• @Aceticon@lemmy.world
    link
    fedilink
    347 months ago

    The protocol is highly susceptible to DOS attacks by means of BB guns, slingshots or, for more sophisticated hackers, trained hawks.