Transaction

dae4e2c1f4dc8b3b6bdd88154282e763c3f2231f2fdae70025ff30dff183c9f5
Timestamp (utc)
2024-03-28 05:42:20
Fee Paid
0.00000013 BSV
(
0.00626504 BSV
-
0.00626491 BSV
)
Fee Rate
10.24 sat/KB
Version
1
Confirmations
92,999
Size Stats
1,269 B

2 Outputs

Total Output:
0.00626491 BSV
  • j"1LAnZuoQdcKCkpDBKQMCgziGMoPC4VQUckMø<div class="post">Bitcoin's p2p network is subject to various kinds of denial of service attacks.<br/><br/>There, I said it.<br/><br/>Do you have constructive suggestions for how to fix it, or are you the kind of person who just enjoys breaking things because you can?<br/><br/>Ideas that have been bouncing around my head that may or may not work:<br/><br/>+ have clients tell each other how many transactions per unit of time they're willing to accept.&nbsp; If a client sends you more (within some fuzz factor), drop it.&nbsp; Compile in a default that's based on estimated number of transactions for a typical user and estimate on the number of current users.<br/><br/>+ require some proof-of-work as part of the client-to-client connection process (helps prevent 'Sybil' attacks).<br/><br/>This is an active area of research; see, for example: <a href="http://scholar.google.com/scholar?q=ddos+attacks+by+subverting+membership">http://scholar.google.com/scholar?q=ddos+attacks+by+subverting+membership</a></div> text/html
    https://whatsonchain.com/tx/dae4e2c1f4dc8b3b6bdd88154282e763c3f2231f2fdae70025ff30dff183c9f5