Hmm i agree that we should seek to minimize the potential for creating an (even temporarily) invalid block. But that’s a lot of if’s to get there:
- A miner is malicious; and
- This miner finds the last block in a period; and
- Our ASIC rolls
nTime
, we find the first block of the new period; and - Our ASIC finds a solution with
nTime + n
; and - We find the block in less than
s
seconds; and - A majority of the hashrate has a clock behind ours by more than
n + s - 600
seconds.