Q: 5
Which of the following attacks takes advantage of the fact that transaction information is posted on
the blockchain to infer sensitive information?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.