The List hack demonstrated that biockchains using short addresses are exploitable