Tadas Varanavičius [ARCHIVE] on Nostr: 📅 Original date posted:2013-03-11 📝 Original message:On 03/12/2013 12:39 AM, ...
📅 Original date posted:2013-03-11
📝 Original message:On 03/12/2013 12:39 AM, Mike Hearn wrote:
> RAM is used as a database cache.
>
> But regardless, what kind of attack are you thinking of? Using up all
> available disk seeks by sending a node a lot of fake transactions that
> connect to unspent outputs, but have invalid transactions? You'll get
> yourself disconnected and the IP banned even with todays code.
I'm thinking that (assuming 2000 tx/s and UTXO growing 50 GB/year) a
malicious miner could create 1 GB of unspent outputs and then spam nodes
with valid transactions. This would not be dangerous, if UTXO were
smaller and fit on RAM.
Thank you for reading and correcting me :)
📝 Original message:On 03/12/2013 12:39 AM, Mike Hearn wrote:
> RAM is used as a database cache.
>
> But regardless, what kind of attack are you thinking of? Using up all
> available disk seeks by sending a node a lot of fake transactions that
> connect to unspent outputs, but have invalid transactions? You'll get
> yourself disconnected and the IP banned even with todays code.
I'm thinking that (assuming 2000 tx/s and UTXO growing 50 GB/year) a
malicious miner could create 1 GB of unspent outputs and then spam nodes
with valid transactions. This would not be dangerous, if UTXO were
smaller and fit on RAM.
Thank you for reading and correcting me :)