I'm curious, in light of "the experiment," do you still think those scenarios were implausible? ( I don't think abit and smooth are trying to harm the network, but they are providing a case-study of the attack vector that I highlighted, and there has already been some apparent user egress. In hind sight, the timing of this post was ironic.)
You are viewing a single comment's thread from: