Fig. 14From: Evicting and filling attack for linking multiple network addresses of Bitcoin nodesExample: Source code comparison of incoming connection processing mechanism for Bitcoin v22.0 and v24.0 (the left side is the code of v22.0 and the right is of v24.0)Back to article page