Understanding DoS resilience

I’m trying to think of potential Denial of Service conditions that the SAFE network may encounter and gain an understanding of how its architecture would deal with them. If anyone else has any other examples please feel free to add them to this thread as I know I’ll find them very useful for my thinking and I believe others will too.

What’s to stop an actor with a lot of SAFE coins spending them back and forth between different public keys they have ownership of? From what I understand there is no cost to transferring coins on the network so what prevents users from spamming the network with this type of activity?

I don’t recall the details or have time to search, but it has been discussed so you might find answers by searching.

Be seeing you.

1 Like

Really having problems finding anything on this. Apologies if it is a repeat question.

Does any one have any info or links they can provide?