Slide 25
Slide 25 text
“I, Alice, would like to send
Bob 1MHepPtrqAxZ”
Alice!
“I, Alice, would like to send
Carol 1MHepPtrqAxZ”
Alice!
Bob
Carol
1. Intercept transaction and steal funds
2. Spend money without authorization
3. Replay attack
4. Double spend
Alice!
Uniqueness and ordering
Alice