
Pieter Wuille & Amiti Uttarwar and the P2P network - Episode 16
The Chaincode Podcast
The Eclipse Attack
The vast majority of the mitigation strategies have been implemented, says B. Wont one wis a feeler connections and a retest before victs policy? "I think there were two big ones that were done pretty much immediately after the paper came out," he adds. A few more took several years.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.