Intro: Censorship Attacks

Thus far, we’ve looked at examples of how users with enough hashpower can take advantage of the properties of the blockchain in order to maliciously double spend their coins.

Now, we’ll look at another sort of attack: the censorship of transactions.

With censorship, we can choose to ignore the transactions from an individual or group of individuals, isolating them from the network and effectively rendering their bitcoins useless.

 Censorship Attacks: Naive Censorship