We are not progressing in this convo at all. I suspect it won't be constructive, so there is no a reason to continue it.
-
-
here’s another challenge: get all your infosec expert buddies who are laughing at
$IOTA to come up with an attack vector. surely, experts can come up with something! use the DCI method, any method, any weakness you can expose. save us all from IOTA!https://twitter.com/DavidSonstebo/status/964636242594926592 … -
There was a weakness - a hash function which was vulnerable to collisions meant that an adversary could harm the system as a whole. Even you god has claimed this.
-
that has been addressed as nauseum. no practical attack was demonstrated. and DCI repeatedly ignored the call to publish their code. see https://twitter.com/c___f___b/status/964603104216920066 …. also the Official
$IOTA Response was greeted by *crickets*

https://blog.iota.org/official-iota-foundation-response-to-the-digital-currency-initiative-at-the-mit-media-lab-part-1-72434583a2 … -
So you are saying the "copy protection" didn't work then?
-
it has served its purposes. and now it’s no longer needed. so go find a weakness with your infosec experts buddies. the reward is high! it would be great for your careers if you can break
$IOTA. and you can save a lot of us who are deluded to believe that IOTA is safe! thx!
End of conversation
New conversation -
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.