Previous: Finding network resources
The only possible security breach to my knowledge that can come from using the atomsnet application
lies in the flooding approach. Flooding is generally used to get the computer in an unstable state.
This can sometimes allow a user to get access to low level networking features .
Having an atomsnet server running does incur processor overhead. Misusing the system by sending a
massive amount of simultaneous requests can degrade system performance to the point that the system
becomes unresponsive and even unstable. In how far this can lead to security risks is dependent on
the operating system. When viewed as such, any network server running on your computer can pose a
threat, but a minor one at most.