Skip to content

add countermeasure -- do not update blockchain data filters #137

@kristovatlas

Description

@kristovatlas

attack II.E is:
Reduce the false positive rate of filters by comparing how the filters received from a single client change over time (7df9676792e7439f391c641a206ed4505d6bdf7b5c43f4c8b1dcecf4776ebc75)

It currently only has one countermeasure, OBPPV3/CM22 (eb0dc1462a3d90740def288f8407a3501032a00d92d8ef1926b60778a6a20d86):
If a filter requires an update, send the new filter to a different peer than the peer which has the old filter

with one criterion, OBPPV3/CR28 (eaa21085ff84067e245a2f48ed6c6b27c23040163a7b87ea1f0ab93b2d715489):
A single query for blockchain data may correspond to multiple addresses in a user's wallet, but a separate connection context is used for each query

I'd like to add another countermeasure:

Do not update probabilistic filters sent to peers to query blockchain data

And list OBPPV3/CR25 (e9d26b9622bbc535f5625505cf2e4924847058b97e055323a332f82ed24bf067) under that:
Blockchain data is obtained from a local copy of the blockchain

The reason for this is that CM22 should have a weighting that reflects its <100% effectiveness against attack II.E, given that the second peer that you send an updated filter to may be colluding with the first peer you sent the old filter to.

Metadata

Metadata

Assignees

No one assigned

    Type

    No type

    Projects

    No projects

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions