Calvin Ayre, Coingeek’s owner, has publicly stated their website was being DDoSed starting this Tuesday. Ayre said:
“Someone DDosing http://CoinGeek.com… this is exactly my point on why we need adult leadership provided by miners to take over from the Devs.”
It appears the DDoS went on until yesterday when Ayre said: “can not even knock out a website for one day. CoinGeek is back in operation….better than ever.” He then added:
“I want to thank my DDoS friends. Their voluntary paying to stress test my website made it stronger. The Bitcoin Stress test coming will similarly expose weaknesses and make the network stronger. We know Bitcoin SV will keep the network strong. 128 M onchain blocks anyone?”
It’s not very clear who DDoSed their website, but this is probably a warning ahead of a chain-split fork in a few hours.
Ayre has implicitly backed threats of a 51% attack against BCH made by nChain and Craig Wright. It remains to be seen now whether they will follow through, but if they do it appears alongside a hashwar there might be a DDoS show.
The website of course is irrelevant, but if they do misbehave then the pool might be DDoSed. That’s what happened to Ghash in 2014 when they gained 51% of bitcoin’s hashrate.
A DDoS quickly took their pool offline, with Ghash then slowly becoming a thing of the past and now very much bankrupt.
BSV nodes might also be DDoSed, especially mining nodes, with they currently totaling at just 192. Then if they do keep on attacking it may be that any little piece of code that can be exploited will probably be exploited.
It would moreover be difficult to point fingers because while some in Bitcoin Core are tactically aligning with Craig Wright, there are plenty of fine Bitcoin Core devs who would come on the side of ABC.
Eth devs would probably join too, as may the Zcash ones and really the entire crypto space. That’s because a public blockchain is first and foremost a global community. They have rivalries and so on, fiercely competing with each other, but within the rules.
If they try to misbehave then the defenses are plenty, including knocking out their pools, their nodes, and chopping up their amateur code which has not seen one commit in about a month.
Meaning we probably won’t see much more than just words for entertainment, but if we do, then we might see how you overpower an attacker through code with or without having more hash than the attacker.