1. | attackControlling over 51% of the network and using their hash power to control the network and the transactions which get confirmed. By having over half of the total hash power, the miner can manipulate the network by orphaning confirmed blocks and selecting which transactions get confirmed or left in the mempool.
2. | riskThis type of attack is unlikely on any chain with significant hash power, but blockchains with low hash power are vulnerable to this attack.
2.1 - BCHA
Shortly after the BCH / BCHA hard fork, the BCHA network was 51% attacked over the course of multiple days. During this time, confirmation times reached 6, 10, sometimes even 12 hours. This attack was mitigated when the BCHA node released an update to their mining client which stopped the attack.
* All terms and definitions will change as the Cryptionary improves
Know Your Customer