This chapter explored various security aspects of blockchain technology. We covered some of the security models of the technology at the beginning of the chapter. Some issues related to the centralization caused by exchanges and mining pools were discussed as well. Various types of attacks on the blockchain network, such as double-spend attacks, 51 % attacks, and eclipse attacks were covered with some in-depth analysis. Together, we've covered how to design and deploy a blockchain platform securely.
In the next chapter, we'll will look at how the implementation of blockchain technology is being falsely hyped in most use cases and analyze why blockchain technology doesn't add value to most of these applications.