The obvious problem is that if you can frame it as a valid address, you can put what you want there. If you can make it pass the validation, miners have no way of knowing it's not a valid address. Of course, there is nothing new about this. I ran strings on the blockchain and found all sorts of ascii rubbish right from the beginning. On 9 April 2013 21:17, Jay F wrote: > On 4/9/2013 4:09 AM, Peter Todd wrote: > > On Tue, Apr 09, 2013 at 12:42:12PM +0200, Mike Hearn wrote: > >> hack by changing the protocol. Nodes can serve up blocks encrypted > under a > >> random key. You only get the key when you finish the download. A > blacklist > > NAK > > > > Makes bringing up a new node dependent on other nodes having consistent > > uptimes, particularly if you are on a low-bandwidth connection. > > > >> can apply to Bloom filtering such that transactions which are known to > be > >> "abusive" require you to fully download the block rather than select the > >> transactions with a filter. This means that people can still access the > > NAK > > > > No blacklists > > > It depends on how clever the spammers get encoding stuff. If law > enforcement forensic tools can pull a jpeg header + child porn out of > the blockchain, then there's a problem that needs mitigation. > > > ------------------------------------------------------------------------------ > Precog is a next-generation analytics platform capable of advanced > analytics on semi-structured data. The platform includes APIs for building > apps and a phenomenal toolset for data science. Developers can use > our toolset for easy data analysis & visualization. Get a free account! > http://www2.precog.com/precogplatform/slashdotnewsletter > _______________________________________________ > Bitcoin-development mailing list > Bitcoin-development@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/bitcoin-development >