Table of Contents
- Introducing Blockchain Security and Attack Vectors
- Cryptography Essentials
- Blockchain Security Assumptions
- Trustless Blockchain Networks
- Securing Hyperledger Fabric
- Decentralized Apps and Smart Contracts
- Preventing Threats for DApps and Smart Contracts
- Exploiting Blockchain as attack vector
- Analyzing Privacy and GDPR Compliance issues

