Surprising to hear that considering all the different components that can be attacked and abused...
- Peer discovery
- mempool
- utxo set db
- bitcoin script
- pinning attacks
Etc.
Have you ever taken a serious look at TLS/X.509/Certificate Authorities/DNS Poisoning/BGP Hijacking……..? :)
Please Login to reply.
No, but it feels intuitive that something that serves one purpose (AFAIK) would have less attack vectors than one that has many endpoints.
You might be surprised :)