• @Aceticon
    link
    361 year ago

    The protocol is highly susceptible to DOS attacks by means of BB guns, slingshots or, for more sophisticated hackers, trained hawks.