Blockchain consensus algorithms use the scarcity of a resource and economic incentives to protect the security of the distributed ledger.
Which of the following are necessary properties for a cryptographic hash function to be secure? Select all that apply
Which of the following is NOT an essential part of Confidential Transactions?
The code of smart contracts that are "self-destructed" is no longer visible to the blockchain network
The Bitcoin hack demonstrated that there are circumstances in which the principles of blockchain must be violated to protect the blockchain.
Which of the following attacks were enabled by design decisions made by the blockchain's developers? Select all that apply
Malicious smart contracts can potentially infect the nodes running the blockchain software