So we are reduced to awaiting the empirical evidence.
I guess we have to hope that BCX was not bullshitting but is in fact doing the attack and does in fact have enough hashpower to make it work.
-MarkM-
I'm genuinely interested. Has BCX or someone else explained the variant of the attack somewhere? I remember him writing about, but not in detail. I'd like to take a look. Thanks.
Maybe if the attack works that might generate enough interest and credibility that (s)he will display the code used to do it?
Meanwhile, maybe ask for more info?
Such attacks have been done before, BCX has orchestrated or perpetrated successful attacks in the past apparently, or if not then was permitted by who-ever did so to claim the credit in this forum.
The post above this one makes clear yet again that it is necessary to actually perform the attack, and successfully, in order for the claims that these scams are vulnerable to it to be believed.
Maybe though the original discussion of the ancient attempted fix against timewarp contains explications of how the fix fails. Presumably after the fixers had already scheduled their fix and maybe not until bitcoin and litecoin had enough hashing power that it was no longer believed feasible for anyone to muster enough hashing power to succeed with the modified attack against those major hashpower chains?
That the perpetrators of new coins lacking that much hash power have not continued research and pursued it to a real fix before deploying their scams simply adds more weight to the claim they were not intending to create secure blockchains, merely to make quick and easy make-a-fast-buck scams.
They even actually go out of their way to ensure their chain cannot be secured, as if maybe planning ahead to the crash of their chain when they move on to the next so they can buy up all the coins of it at firesale prices then potentially some day go back to it, maybe when they run out of feasible names for new scams or something.
-MarkM-