What can an attacker who controls majority or all of the full nodes do?


#1

Could you sensor transactions, double spends, create soft/hard-forks etc?