In my latest technical deep dive I ruminate upon a theoretical attack scenario that could be performed by an adversarial miner in order to give themselves a competitive advantage. https://blog.lopp.net/slow-block-validation-attacks/