Post
Topic
Board Project Development
Re: P2P Trading Protocol for Bitcoin draft proposal - looking for comments
by
dansmith
on 16/11/2013, 09:37:08 UTC
Quote
All messages they send to the network include a corresponding digital signature verifying the message.

A potential attacker impersonates an existing peer Bob with good reputation and starts flooding the network with fake messages as if coming from Bob. All other peers will have to check the digital signatures of the fake messages before such messages get discarded. What is the mechanism to prevent such flooding and subsequent consumption of CPU resources of those peers who check the signatures?