Double-Spend Counterattacks: Threat of Retaliation in Proof-of-Work Systems