Then to obtain 1,950 maternodes today will cost >$9m buying over 40 days if you were 100% of the volume so not that easy (or if you are attacking they are spread over 30 countries with different companies / security systems / home users to get through first).
About BTC - one incentive for taking over BTC full nodes is surveillance, like the current 5% of nodes that are performing a sybil attack on behalf of
It seems pretty resiliant to me. And masternode operators take security a lot more seriously than most, believe
From this article https://www.linkedin.com/pulse/20140726142214-262891-pricing-0-day-exploits-in-the-face-of-0-day-defenses
'Typical pricing for a relevant 0-day is $40,000 - $250,000 according to Frei'
Even if you need a few different 0-day exploits for Windows and Linux and maybe a Mac one you are still going to end up spending a lot less. MasterNode operators can't make themselves impervious to a 0-day exploit, as it is unknown by definition.
I saw a post on this thread by fluffy pony that explained the minimum that MasterNode operators would need to do to maintain security, and I agree with him. I think that it is difficult to keep the MasterNode network secure and if it is attacked then it isn't going to be able to withstand it.
i dont think fluffy is really qualified to comment on masternodes to be honest but just my opinion.
if you are genuinley interested in investing in DASH and worried about masternode security, just consider that right now there is ~$12m DASH running masternodes around the world, if its so easy to take them Fluffy and troops are saying, then why hasn't 1 DRK been taken from one yet.
Again, back in 2014 there were cases of masternodes being compromised by attackers, so yes more than 1dash/drk(More than 1,000 actually) has been compromised/stolen so far.