Blockchain Developer FREE Blockchain Developer Blockchain Security and Vulnerabilities Questions and Answers
An attacker creates thousands of pseudonymous nodes on a peer-to-peer network to gain a disproportionately large influence. By controlling a significant number of these fake identities, the attacker aims to out-vote honest participants or disrupt network operations. Which type of attack does this scenario describe?