RBSR prevents special ranges, hash collisions. Two parties must trust each other to sync. Preventing legimate victim elements from syncing could be the work of a determined attacker.
Computationally it would be exceedingly difficult
RBSR prevents special ranges, hash collisions. Two parties must trust each other to sync. Preventing legimate victim elements from syncing could be the work of a determined attacker.
Computationally it would be exceedingly difficult
No replies yet.