BBR's POW and Diff are different from XMR and the exploit seems to be exploiting XMR only anyway. There is no slippage to BBR yet which is fascinating to me as well as the fact that some of the XMR dumpers also slowly dumped BBR to keep the silver coin in check
BCX's attack has nothing to do with POW per se. It targets Cryptnote's implementation of ring signatures AFAIK.
BBR is a much easier target for a Sybil mediated timewarp attack because it has a far smaller network than XMR securing it.
Please advice

What should be do iCEBREAKER? Are you a professional coder too?
At dinner I suddenly had an epipheny on the exploit. I initially thought I would short Monero, because it seemed it was doomed no matter what I did, because I also see another related attack against Monero because it doesn't have BBR's safety feature. I will detailing this in my next post.
I am sure everyone knows BBR has a feature which XMR doesn't have yet (and would require hard fork to add), where each coin is flagged with the minimum # of inputs it will mix with when it is transacted in the future. This enables BBR to avoid inadvertent unmasking of the anonymity.
Well when we consider an attacker do that on purpose, then XMR is much more suspectible to anonymity reduction (which we are still trying to decide if also reveals the private key).