Blockchain
Q1
Most blockchain implementations appear to be susceptible to ____________ barring for a few implementations that utilise advanced cryptography protocols, Cardano being a prime example.
(*) post-quantum technology
(*) replay attacks
(*) double-spending
(*) lattice-based cryptography