ę»ęč
ćÆććććÆććć§ć¼ć³ć®ę«å°¾ć«čæ½å ććć®ć§ćÆćŖććčŖåć®åå¼ćå«ć¾ććććććÆć¾ć§é”ćććć®å¾ć®ćć¹ć¦ć®ććććÆćććē“ćåæ
č¦ćććć¾ććåęć«ćććććÆć¼ćÆćę«å°¾ć«čæ½å ćē¶ććę°ććććććÆć«ć対åæććŖććć°ćŖćć¾ćććć¤ć¾ććå½¼ćÆå±„ę“ćęøćęććććØćć¦ććć®ć§ććäøåŗ¦å½¼ć®ćć§ć¼ć³ćé·ććŖćć°ććććę°ććęå¹ćŖćć§ć¼ć³ć«ćŖćć¾ćć
"The attacker isn't adding blocks to the end. He has to go back and redo the block his transaction is in and all the blocks after it, as well as any new blocks the network keeps adding to the end while he's doing that. He's rewriting history. Once his branch is longer, it becomes the new valid one."
ā Satoshi Nakamoto (2008-11-09)