Fresh off my rant about the lack of several words of explanation about how the wallet works, I read this awesome document. It seems like all the bases are covered. The farmer bribe trunk attack, the farmer bribe foliage reorg attack, the orphaning transaction blocks for transaction fees attack, the 100% attack. The reverse cowgirl attack. The short range replotting attack. The Ram Jam attack. The 51% (46%) attack. It is all very impressive. And somehow it’s always the malware in the downloadable attack that actually works best.