Which of the following attacks were enabled by design decisions made by the blockchain’s developers? Select all that apply