attack II.E is:
Reduce the false positive rate of filters by comparing how the filters received from a single client change over time (7df9676792e7439f391c641a206ed4505d6bdf7b5c43f4c8b1dcecf4776ebc75)
It currently only has one countermeasure, OBPPV3/CM22 (eb0dc1462a3d90740def288f8407a3501032a00d92d8ef1926b60778a6a20d86):
If a filter requires an update, send the new filter to a different peer than the peer which has the old filter
with one criterion, OBPPV3/CR28 (eaa21085ff84067e245a2f48ed6c6b27c23040163a7b87ea1f0ab93b2d715489):
A single query for blockchain data may correspond to multiple addresses in a user's wallet, but a separate connection context is used for each query
I'd like to add another countermeasure:
Do not update probabilistic filters sent to peers to query blockchain data
And list OBPPV3/CR25 (e9d26b9622bbc535f5625505cf2e4924847058b97e055323a332f82ed24bf067) under that:
Blockchain data is obtained from a local copy of the blockchain
The reason for this is that CM22 should have a weighting that reflects its <100% effectiveness against attack II.E, given that the second peer that you send an updated filter to may be colluding with the first peer you sent the old filter to.
attack II.E is:
Reduce the false positive rate of filters by comparing how the filters received from a single client change over time(7df9676792e7439f391c641a206ed4505d6bdf7b5c43f4c8b1dcecf4776ebc75)It currently only has one countermeasure, OBPPV3/CM22 (eb0dc1462a3d90740def288f8407a3501032a00d92d8ef1926b60778a6a20d86):
If a filter requires an update, send the new filter to a different peer than the peer which has the old filterwith one criterion, OBPPV3/CR28 (eaa21085ff84067e245a2f48ed6c6b27c23040163a7b87ea1f0ab93b2d715489):
A single query for blockchain data may correspond to multiple addresses in a user's wallet, but a separate connection context is used for each queryI'd like to add another countermeasure:
And list OBPPV3/CR25 (e9d26b9622bbc535f5625505cf2e4924847058b97e055323a332f82ed24bf067) under that:
Blockchain data is obtained from a local copy of the blockchainThe reason for this is that CM22 should have a weighting that reflects its <100% effectiveness against attack II.E, given that the second peer that you send an updated filter to may be colluding with the first peer you sent the old filter to.