2 Violent attack vectors in Crypto: a detailed review