Attacks on the platform or the technologies that the platform depends on including for example distributed denial of service, sybil attacks, phishing, social engineering, hacking, smurfing, malware, double spending, majority-mining, consensus-based or other mining attacks, misinformation campaigns, forks, and spoofing.