3 Comments
User's avatar
Qingsong Yao's avatar

If hacker are using randomly generated key, cache with null value will still have the same issue.

Expand full comment
Manh Phan's avatar

Sometimes, I see it can be called caching penetration.

Expand full comment
xunzhaocunzi's avatar

How many keys can a bloom filter hold?

Expand full comment