3 Comments

If hacker are using randomly generated key, cache with null value will still have the same issue.

Expand full comment

Sometimes, I see it can be called caching penetration.

Expand full comment

How many keys can a bloom filter hold?

Expand full comment