<div dir="auto"><div>That&#39;s a quoted general statement that is highly subjective, not a description of an attack.  If you can&#39;t articulate a specific attack vector that we&#39;re defending against, such a defense has no value.<br><div class="gmail_extra"><br><div class="gmail_quote">On Apr 1, 2017 12:41 AM, &quot;Eric Voskuil&quot; &lt;<a href="mailto:eric@voskuil.org">eric@voskuil.org</a>&gt; wrote:<br type="attribution"><blockquote class="quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div class="quoted-text">-----BEGIN PGP SIGNED MESSAGE-----<br>
Hash: SHA256<br>
<br>
</div><div class="quoted-text">On 03/31/2017 11:18 PM, Jared Lee Richardson wrote:<br>
&gt;&gt; If a typical personal computer cannot run a node there is no<br>
&gt;&gt; security.<br>
&gt;<br>
&gt; If you can&#39;t describe an attack that is made possible when typical<br>
&gt; personal computers can&#39;t run nodes, this kind of logic has no place<br>
&gt; in this discussion.<br>
<br>
</div>&quot;Governments are good at cutting off the heads of a centrally<br>
controlled networks...&quot;<br>
<div class="quoted-text"><br>
e<br>
-----BEGIN PGP SIGNATURE-----<br>
Version: GnuPG v2.0.22 (GNU/Linux)<br>
<br>
</div>iQEcBAEBCAAGBQJY31m0AAoJEDzYwH<wbr>8LXOFOayIH/<wbr>0DcWukHZUVTV8952mkWnqjS<br>
RCM8StQOuuTQ/2elvKoZa/<wbr>nEv1PvpOQEO/AxJDEdIKOqjdXoc/<wbr>QdZT/Qj834yyFi<br>
mmNLm3x8voO7rTFEVtBrXQ4VYO7Zj5<wbr>gVy6nRyMrhSGtzg4XqYiyGVoijiumf<wbr>XOvq<br>
ejLwyWJEf8klBwegIPkX4XX6UYjNyB<wbr>t+<wbr>E32Je7NxUbi54EPDRszWpEGGKfJrWi<wbr>CQ<br>
JO2jqB3O2RbMd0J1onBt2AGsjeQSE3<wbr>HO0EBQSkdGQZ7PVSdE3I49uT2aAaSc<wbr>nPOt<br>
ymbNz4QtlUWWpUgEI6VSjxHCGjX4+<wbr>Vrn3HLRwjLe4nS2EX3mOVNY8MHMvbC<wbr>eAuY=<br>
=tD9k<br>
-----END PGP SIGNATURE-----<br>
</blockquote></div><br></div></div></div>