Author: Mike Hearn 2012-10-24 20:58:30
Published on: 2012-10-24T20:58:30+00:00
In the context provided, an attacker's worst-case scenario for getting a user to saturate their upstream bandwidth or use lots of memory is discussed. The suggestion given is to set a bloom filter that matches everything and then request old blocks in the chain. Although this method would be slightly worse than shipping a full block, it would still achieve the desired outcome. However, if the goal is simply to saturate bandwidth or disk IOPS, the attacker could simply request random blocks repeatedly. This method would likely prove effective in achieving the desired outcome without the need for a specialized approach like setting a bloom filter.
Updated on: 2023-06-06T08:05:56.967118+00:00