To realize success, an attacker would need to regulate more than fifty percent of the full computational electric power of the network in what is referred to as a fifty one% assault. In addition, it made the network far more private and protected. doable long term upgrades could boost security by means of modifications named covenants and ramp up