BBR's POW and Diff are different from XMR and the exploit seems to be exploiting XMR only anyway. There is no slippage to BBR yet which is fascinating to me as well as the fact that some of the XMR dumpers also slowly dumped BBR to keep the silver coin in check
BCX's attack has nothing to do with POW per se. It targets Cryptnote's implementation of ring signatures AFAIK.
BBR is a much easier target for a Sybil mediated timewarp attack because it has a far smaller network than XMR securing it.
Please advice

What should be do iCEBREAKER? Are you a professional coder too?
I am sure everyone knows BBR has a feature which XMR doesn't have yet (and would require hard fork to add), where each coin is flagged with the minimum # of inputs it will mix with when it is transacted in the future. This enables BBR to avoid inadvertent unmasking of the anonymity.
Well when we consider an attacker do that on purpose, then XMR is much more suspectible to anonymity reduction (which we are still trying to decide if also reveals the private key).
We should make popcorn and coffee and order Grubhub chow fun delivery. The next three days will be very interesting. Maybe BBR and XMR will switch market caps?