Fig. 15From: Evicting and filling attack for linking multiple network addresses of Bitcoin nodesExample: Source code comparison of incoming connection processing mechanism for Bitcoin v22.0 and Bitcoin Cash v26.0 (the left side is the code of Bitcoin and the right is of Bitcoin Cash)Back to article page