In both cases, this hack presents a strong argument for tending towards sticking to things proven to work and to be wary of overcomplicating things and thereby introducing unnecessary risks when people’s financial assets are involved. Which, I suppose, means two points for team Bitcoin.
GPUs are flexible and can be used to mine many different ASIC-resistant chains, so the attack vectors are greater. Successful attacks don’t render GPUs useless — they can be simply used on other chains. Whereas attacking an ASIC-friendly network guarantees the attacker will burn large amounts of invested capital, this isn’t necessarily true for GPU mining. Attackers with enough GPUs could theoretically execute a 51% cost with no cost.
Compare the problem of Twitter spam to the problem of email spam. Since Twitter closed their network to 3rd-party developers, the only company working on Twitter spam has been Twitter itself. By contrast, there were hundreds of companies that tried to fight email spam, financed by billions of dollars in venture capital and corporate funding. Email spam isn’t solved, but it’s a lot better now, because 3rd parties knew that the email protocol was decentralized, so they could build businesses on top of it without worrying about the rules of the game changing later on.