issues
search
randomchain
/
developing-beacon-paper
1
stars
0
forks
source link
Security Design
#14
Closed
mathiassmichno
closed
6 years ago
mathiassmichno
commented
6 years ago
DOS
Only input collectors and publishers should be vulnerable
Input processors and computation nodes should be "hidden" on internal networks
DOS through overwhelming the input processor should not be possible by rate limiting in input collectors, and potentially distributed input processors
Secure channels
Not a thing
The operator could be malicious, so if secure channels was a problem it would be very bad