It's not been my intention to minimize the attack. I see that perhaps I have / it's been taken that way.
Is the main issue/threat as you see it then, failed synchronization and re-synchronization of nodes, esp. with low bandwidth connections? Or am I missing the mark?
It's not enough that it's possible to do, but that most people actually choose to do it
Please Login to reply.
Would most people do it even if it was completely trivial?
Yes