Gregory Maxwell
a53b07313f
Apply BIP30 checks to all blocks except the two historic violations.
...
Matt pointed out some time ago that there existed a minor DOS
attack where a node in its initial block download could be wedged
by an overwrite attack in a fork created between checkpoints before
a time where BIP30 was enforced. Now that the BIP30 timestamp
is irreversibly past the check can be more aggressive and apply to
all blocks except the two historic violations.
2012-09-17 02:03:44 +00:00
..
2012-08-26 22:14:06 +00:00
2012-05-20 20:15:41 +00:00
2012-08-26 22:43:42 +00:00
2012-07-22 22:09:49 +00:00
2012-08-26 22:14:06 +00:00
2012-05-20 20:15:41 +00:00
2012-08-12 17:00:02 +00:00
2012-05-22 22:47:51 +00:00
2012-05-22 22:47:51 +00:00
2012-06-14 19:52:31 +00:00
2012-08-12 17:00:02 +00:00
2012-05-20 20:15:41 +00:00
2012-08-12 17:00:02 +00:00
2012-05-20 20:15:41 +00:00
2012-05-20 20:15:41 +00:00
2012-05-20 20:15:41 +00:00
2012-05-20 20:15:41 +00:00
2012-09-17 02:03:44 +00:00
2012-08-26 21:06:26 +00:00
2012-09-10 23:42:06 +00:00
2012-05-20 20:15:41 +00:00
2012-05-20 20:15:41 +00:00
2012-08-12 17:00:02 +00:00
2012-05-20 20:15:41 +00:00
2012-08-12 17:00:02 +00:00
2012-05-20 20:15:41 +00:00
2012-08-12 17:30:36 +00:00
2012-08-26 22:43:42 +00:00
2012-08-27 19:07:05 +00:00
2012-05-20 20:15:41 +00:00
2012-05-20 20:15:41 +00:00
2012-05-20 20:15:41 +00:00
2012-05-20 20:15:41 +00:00
2012-08-12 17:30:36 +00:00
2012-06-18 19:39:10 +00:00
2012-09-06 20:39:12 +00:00
2012-05-20 20:15:41 +00:00