Because of the way the network is created, It can be pretty much impossible for hackers or other attackers to shut it down. Carol may well come to a decision concurrently to send Alice five coins. She also sends her instruction out for the network. Anytime, a participant can https://devinoftgu.blog2learn.com/77648910/detailed-notes-on-copyright