Surprising to hear that considering all the different components that can be attacked and abused...
- Peer discovery
- mempool
- utxo set db
- bitcoin script
- pinning attacks
Etc.
Surprising to hear that considering all the different components that can be attacked and abused...
- Peer discovery
- mempool
- utxo set db
- bitcoin script
- pinning attacks
Etc.