On Mon, Jul 28, 2014 at 5:31 AM, Robert McKay <rob...@mckay.com> wrote: > I don't think Sybil attack is the right term for this.. there is only > one IP address.. one "identity".
The bitcoin protocol is more or less identityless. It's using up lots of network capacity, "number of sockets" is as pretty close as you get. > I'm not even sure that this behaviour can be considered abuse.. it's > pretty much following the rules and maybe even improving the transaction > and block propagation. It isn't relaying transactions or blocks as far as anyone with a connection to it can tell. and sure, probably not much to worry about— people have been running spy nodes for a long time, at least that much is not new. ------------------------------------------------------------------------------ Infragistics Professional Build stunning WinForms apps today! Reboot your WinForms applications with our WinForms controls. Build a bridge from your legacy apps to the future. http://pubads.g.doubleclick.net/gampad/clk?id=153845071&iu=/4140/ostg.clktrk _______________________________________________ Bitcoin-development mailing list Bitcoin-development@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/bitcoin-development