See more
The next state can be modelled in the infectious state in epidemiology research. Here, the miner has validated and accepted the received block as sa…
…wn throughout the network and all miners for practical purposes are mining on it. Next, we have the exposed state. In the exposed state, a miner has discovered a new block solution. One or more miners hold t…
… as Bitcoin, or for that matter any decentralised node system, we can describe this as follows, the susceptible state is one where the network has selected a block and is mining seeking a new block solution. In …