Which of the following attacks takes advantage of the fact that transaction information is posted on the blockchain to infer sensitive information?
Smart Contract Exploitation
Data Mining
Brute Force Key Guessing
Cryptanalysis
Submit