Engineering doesn’t exist without constraints. Decentralized technology doesn’t receive constraints without an active adversary.https://twitter.com/backus/status/995893320898428928 …
-
-
Maybe adversaries learned lessons and try different (not apparent for us now) tactics
-
Yeah they just settled into a predictable routine now. Capture IPs on Torrent -> C&D to ISP -> ISP updates your 3 strikes. More and more people torrenting over VPNs. Stalemate Otherwise just chasing The Pirate Bay and private trackers
-
That's good point. I meant that maybe they try different tactics with attacking cryptocurrencies (price manipulation, public perception, PsyOps to make ppl think "blockchain" isn"bitcoin"... ) . We have to keep eyes open.
End of conversation
New conversation -
-
-
The SEC?
Thanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.