This is an automated archive made by the Lemmit Bot.
The original was posted on /r/monero by /u/lt on 2024-03-09 11:16:32.
That is, this attack is aimed at de-anonymizing future transactions by stuffing the blockchain with tx known to the attacker. Thus reduce the effectiveness of ring signatures.
Flood attack tx are already 80% of the mempool. If this is allowed to go on for an extended period of time, most members of the future ring signatures could be from attacker controlled outputs.
By now you should get what I’m talking about: we need to dilute attackers tx with our own.
However, one question remains. How do we know when the attacker has stopped so we can stop our own flood.
You must log in or register to comment.