3 Comments
User's avatar
Qingsong Yao's avatar

If hacker are using randomly generated key, cache with null value will still have the same issue.

Manh Phan's avatar

Sometimes, I see it can be called caching penetration.

xunzhaocunzi's avatar

How many keys can a bloom filter hold?