2019-09-13 UTC
#
melody you need to attack the problem from both ends in a decentralized network, relatively few attackers are motivated enough to modify the software to disable the features, especially in ways that are undetectable, and unresourced attackers who don't control their own deployments can't modify the stock software, so that protects you from a lot of drive-by harassment that isn't driven by a sophisticated and highly motivated adversary