Sep 4, 2018 · 1 min read
In order for this attack to take place, it does require that an exchange would list a cryptocurrency that was constantly forking.
If the nothing at stake problem was really a problem, the protocol would constantly fork. In this hypothetical scenario, an exchange could have still waited X amount of blocks before accepting the cryptocurrency. This would mean that the attacker would need to wait at least that many blocks before pointing their 1% hash power to the other fork.
Thanks for commenting!
