Please explain how the sophisticated August 2014 Monero network spam attack was designed and conducted.
How did the Monero core team respond to the attack and prevent any lasting damage?
Please explain how the sophisticated August 2014 Monero network spam attack was designed and conducted.
How did the Monero core team respond to the attack and prevent any lasting damage?