Jordan said:
[quote]
I suspect most reputed signers will operate within the Tor network, which is very easy to do. Even if they don’t use any proxy, determining which node is theirs is a difficult task that only organizations like NSA could hope to have any success at (if they cared to devote resources to it). Therefore, the premise of your scenario, that reputed signer IP addresses will be known, is false.[/quote]
So as long as the signers hide their IP well, the DDoS attack is very impossible.
I have an idiea, if we can provide a anti-DDoS tool, the NBT/BKC will have a killer application.You know in this world lots of servers(with IP/DNS exposed) suffer DDoS, this kind of attack even becomes an industry: some one can hire experienced hacker to DDoS attack comercial competitors.
If we could stop DDoS by cryptos, a new world is opened for us.
Assume a hacker wanna DDoS attack a server, thousands of zombie” machines controled by this hacker will send out request to the victim server, consume bandwidth, cpu resource etc. Now, in this emergency the server can turn on “crypto-protect mode”, demand every request to pay a small quantity of NBT in advance, the tx record, otherwise the server will ignore any request and spend no resource at all.
DDoS, ie Distributed Denial of Service, may have a new meaning, the distributed exchange(B&C) refuse to serve any one without payment in advance. LOL