“This proposal for a new P2P protocol version (v2) aims to improve upon this by raising the costs for performing these attacks substantially, primarily through the use of unauthenticated, opportunistic transport encryption,” according to the proposal. A key benefit is that “encryption, even when it is unauthenticated and only used when both endpoints support v2, impedes eavesdropping by forcing the attacker to become active.”
Related posts
-
Bitcoin hits 5-month low, Mt. Gox begins repayments, Circle secures MiCA license
Today’s edition of the weekly recap: Bitcoin (BTC) drops to a five-month low amid a series... -
Sleeping BTC Wallets Reactivate, Bitcoin Dips, and More — Week in Review
Several longtime holders of Bitcoin have reactivated dormant wallets, moving substantial amounts of BTC after years... -
$2.4 Billion Worth Of Bitcoin Exit The Network As Bear Market Bites
The Bitcoin market is experiencing a wave of uncertainty as a recent analysis by CryptoQuant reveals...