actually what i said is the textbook method for forking a coin, as outlined by ArtForz some 2-3 years ago. people like BCX have the method down to science. I was just stating the basic method for attack. you use the connect(instead of addnode) directive to create a private coin network, here with a few friends connected in this manner, you can mine all you want on your own private fork. as long as you have 51% or greater hashrate when you return your clients to the network(providing the coin is not Proof Of Stake), the coin is instantly and easily forked as your blockchain has consensus over the network because you have 51% Of NetHash. its text book.
Have you looked at the code before? Ever heard of hard coded checkpoints..? If a client out there has them they will reject any connection to any node with your alternate blockchain...
If you lower difficulty, the hashes will not match up.. and the clients that have the right blockchain will never accept yours.. it'll just show up as "orphan" to them. I don't know this BCX guy or what is "text book" attacks.. but I did look at the code, compiled the code, tested it within my own private network in various configurations.. and i don't think what you suggest.. will work as far as i can tell..
Now there are certainly other ways to screw over a coin.. but this one ain't it.
you call it cyber terrorism, thats an interesting language there bud. in reaility this is a public service, shielding them from the scams, which are the real cyber terrorism.
Who is the arbiter of what is a scam or not? You assume aurora coin is a scam, but it may very well be an important .. if not crucial experiment for the crypto world. By attacking it.. you could be negatively impacting us all..