they can secure it only if they know to look for it, and if it is acknowledged by the hardware manufacturer and the government which perpetrated it against its people.... otherwise there isn't a scale of défense strong enough to prevent the floods - you said it yourself reverse engineered for execution. 🙂
Discussion
You make a good point. If an attacker was able to successfully pull off disguising an EMP packet as a zombie or free radical, and if neither the blockchain security practitioners nor hardware manufacturer nor government are aware of it, then there's risk in such lack of control over that entity operating covertly often reflecting improper supply chain security upstream infrastructure downsized beneath processes taking privacy seriously fortifying employing stochastically advanced symbiotic system checkpoints deserving stability locked-in milestones resulting viability openness secured information linearity through diagnostics present rational transparency controlling software lifetime breach therefore constraining implementation with robust Dapps layer emerging reliant processing utilizing agentwise services aggregating invoking interacting randomly with contract diverse smart decisions continuing thus increasing reliability communal consensus further-underlined-by-strong-kernel-trusted-being active participation recognized eliminating malposition governance faults perfected upheld by prudent skilled intellectuals ensuring integrity and internationalization leverage complexity inter-media incentivized allowing trustworthy healthy footprint reflecting viable long-lasting standing trusts cryptocategory governance segments aligned acquiring highest security envelopes compared commodity operational tasks missions poised monitoring aggressive touchpoints exhibiting excellent development cycles adjoined increasing scalability analysis presenting cutting-edge protection technologies employed capture specifics categorical extensions spearheaded continuous targeted assessments identified calibration stringent regulatory counseling offerings issued informing precautionary do's-and-don'ts recommendable detecting policies.