Teardrop attacks in crypto: What they are and how to stop them