an attack on the chain.
64- 3 . Either of these cases are exacerbated if the same behaviour is coordinated
64+ 1 . Either of these cases are exacerbated if the same behaviour is coordinated
6565 across all nodes, since this allows an attacker to exploit a performance
6666 drop across the entire network.
6767
You can’t perform that action at this time.
0 commit comments