Mempool Incentive Compatibility

The proposal is based on a flawed approach. I demonstrated this general issue per an example. The author responded by addressing the specific mechanism used in the example instead of addressing the general flaw. I concluded that it is not a constructive use of my time to engage further.

The absence of an attack does not prove security, especially in presence of obvious simpler explanations.

1 Like