RBSR prevents special ranges, hash collisions. Two parties must trust each other to sync. Preventing legimate victim elements from syncing could be the work of a determined attacker.

Computationally it would be exceedingly difficult

Reply to this note

Please Login to reply.

Discussion

No replies yet.