Tl;dr: Rather than storing all unspent outputs, store their hashes. Untrusted
peers can supply the full outputs when needed, with very little overhead.
Any attempt to spoof those outputs would be apparent, as their hashes would not
be present in the hash set. There are many advantages to this,
As previously discussed[0][1][2] on the mailing list, github issue commentary,
and IRC channels, there's substantial reason to disable BIP37 in network nodes
which are getting stronger as the size of the chain increases. BIP37 has
significant denial of service issues which are unsolvable in the