asciilifeform: the_scourge: you will find that one of the more interesting ideas we run with in #b-a is that public opinion isn't a particularly interesting concept re: bitcoin
asciilifeform: the_scourge: the only genuine oddity is that the selection process was not described
asciilifeform: the_scourge: if, say, it were a random selection
asciilifeform: the_scourge: but i was digging for proof that a) there are < 0.8 nodes in the candidate list b) none were selected
asciilifeform: the_scourge: i've discovered that cellular modems, at least in the way they are operated in usa, are immune to this type of ddos.
asciilifeform: the_scourge: would you care to post it publicly ?
asciilifeform: the_scourge: from packet dumps taken by myself and at least 2 other folks here, appears that mr. ddos uses mainly 'amplification' method (ssdp, ntp)
trinque wishes he could watch asciilifeform slap the_scourge in person
asciilifeform: the_scourge: if you want to port fortran or cobol to it, who can stop you. if you expect the design to somehow accomodate your perversion - sorry