I believe the case of network partition only matters in case of an attack on the system, i.e. someone entering conflicting information.
That would be somewhat obvious, and you'd have to go after that actor. But as long as that doesn't happen, and even if it would happen, most transactions will actually be valid enough to trace the food chain.
That would be somewhat obvious, and you'd have to go after that actor. But as long as that doesn't happen, and even if it would happen, most transactions will actually be valid enough to trace the food chain.