Transaction

5db0e6477f2bc43bc9dfd0f9e1135f9cd8a0773daa27f5e2f9dd563e8f831b5a
Timestamp (utc)
2024-03-31 00:30:26
Fee Paid
0.00000013 BSV
(
0.00065138 BSV
-
0.00065125 BSV
)
Fee Rate
10.26 sat/KB
Version
1
Confirmations
95,425
Size Stats
1,267 B

2 Outputs

Total Output:
0.00065125 BSV
  • j"1LAnZuoQdcKCkpDBKQMCgziGMoPC4VQUckMø<div class="post">Bitcoin's p2p network is subject to various kinds of denial of service attacks.<br/><br/>There, I said it.<br/><br/>Do you have constructive suggestions for how to fix it, or are you the kind of person who just enjoys breaking things because you can?<br/><br/>Ideas that have been bouncing around my head that may or may not work:<br/><br/>+ have clients tell each other how many transactions per unit of time they're willing to accept.&nbsp; If a client sends you more (within some fuzz factor), drop it.&nbsp; Compile in a default that's based on estimated number of transactions for a typical user and estimate on the number of current users.<br/><br/>+ require some proof-of-work as part of the client-to-client connection process (helps prevent 'Sybil' attacks).<br/><br/>This is an active area of research; see, for example: <a href="http://scholar.google.com/scholar?q=ddos+attacks+by+subverting+membership">http://scholar.google.com/scholar?q=ddos+attacks+by+subverting+membership</a></div> text/html
    https://whatsonchain.com/tx/5db0e6477f2bc43bc9dfd0f9e1135f9cd8a0773daa27f5e2f9dd563e8f831b5a