“…A Study on Blockchain Architecture Design Decisions and their Security Attacks and Threats1:29 Privacy violation [9], Change contracts owner [75], stealfront end login information [103], Compromised private key [3], Transaction spoofing [173], Identity theft, Gain access to the storage [168] Transaction manipulation [140], Alter out-going data [51], Fake transaction, Identity theft, Change contract owner, Malicious external oracle [169] Transaction manipulation [140], Malicious external oracle [169] Privacy violation [9], Transaction graph analysis [57], Sensitive data exposure [9], Eavesdropping [3], Steal-front end login information [103], Bypass credential validation [23], Compromised private key [3], Untractability violation [9], Transaction pattern exposure [57], leakage of confidential information [7] Transaction manipulation [140], Change contract owner, Gain access to the storage [168], Bypass credential validation [23]…”