Sure. One way of doing that is adjusting the permissionless p2p software to reduce the threat.

Reply to this note

Please Login to reply.

Discussion

makes sense to me