Ok fair enough, just to be clear before the fix you released could XDN have been attacked the same way as XMR. We know XDN was not attacked but it has been widely spread that all cryptonotes had the same flaw.
I will be brief as usual D< :
1. This vulnerability is a double spend vulnerability.
2. This vulnerability is possible only if blockchain split occurs. Can call it fork.
3. Split or fork is possible with long attack preparation and that preparation is visible to those who watch the blockchain.
4. XDN devs watch blockchain 24/7 to avoid that kind of issues.
5. 1->2->3->4-> XDN IS and WAS invulnerable
P.S. XDN devs fixed any related issues, and were first team who did that.
https://github.com/ducknote/ducknote/commit/e9dcc9825601f5a7b209c78e3a61169ba4f31fbc
You guys are extremely clueless or just full of shit.
XDN has a much higher default median size (32000) and also has a high background level of transactions (likely due to the ongoing pump). It woould have been extremely easy to increases the median size to around 35-40k where the attack becomes possible. If done carefully it would likely be indisinguishable from normal activity. In fact I wouldn't be surprised if the XDN median has already reached that level due to normal fluctutation without any "attack preparation" at all. In that case an attacker would merely need to lay in wait for the appropriate conditions to occur, and no about of "24/7" would prevent it.
Summary is that XDN was more vulnerable, not invulnerable. Furthermore XDN was not the first team to fix the exploit. Not by a wide margin.
Sure, now Monero devs can only offer excuses, because of the goal missed in their gates. Truly XMR devs and supporters are not quite adequate. They hate everyone. Very strange community.