These questions are referencing Bitcoins.
1. Adversaries and Threats
- State at least three possible threats (where a threat is defined as an action by an adversary aimed at compromising an asset).
- Give an example adversary for each threat.
2. Potential Weakness
- State at least three potential weaknesses for the product or service deploying this technology.
- Justify your assertion using 2-3 paragraphs per weakness.
- You may use Internet resources and customer feedback and evaluation in supporting your assertion, but you should also provide your own view based on your full understanding of the technology and product combo.