On 03/12/2013 12:39 AM, Mike Hearn wrote: > RAM is used as a database cache. > > But regardless, what kind of attack are you thinking of? Using up all > available disk seeks by sending a node a lot of fake transactions that > connect to unspent outputs, but have invalid transactions? You'll get > yourself disconnected and the IP banned even with todays code. I'm thinking that (assuming 2000 tx/s and UTXO growing 50 GB/year) a malicious miner could create 1 GB of unspent outputs and then spam nodes with valid transactions. This would not be dangerous, if UTXO were smaller and fit on RAM.
Thank you for reading and correcting me :) ------------------------------------------------------------------------------ Symantec Endpoint Protection 12 positioned as A LEADER in The Forrester Wave(TM): Endpoint Security, Q1 2013 and "remains a good choice" in the endpoint security space. For insight on selecting the right partner to tackle endpoint security challenges, access the full report. http://p.sf.net/sfu/symantec-dev2dev _______________________________________________ Bitcoin-development mailing list Bitcoin-development@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/bitcoin-development