I'm not sure. What if they use a coinbase of a block that has already matured?
On Wed, Feb 29, 2012 at 10:46 PM, Gavin Andresen <gavinandre...@gmail.com> wrote: > On Wed, Feb 29, 2012 at 5:05 PM, Ben Reeves <supp...@pi.uk.com> wrote: >> A malicious miner can produce a duplicate coinbase which the majority >> of clients will accept but the majority of hashing power won't. >> Spending the coinbase output after.... > > That can't happen until the coinbase matures, which takes 100 blocks. > And it won't mature because a majority of hashing power is rejecting > it, right? > > -- > -- > Gavin Andresen ------------------------------------------------------------------------------ Virtualization & Cloud Management Using Capacity Planning Cloud computing makes use of virtualization - but cloud computing also focuses on allowing computing to be delivered as a service. http://www.accelacomm.com/jaw/sfnl/114/51521223/ _______________________________________________ Bitcoin-development mailing list Bitcoin-development@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/bitcoin-development