but the thing is in that one day of seeing a pool use only one day old utxo. nodes can just disconnect from peers relaying such ..thus not get relayed from that node. thus. its just making blocks in its own small lill intranet(same as the empty block explanation)
I am convinced that there are ways to prepare the spam transaction set which are not easy or outright impossible to detect. The attacker has all the time of the world to do the preparation and accumulate coin age, to create a spam transaction set which looks exactly like an average "honest" transaction set.
It would not be free for the attacker, of course, as he has to pay lots of transaction fees in the "real" chain while he prepares the attack, but he can later try to get some of this money back shorting BTC.
You could try to do some kind of "social defense", i.e. a group of nodes could simply refuse to relay and validate blocks from all nodes which do not relay or mine their own transactions.
Big exchanges could believe to have the power to do that. But this would be in some way a kind of centralization. And all the attacker has to do to stop the defense is simply including a few transactions of the "social defense cartel" in his blocks. Even if he accepts 50% of the normal transactions and fills the rest of the blocks with spam, he can do a lot of damage. And then it becomes almost impossible to detect the "attack blocks".
For these reasons I think a UASF/UAHF would be much cleaner.
by the way PoS mining is less secure and has no underlying value. ..but maybe. that is this fantasy scenario attackers plan. empty/spam the blocks to try making devs flip the code to a crappy less secure hashing mechanism
PoS alone is less secure, I agree. But combined with PoW for a certain time, as a defense, could make this kind of attack much more complex. But It would only be necessary if the attacker 1) can sustain his attack and 2) has prepared for an algorithm-changing UAHF.