Thanks.
Now that I looked more deeply in to this matter it really seems easy to cause damage to the network, not just the client using the software.
You said "...but only a few have shown interest in protecting end-users and others against these kind of "attacks".",
but it seems it can affect a lot of people and the network itself. Are any considerations been taken on the new versions of the protocol/software ?
TAS |