# Takeaways

1. **Chain Integrity**: Blockchain security relies on the rejection of invalid transactions by nodes, ensuring that attackers cannot manipulate the system or create value arbitrarily.
2. **51% Attack Limitations**: An attacker controlling over half of the network's mining power can create an alternate chain but cannot change consensus rules or create non-existent funds.
3. **Probability Dynamics**: The likelihood of an attacker catching up to the honest chain decreases exponentially as the number of blocks behind increases, particularly when honest nodes maintain a lead.
4. **Transaction Confirmation**: Recipients should wait for multiple confirmations before trusting a transaction, as attackers must mine enough blocks to override the network's consensus.
5. **Risk of Attacks**: Attempting a 51% attack is risky due to the need for significant hash power and the potential legal consequences, making it a precarious strategy for malicious actors.


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://hub.bsvblockchain.org/higher-learning/bsv-academy/bitcoin-whitepaper-series/section-11-calculations-bitcoin-whitepaper/takeaways.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
