No, just changing the output value would invalidate the transaction's signatures, which the application can easily verify. But since the application is not a fully validating node, what the attacker can do instead is to create their own transaction signed with their private key that pretends to be spending coins that don't actually exist, and use any output values they want.
Of course, if you use a secure channel to communicate between your application and your full node, you shouldn't need to worry about man-in-the-middle attacks.
You can get bonuses upto $100 FREE BONUS when you:
π° Install these recommended apps:
π² SocialGood - 100% Crypto Back on Everyday Shopping
π² xPortal - The DeFi For The Next Billion
π² CryptoTab Browser - Lightweight, fast, and ready to mine!
π° Register on these recommended exchanges:
π‘ Binanceπ‘ Bitfinexπ‘ Bitmartπ‘ Bittrexπ‘ Bitget
π‘ CoinExπ‘ Crypto.comπ‘ Gate.ioπ‘ Huobiπ‘ Kucoin.
Comments