
Pieter Wuille & Amiti Uttarwar and the P2P network - Episode 16
The Chaincode Podcast
The Cibil Attack Is a Problem in a Bit.
The idea is there that a single source, where a range of ip addresses that are presumably geographically or administratively close to each other, only have access to certain part of the data base. And how do you prevent a spammer, like a malicious spammer, who is trying to poison your data? That's where that came from, an and all the rest, i think, is just made up some numbers. What's a reasonable memory usage? How many table entries should there be? Does this magical constant of never revealing more than 23 % of the table? I have no idea comes from.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.