... However, the seminal work of Eyal and Sirer [2014], now referred to as "Selfish Mining", identified a fundamentally different cause for concern: an attacker with 34% of the computational power could manipulate the protocol in a way that does not violate consensus, but earns that attacker a > 34% fraction of the mining rewards. 1 This agenda has exploded over the past decade, and there is now a vast body of work considering strategic manipulation of consensus protocols (e.g. Bahrani and Weinberg, 2023, Brown-Cohen et al., 2019, Carlsten et al., 2016, Eyal and Sirer, 2014, Ferreira et al., 2022, Ferreira and Weinberg, 2021, Fiat et al., 2019, Goren and Spiegelman, 2019, Kiayias et al., 2016, Sapirshtein et al., 2016, Tsabary and Eyal, 2018, Yaish et al., 2023, 2022, Zur et al., 2020. ...