Bookchain transaction

Chunk ID 65
Content d by an attacker's fabricated transactions for as long as the attacker can continue to overpower the network. One strategy to protect against this would be to accept alerts from network nod