Overview of ISM. An attacker’s infiltration miners find three infiltration blocks IB1, IB2, and IB3 in the victim pool in three different cases, respectively. Only IB3 leads to an ISM block ISMB before others find a block. Meanwhile, IB1 wins while IB2 loses in the corresponding intentional forks against the others’ blocks.
pull down to refresh