Is there any option to simulate malicious node? I found this information in this article https://www.eurekalert.org/news-releases/684720 But I didn’t know how do that
Is there any option to simulate malicious node?
I found this information in this article
https://www.eurekalert.org/news-releases/684720
But I didn’t know how do that