Identity & Privacy Attacks

Deanonymization via Metadata

Attack: Attempting to correlate signal timing, network traffic, or submission patterns to identify contributors.

Mitigations:

  • ZK relayers break timing correlation

  • Batch submission windows

  • No persistent contributor identifiers

  • Optional delay randomization

Residual Risk: Low, assuming standard network hygiene.

Reputation Inference Attacks

Attack: Trying to infer high-reputation contributors via profit correlation.

Mitigations:

  • Reputation never directly maps to payout size

  • Rewards distributed probabilistically within contribution bands

  • No public leaderboards or per-signal attribution

Residual Risk: Very low—no observable reputation signal exists.

Last updated