On Sat, Jun 2, 2012 at 7:52 PM, Luke-Jr wrote:
> Analysis, comments, constructive criticism, etc welcome for the following:
>
> ==Background==
> At present, an attacker can harm a pool by intentionally NOT submitting shares
> that are also valid blocks. All pools are vulnerable to this attack, whe
Analysis, comments, constructive criticism, etc welcome for the following:
==Background==
At present, an attacker can harm a pool by intentionally NOT submitting shares
that are also valid blocks. All pools are vulnerable to this attack, whether
centralized or decentralized and regardless of rew
(response from Doug forwarded below)
It's a very good point. I have no experience with database engines. I
had assumed that in most cases, data could always be indexed in RAM, and
wanted to know where to go when that's not the case. I will look into
that solution, further.
I am very inter
Devs,
I have decided to upgrade Armory's blockchain utilities, partly out of
necessity due to a poor code decision I made before I even decided I was
making a client. In an effort to avoid such mistakes again, I want to
do it "right" this time around, and realize that this is a good
discussi
4 matches
Mail list logo