|
|
@ -756,7 +756,7 @@ metadata. |
|
|
|
\nsubsection{ITM Attack: Infrastructure} |
|
|
|
|
|
|
|
This attack requires storing a lot of intermediate data in addition to the raw |
|
|
|
blockchain data and data storage costs are likely the number two expense after |
|
|
|
blockchain data on disk. Data storage costs are likely the number two expense after |
|
|
|
computing power. It is possible renting compute power can lower computing expenses |
|
|
|
but will not lower data storage costs. If one is analyzing a blockchain of $ B $ bytes |
|
|
|
then a reasonable estimate is that $100*B $ bytes of intermediate storage will be needed |
|
|
@ -975,7 +975,7 @@ chance at meaningful privacy. |
|
|
|
|
|
|
|
\nsection{Special Thanks} |
|
|
|
|
|
|
|
Special thanks to jl777, ITM, denioD and Biz for their feedback. |
|
|
|
Special thanks to jl777, zawy, ITM, denioD and Biz for their feedback. |
|
|
|
|
|
|
|
\nsection{References} |
|
|
|
|
|
|
|