https://themerkle.com/what-is-asicboost/
Referring to ASICBOOST as an exploit seems rather silly. After all, its availability is a direct consequence of the algorithm chosen, derivable directly from first principles. And you can bet your sweet bippy that -- should TPTB ever get into the mining biz in order to coopt Bitcoin -- they'll be using the exact same techniques. We need to be ready to match them hash-for-hash. For only in an _excess_ of honest miners do we retain a usable system.
To understand Kore minions, you have to use the Kore-speak Translation Matrix:
optimization = "exploit"
hard fork = "attack"
forking the code = "attack"
specification = "code"
former Kore dev = "attacker"
advocate for sane solutions = "troll"
etc.
Anybody read Gerard? https://davidgerard.co.uk/blockchain/2017/11/12/news-lightning-network-new-layer-monero-popularity-ico-securities-tether-analysis-devouring-the-past/
LOL only 18 more months
....
Move away mining power = "attack"
Move away funds = "attack"
Critisism = "FUD"
Critical thinker = "enemy"