Content pfp
Content
@
0 reply
0 recast
0 reaction

Pawel Pokrywka pfp
Pawel Pokrywka
@pawelpokrywka
Idea: Protecting Your Validator from Attacks During Block Proposal to Prevent MEV Theft Recently, I read a paper on validator deanonymization (linked in the last comment). TL;DR: An attacker could find the IP address used by your validator. Then, when you're about to propose a block with significant MEV (Miner Extractable Value), the attacker can launch a cheap DoS (Denial of Service) attack on your internet connection. You would miss the opportunity to propose a block. The attacker would then DoS the next validator and repeat this until their validator is selected. This would allow them to propose a block, essentially stealing your winning lottery ticket and grabbing all the MEV.
3 replies
0 recast
4 reactions

Rémy Roy pfp
Rémy Roy
@remyroy.eth
Even though this attack has been theorized, we haven't seen it happen in the real world. You also have to include a potential loss of reputation for the attacker in this equation because this would be visible on the network. Even though the severity of this is potentially big, the difficulty is high and it comes with a few other risks.
1 reply
0 recast
2 reactions

Pawel Pokrywka pfp
Pawel Pokrywka
@pawelpokrywka
Fully agree.
0 reply
0 recast
0 reaction