Author: Max Hillebrand 2022-08-20 10:04:11
Published on: 2022-08-20T10:04:11+00:00
The implementation of an idea is appreciated, but there may be a vulnerability of denial of service. A user can register one input and receive the round secret identifier, which is enough for output registration. However, a malicious user can register multiple outputs with the same secret, making it impossible to link them to any specific input. As a result, blame round cannot be conducted, allowing for an ongoing free denial of service attack without attribution or defense.
Updated on: 2023-06-15T23:51:28.168593+00:00