36 entries in 0.357s
BingoBoingo: "To the network,
PseudoNode behaves the same way as a full node by relaying transactions, blocks, addresses, etc. However, unlike a normal full node,
PseudoNode does not verify data (txs & blocks) itself. Rather,
PseudoNode relies on neighboring peers (with configurable confidence levels) to do the verification on
PseudoNode's behalf. As a result,
PseudoNode is very lightweight."
a111: Logged on 2017-02-26 19:14 asciilifeform: the 'type 2' (non-verification) blackhole goes right back to the fundamental question of 'something to all comers', how much disk thrashing does a derp get to invoke simply by coming up with a not-yet-banned ip and a
pseudonode.
BingoBoingo: asciilifeform: In this case SPV is being used to describe garden variety
pseudonode BingoBoingo: Naphex: You know the
pseudonode thing runs well in an AWS micro
punkman:
pseudonode also useful for DoS experiments and such
cazalla: way to butcher
PseudoNode spelling