MetaLine WhitePaper
  • Introduction
  • I.Project Introduction
    • 1.Web 3.0 Era
    • 2.Web3.0 Game
    • 3.What is MetaLine?
    • 4.MetaLine Mission
    • 5.Background story
  • II.MetaLineNFT Assets
    • 1.Mystery Box NFT (ERC1155)
    • 2.Hero NFT (ERC721)
      • 2.1 Special abilities
    • 3.Pet NFT(ERC721)
      • 3.1 Special abilities
    • 4.Ship NFT(ERC721)
    • 5.Port Certificate NFT(ERC721)
  • III.MetaLine Token
    • 1.GOLD
    • 2.MTT
  • IV.MetaLine Game Assets
    • 1.Commodity
    • 2.Goods
    • 3.Inventory
  • V.Port Facilities
    • 1.Warehouse
    • 2.Factory
    • 3.Shipyard
    • 4.Shop
    • 5.Camp
    • 6.Pet Shop (Open at later version)
    • 7.Blacksmith Shop(Open at later version)
  • VI.Game Play
    • 1.Begin games
    • 2.Gathering Materials
    • 3.Factory Production
    • 4.Shipbuilding in the Shipyard
    • 5.Ship Transportation
    • 6.Goods Sale
    • 7.Expedition
  • VII.MetaLine Economics
    • 1.Market Trading
    • 2.Bank (Open at later version)
    • 3.Pawnshop (Open at later version)
  • VIII.Guild(Open at later version)
  • IX.MetaLine Entertainment
    • 1.Bar (Open at later version)
    • 2.Casino (Open at later version)
    • 3.Room (Open at later version)
    • 4.Land (Open at later version)
  • X.MetaLine Revenue Distribution
  • XI.MetaLine Competition Mechanism
    • 1.Battle gameplay (available in version 1.2)
    • 2.Port Conquest (available in version 1.2)
    • 3.Great Route Conquest (available in version 1.3)
  • XII.MetaLine DAO
    • 1.Third-party integration
      • 1.1 Game integration
    • 2.NFT Ecosystem
      • 2.1 NFT trading platform
      • 2.2 NFT leasing
      • 2.3 NFT Minting function
  • XIII.Disclaimer
    • 1.The risk of lack of attention to MetaLine
    • 2.The risk of MetaLine being attacked
    • 3.The risk of system failure
  • Appendix
Powered by GitBook
On this page
  1. XIII.Disclaimer

2.The risk of MetaLine being attacked

Like other decentralized cryptographic tokens and cryptocurrency, the blockchain used for MetaLine applications is also vulnerable to attacks, such as double-spending attacks, high computational power ratio attacks, "selfish" mining attacks, and excessive competition attacks. Any successful attack poses a risk to MetaLine applications, although MetaLine is working hard to improve system security, the aforementioned attack risks are real.

Previous1.The risk of lack of attention to MetaLineNext3.The risk of system failure

Last updated 2 years ago