Caching is awesome but it doesn’t come without a cost, just like many things in life.
If hacker are using randomly generated key, cache with null value will still have the same issue.
Sometimes, I see it can be called caching penetration.
How many keys can a bloom filter hold?
If hacker are using randomly generated key, cache with null value will still have the same issue.
Sometimes, I see it can be called caching penetration.
How many keys can a bloom filter hold?