Watching IOTA presentation there is a thing that is still unclear for me:
Knowing that IOTA involves PoW but a much lighter one (in order to achieve thousands of transactions per second, but also would not involve a big computational power) and also being every node that includes new transactions into a validator:
- What will avoid to a spammer/hacker post invalid transactions into the IOTA network? Let´s say, hundreds or thousand of devices starts to include new invalid transactions (transference of tokens or data) that they got confirmed by the other nodes participating in that SPAM process.
This question is based on a IOTA presentation where a demo with a car was shown --> https://www.youtube.com/watch?v=2zvrA5KqeYw
I was wondering: What if a malware is installed or starts to get involved into the car transactions, providing information that is not right? Knowing that the nodes that has the car are also TX "validators", could not be possible that they generate such amount of new invalid transactions, validated by itself?
This is what I do not understand: knowing that lot of devices that could use IOTA are not prepare to do such PoW (due to hardware not prepare to big amounts of calculations) not sure what would be the element that warranty "honest" hosts over malicious hosts.
– 3Chicken Nov 27 '18 at 18:38