The use of a directed acyclic graph (DAG) instead of a single chain aims to further enhance security by reducing double-spending. The DAG structure forms the foundation for the GHOSTDAG protocol. KAS ...