<div dir="ltr">&gt; Do I understand correctly that this attack only applies if Alice<br>&gt; attempts to fee bump her batch transaction?  In short, is this the<br>&gt; attack:<div><br></div><div>Fundamentally, yes. This attack is primarily targeting all transaction flows with a fee bump.</div><div><br></div><div>See section 6.4 of the joined paper for more characterization of the &quot;Transaction Traffic Hijack&quot;, while no quantitative analysis of the average % txn affected has been done so far.</div><div><br></div><div>There could also be UTXO-sharing flows that are affected, where the attacker is propagating first, and preventing the other tx to propagate, before evicting his own package.</div><div><br></div><div>However no test and no thoughts has been given to this &quot;block-first-at-the-UTXO-root&quot; alternative, the fee bump is more concerning.</div><div><br></div><div>Best,</div><div>Antoine</div></div><br><div class="gmail_quote gmail_quote_container"><div dir="ltr" class="gmail_attr">Le lun. 27 janv. 2025 à 22:17, David A. Harding &lt;<a href="mailto:dave@dtrt.org">dave@dtrt.org</a>&gt; a écrit :<br></div><blockquote class="gmail_quote" style="margin:0px 0px 0px 0.8ex;border-left-width:1px;border-left-style:solid;border-left-color:rgb(204,204,204);padding-left:1ex">On 2025-01-27 05:22, Antoine Riard wrote:<br>
&gt; As soon as Alice&#39;s batch transaction starts to propagate, Mallet<br>
&gt; consumes its 2 outputs with 2 chain of junk transactions to reach max<br>
&gt; package limits (25 descendants) and block the carve-out. The junk<br>
&gt; transactions are of size 150 bytes and feerates 2 satoshis per virtual<br>
&gt; byte and they have 2 parents: one Alice&#39;s payout UTXO and one Mallet&#39;s<br>
&gt; UTXO.<br>
&gt; <br>
&gt; Starting from this point, Alice&#39;s exchange server logic should either<br>
&gt; (a) attempts a CPFP or (b) attempts a RBF on the batch transaction. As<br>
&gt; there is no global mempool, Alice is uncertain on the explanation for<br>
&gt; the lack of propagation of her batch transaction [...]<br>
<br>
Do I understand correctly that this attack only applies if Alice<br>
attempts to fee bump her batch transaction?  In short, is this the<br>
attack:<br>
<br>
- Alice broadcasts a transaction.<br>
- Mallet pins Alice.<br>
- Alice doesn&#39;t realize she&#39;s been pinned and bumps the fees.<br>
- The bump doesn&#39;t propagate due to the pin, but Mallet receives it<br>
   anyway somehow.<br>
- Mallet mines the fee bump, but nobody else mines it because it didn&#39;t<br>
   propagate.  Mallet thus makes more money than other miners.<br>
<br>
Thanks,<br>
<br>
-Dave<br>
</blockquote></div>

<p></p>

-- <br />
You received this message because you are subscribed to the Google Groups &quot;Bitcoin Development Mailing List&quot; group.<br />
To unsubscribe from this group and stop receiving emails from it, send an email to <a href="mailto:bitcoindev+unsubscribe@googlegroups.com">bitcoindev+unsubscribe@googlegroups.com</a>.<br />
To view this discussion visit <a href="https://groups.google.com/d/msgid/bitcoindev/CALZpt%2BHyQyj6EUf39JX3nuD3izsmBSG9XUcV-EVrC05o2T%3Du7A%40mail.gmail.com?utm_medium=email&utm_source=footer">https://groups.google.com/d/msgid/bitcoindev/CALZpt%2BHyQyj6EUf39JX3nuD3izsmBSG9XUcV-EVrC05o2T%3Du7A%40mail.gmail.com</a>.<br />