asciilifeform: ben_vulpes: why would you need a spreadshit on a box where you can dynamically conjure a porthole into $arbitrarydatum onto the display ?
asciilifeform: 2) the kind that is behind impenetrable and entirely nonpublic wall, a la gossipd, and deals only with cryptoidentifiable peers.
asciilifeform: 1) the kind that processes ALL INPUTS at LINE SPEED
asciilifeform: ultimately, there are precisely two kinds of possible bitcoin node:
asciilifeform: as per the 'nobody gets jack shit just for showing up' law.
asciilifeform: incidentally i see no reason why any trb node ought to allow a tx (mempool, vs in-block) to consume more cpu time than it took to receive from the nic.
asciilifeform: http://log.bitcoin-assets.com/?date=16-02-2016#1407285 << 'Note that the attacker does not need to sign the inputs nor to have the full block-chain to perform the attack. He only requires the hashes of all previous transactions...' << why not check the sigs ~first~, before fetching anything ?☝︎
asciilifeform: (legend has it that some former fucktoy of castro's got as far as his office, in hopes of claiming bounty, he handed her a pistol himself, 'do it', she did not)
asciilifeform: incidentally, who remembers how kennedy put $1 on fidel castro's head ?
asciilifeform: generally it is a process resembling apiculture. no one individually orders a bee to pollinate a particular plant. bees - are introduced, do their thing. likewise dreppers.
asciilifeform: gotta understand how 'finding vulns' actually works.