If they've been login attacks, would not be more likely that they were trying to steal BCHs from accounts with weak passwords (brute force attack) than actually DDoS?
Correct, it was more of a brute force attack. However, requests we're coming from many different IPs. So a distributed brute force attack :P
Good question. Memo, do you throttle attempts and/or lockout accounts for bad logins? Of course not sure how they would know usernames as they are not public.
We have some throttling, but this was coming from lots of different IPs and wasn't targeting any specific accounts.
Can you setup a underfunded, integrated faucet so that new users immediately can receive (automatically) sats needed to get started?
Faucets are hard because it's easy for someone to write a script that registers lots of accounts and drains the faucet. Hopefully we can figure out a way to prevent that though.
Got into bitcoin several years after the 2008 crisis, after starting a business and finally learning the truth about how the global money supply is managed and manipulated.
That's incredible. Have you heard of Caitlin Long? We have her featuring this week on the podcast you will love it.
Is there a website that lists all brick and mortar stores that accept BCH or crypto in general? I looked on acceptbitcoin.cash and I know there have to be more than that. And you can’t put in by location.
Can Bitcoin Scale to 1,000's of Transactions per second on existing hardware? Do we need 2nd layer solutions? Watch Roger Ver's breakdown and don't forget to leave a comment. https://www.youtube.com/embed/5Ipgwl7-K6o
Can Bitcoin Scale to 1,000's of Transactions per second on existing hardware? Do we need 2nd layer solutions? Watch Roger Ver's breakdown and don't forget to leave a comment!
Memo is only 3 months old.
Huge progress has been made,
Great work team @memo
THANK YOU for the constant upgrades,
here is shaping up to be a great platform.
Twitter is suffering,
it has a use-by date.
Can Bitcoin Scale to 1,000's of Transactions per second on existing hardware? Do we need 2nd layer solutions? Watch Roger Ver's breakdown and don't forget to leave a comment!