Browse Source

zawy feedback

master
Duke Leto 4 years ago
parent
commit
e42be239d1
  1. 4
      sietch.tex

4
sietch.tex

@ -756,7 +756,7 @@ metadata.
\nsubsection{ITM Attack: Infrastructure}
This attack requires storing a lot of intermediate data in addition to the raw
blockchain data and data storage costs are likely the number two expense after
blockchain data on disk. Data storage costs are likely the number two expense after
computing power. It is possible renting compute power can lower computing expenses
but will not lower data storage costs. If one is analyzing a blockchain of $ B $ bytes
then a reasonable estimate is that $100*B $ bytes of intermediate storage will be needed
@ -975,7 +975,7 @@ chance at meaningful privacy.
\nsection{Special Thanks}
Special thanks to jl777, ITM, denioD and Biz for their feedback.
Special thanks to jl777, zawy, ITM, denioD and Biz for their feedback.
\nsection{References}

Loading…
Cancel
Save