Hi, On Tue, Jul 17, 2012 at 11:03 PM, Scott Best <[email protected]> wrote:
> > > > I'm out of my depth here, but I don't see why its so difficult to defend > against denial of service attacks. You listen for certain things on > certain ports, each has an appropriate sized buffer and when that's full > you block the port. Can't a simple buffer full, block port routine be run > at a level that is secure from Trojans? > > Along these same lines, I was wondering if a "proof of work" element to a > search request might also help against the ten billion problem. What is this "ten billion problem" ? best, valerio
_______________________________________________ p2p-hackers mailing list [email protected] http://lists.zooko.com/mailman/listinfo/p2p-hackers
