|
On Mon, Jan 2, 2012 at 10:49 PM, Mark Hamburg <mark@grubmah.com> wrote: > Presumably the malicious data isn't going to survive a GC. in the original paper, the danger is in hashtables with keys from the network. they would totally survive a GC. -- Javier