imo the uploader ‘Dave’ or otherwise (cli and api) should rollup these little files into a bigger file, then upload as one meta file then these files get chunked, copied with a header list for the chunk, gets added to the Key Map , yadda,
more complicated? sure,
but way more efficient use of the node space,
all of which creates an argument for a NFR ‘new feature request’
in the future, for Autonomi to support smaller upload size and smaller chunks,
or a developer can can create the upload tool variant for ‘smaller file handling rolled up’ into a minimum bigger file size.
Lots of ways to solve this, and not let micro file uploads clog the network
That said,
its going to cost one to load that many 1K micro files big time in the current edition of Autonomi, most uploaders of modest means would go broke trying to attack the network and chew up capacity with such a planned attack …
That means this type of micro file upload attack (as posited) attempt is malicious and funded by big money/competitive/dark interests,
Just thinking out loud here
One way for the network to address this type of attack might be to employ a Smart Contract Security layer
ie- Have a Smart Contract doing statistical monitoring of posts to the DAG could catch and alarm such patterns of micro file mass upload behavior and
ID the wallet(s) spending trying to support this type of attack to rapidly chew up space in an automated fashion,
a security governance mechanism fashioned say with a Smart Contract which could instruct the DAG to not accept posts to the DL for node receive payments from such Distributed Wallet Upload MicroFile Attacks from those wallet addresses confirmed by the Security SC doing the governing in RT,
with say all distributed node operators have added special Security role/daemon process, and keep an automated blacklist for their close group, if you like top prevent these wallets posted to the DAG, that get stored in the Node as an encrypted chunk copied and distributed like other chunks, always available for reference…
so in the above hypthesized security layer it would defeat in theory such a ‘mass microfile consumption of capacity attack’ from multiple ‘wallet carrying’ uploaders,
plus the network in this supposed/hypothesized security layer would have the documentation to send to the authorities to go after the hackers.
Anyway lots to think about in this regard… all doable, its just time, brain power and a bit of effort to solve it…prioritized