22/ Here I focus on an exploration of common attack vectors inherent in blockchains, & what solution(s) can combat them (to the best of my knowledge). Will use project-specific examples to keep this as tangible as possible.
For a recap of Part One, see below👇
1) a verifiable delay function (VDF)
2) a commit-reveal scheme
3) BLS signatures