Jay F [ARCHIVE] on Nostr: š
Original date posted:2013-04-09 š Original message:On 4/9/2013 4:09 AM, Peter ...
š
Original date posted:2013-04-09
š Original message:On 4/9/2013 4:09 AM, Peter Todd wrote:
> On Tue, Apr 09, 2013 at 12:42:12PM +0200, Mike Hearn wrote:
>> hack by changing the protocol. Nodes can serve up blocks encrypted under a
>> random key. You only get the key when you finish the download. A blacklist
> NAK
>
> Makes bringing up a new node dependent on other nodes having consistent
> uptimes, particularly if you are on a low-bandwidth connection.
>
>> can apply to Bloom filtering such that transactions which are known to be
>> "abusive" require you to fully download the block rather than select the
>> transactions with a filter. This means that people can still access the
> NAK
>
> No blacklists
>
It depends on how clever the spammers get encoding stuff. If law
enforcement forensic tools can pull a jpeg header + child porn out of
the blockchain, then there's a problem that needs mitigation.
Published at
2023-06-07 11:45:01Event JSON
{
"id": "cd096f5f8439a238afa972fbad73c6760437c60e6b6857e7a803a405c3420e50",
"pubkey": "73b6e6f0344a84112c64d1df426c3d59d01dad0d1bc9c6503ca9c735bcfc9959",
"created_at": 1686138301,
"kind": 1,
"tags": [
[
"e",
"1fce10f48c7979cc6324f993224b2f148fcc72bf03070abeee62b7ea0f802560",
"",
"root"
],
[
"e",
"60ab5340de557304da263f96753b7ef8e96306d77830fbee625f6933824cfc68",
"",
"reply"
],
[
"p",
"daa2fc676a25e3b5b45644540bcbd1e1168b111427cd0e3cf19c56194fb231aa"
]
],
"content": "š
Original date posted:2013-04-09\nš Original message:On 4/9/2013 4:09 AM, Peter Todd wrote:\n\u003e On Tue, Apr 09, 2013 at 12:42:12PM +0200, Mike Hearn wrote:\n\u003e\u003e hack by changing the protocol. Nodes can serve up blocks encrypted under a\n\u003e\u003e random key. You only get the key when you finish the download. A blacklist\n\u003e NAK\n\u003e\n\u003e Makes bringing up a new node dependent on other nodes having consistent\n\u003e uptimes, particularly if you are on a low-bandwidth connection.\n\u003e\n\u003e\u003e can apply to Bloom filtering such that transactions which are known to be\n\u003e\u003e \"abusive\" require you to fully download the block rather than select the\n\u003e\u003e transactions with a filter. This means that people can still access the\n\u003e NAK\n\u003e\n\u003e No blacklists\n\u003e\nIt depends on how clever the spammers get encoding stuff. If law \nenforcement forensic tools can pull a jpeg header + child porn out of \nthe blockchain, then there's a problem that needs mitigation.",
"sig": "e3fe2c0100974fe3b23042f49ea573920214fa6d4231325c3b3daee0573fee88839a3ba3997010174d7db648f7bf33302de240262c153936a41b2c292ea82ff3"
}