In this module, we will examine some of the possible attacks that these mechanisms can face:
51% Attack in Proof of Work (PoW)
Selfish Mining in PoW
The Sybil Attack
The Eclipse Attack
The Nothing-at-Stake Attack in Proof of Stake (PoS)