The Chaincode Podcast cover image

Pieter Wuille & Amiti Uttarwar and the P2P network - Episode 16

The Chaincode Podcast

CHAPTER

The Cibil Attack Is a Problem in a Bit.

The idea is there that a single source, where a range of ip addresses that are presumably geographically or administratively close to each other, only have access to certain part of the data base. And how do you prevent a spammer, like a malicious spammer, who is trying to poison your data? That's where that came from, an and all the rest, i think, is just made up some numbers. What's a reasonable memory usage? How many table entries should there be? Does this magical constant of never revealing more than 23 % of the table? I have no idea comes from.

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner