Skip to content

Latest commit

 

History

History
19 lines (13 loc) · 1.35 KB

README.md

File metadata and controls

19 lines (13 loc) · 1.35 KB

This section describes known threats against second-layers protocols.

Most of the threats are classified as instances of transaction-relay jamming, where a counterparty leverage an element of full-nodes transaction and mempool acceptance policy rules to obstruct propagation of the victim time-sensitive transactions, and thus compromise user's coin safety.

Other classes of attacks are considered, where either the attacker leverage some limitation of the bitcoin system (e.g transaction throughput with mempools-flooding or a privileged role (e.g miner in miner-harvesting). Those latter classes of attacks should deserve more hightlight have they have been less studied from the opinion of this note author.

Bitcoin second-layers are differing in function of their security assumptions and such discussion about different security models is wip in security-models.

Each threat notice describes the vulnerability exploited, one or many attack scenarios, the list of vulnerable protocols, potential mitigations and points toward more ressources.

List of threats: