This will be really important, as well as proof-of-x mechanisms to prevent attacks like:
Which might be happening actually:
2M more nodes in less than 24 hours, when nodes are already running at roughly a loss?
To put the idea into a simple example, in the late 90s before music trading happened on Napster and Bittorrent, it happened with FTP servers. So I wrote a fake FTP daemon that, instead of presenting files that existed to the client, presented them from a text file. People connected, saw this giant music library that didn’t really exist, then uploaded music I wanted to build up a quota and get access to… nothing.