There was a comment in this thread from a while back that got buried due to the poster being kind of a dick about the answer he got, but it was the reason I read through the whole thread to begin with, so I hope to get some clarification here...
Regarding transparent mining, and the ability to know the source of the next forged block: If a bad agent wants to attack the system, knowing the IP of the forger(s) seems like a ripe place for continuous DDOS attacks against unprotected victims. The prior answer was "forgers can use the Tor network" but that seems like a huge stretch to adoption as 99% of people don't know what that means much less how to set that up. Is that the real answer to this issue (assuming it is an "issue" to begin with)?
Thanks in advance.
It's not an issue for specialized hubs that forge blocks using leased forging power.
But most people with NXT will not have that... so how does this play out in the wild? 99 DDoS attacks on random victims who have NXT on their cell phone (and were supposed to forge the next block) and then the 100th is a hub so protected and the block gets forged? Also, what happens to the transactions that are being sent to DDoS IP addresses during the DDoS (or is that a non-issue due to the block never being forged with that IP)?