In this chapter, we looked at the security assumptions on which blockchain-based architectures are based, showing the specific vulnerabilities that can be exploited to conduct attacks against decentralized networks. We also covered the preferred targets of attackers who intend to take control of transactions on blockchains, aiming to compromise trust mechanisms. Finally, we analyzed the risks and threats to blockchains posed by quantum computing and discussed the most likely attack scenarios and possible countermeasures.
Our path continues now, on to understanding how blockchains achieve trust decentralization by leveraging P2P networking.