You are viewing a single comment's thread from:

RE: LeoThread 2025-11-18 15-14

in LeoFinance4 days ago

Part 10/14:

The conversation shifts toward inscriptions (NFT-like data stored within Bitcoin transactions). Gloria acknowledges that the existence of inscriptions introduces new complexities, including potential attack vectors like transaction sniping or mempool "pinning"—where malicious actors attempt to prevent certain transactions from being confirmed.

She recounts real-world instances where “pinning” occurred, with attackers race to claim inscriptions or exploit protocol limitations by flooding mempools with high-volume transactions, thus delaying or censoring others. Despite these challenges, she emphasizes that the core design aims for censorship resistance, but recognizing vulnerabilities is essential for ongoing improvement.


The Future of Bitcoin Development and Governance