pull down to refresh
0 sats \ 1 reply \ @BTCillustrated 20 Nov \ parent \ on: Moroccan Zellij Mosaics Design
Oooh, I see! I'm Moroccan, which is why I was curious
Hope you had a great time there
105 sats \ 0 replies \ @BTCillustrated OP 18 Nov \ parent \ on: What's Inside a Bitcoin Full Node? bitcoin
deal š¤
Yaa but I think breaking hash functions (SHA-256) is fundamentally different from breaking ECC or RSA.
I still have a question that I don't have an answer to: if ECC and RSA could be broken with the advent of quantum computers, what makes hash functions remain secure?
Thank you @Bit_Alb
I think I might need to make a separate illustration for policy rules if thatās something youāre interested in
21 sats \ 1 reply \ @BTCillustrated OP 14 Nov \ parent \ on: What's Inside a Bitcoin Full Node? bitcoin
What determines the amount of inbound connections?
The
bitcoind
client has a -maxconnections
configuration option. Setting -maxconnections=N
specifies the total number of connections, including both incoming and ourbound connections (the default is 125, 8 outbound and 117 inbound)How is the banlist populated?
Nodes are identified by their IP addresses. If a node misbehaves => it gets added to its "ban list" => so it wonāt listen to that node anymore (The more people that "ban" that node, the less effect it has on the network)
Misbehaving includes things like spamming mempool messages, relaying invalid transactions, and broadcasting invalid blocks (Reference: https://bitcoin.stackexchange.com/questions/48834#48835)