It's used to find initial peers, after that it's no longer used since your peers tell you about their peers. So it's just for bootstrapping the peer database.
You can always connect manually to a known peer for bootstrapping.
So imo, it looks worse than it is. I don't see another way to achieve the same thing as effectively.
Beginning to clarify for me. Thanks. So this seeds the peering database with trusted nodes, but it is not necessarily a centralized attack vector.
reply