OK for example:
Yuri Zelikov
1

I heard that there is an article that solves your “second vulnerability”:

And I also read this:

“attacking the network at a low transaction point” - this should not be an issue if the “low” point is still really high — i.e. the network achieves really high scale. It’s not a real vulnerability now because of the coordinator until the network reaches a good scale.

What is your take?

Like what you read? Give Agam More a round of applause.

From a quick cheer to a standing ovation, clap to show how much you enjoyed this story.