Bitcoin Forum
March 05, 2026, 09:38:54 AM *
News: Latest Bitcoin Core release: 30.2 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Automated node opsec: timing correlation flaw  (Read 49 times)
CryptoVoyager24 (OP)
Newbie
*
Offline Offline

Activity: 19
Merit: 31


View Profile
March 01, 2026, 03:40:51 PM
Merited by vapourminer (1)
 #1

Timing attacks on automated nodes. need some advice.
Im using cloudflare tunnels for inbound webhooks. Node only uses tor for outbound.
But the timing is a dead giveaway. Webhook hits the server, tx hits the tor network right after. Anyone watching both sides can just link the timestamps and dox the real ip.
How do people add random delay to the broadcast? Hoping there is a native core setting for this. Really dont want to build a custom python script just to hold the tx. Thoughts?
NotATether
Legendary
*
Offline Offline

Activity: 2254
Merit: 9557


https://b1exch.io


View Profile WWW
March 01, 2026, 09:11:36 PM
Merited by ABCbits (2), vapourminer (1), BattleDog (1)
 #2

It does not exist, unfortunately.

Here is a thread by another guy asking people if they would want this feature: https://delvingbitcoin.org/t/scheduled-delayed-transaction-broadcast/2148/4

The only way you'll get reliable delayed broadcasting that doesn't hang up your server-side request is by utilizing cron jobs which read and write transacion hashes to files in a queue (just put the timestamp at the end for order purposes or something) and then a custom script reads one TX file off at a schedule and broadcasts it. Use locks so that the two programs don't access a file at the same time.

 
 b1exch.io 
  ETH      DAI   
  BTC      LTC   
  USDT     XMR    
.███████████▄▀▄▀
█████████▄█▄▀
███████████
███████▄█▀
█▀█
▄▄▀░░██▄▄
▄▀██▄▀█████▄
██▄▀░▄██████
███████░█████
█░████░█████████
█░█░█░████░█████
█░█░█░██░█████
▀▀▀▄█▄████▀▀▀
BattleDog
Full Member
***
Offline Offline

Activity: 180
Merit: 183



View Profile WWW
March 04, 2026, 03:57:43 PM
 #3

You can try to decouple the webhook from the broadcast (have the webhook just drop the raw tx into a queue and then just return instantly, and have a separate scheduled job broadcasts on its own cadence with some randomized delay). That gets you jitter without hanging requests and without needing a big custom daemon.

Just keep in mind jitter only beats casual correlators. If someone can repeatedly trigger your webhook and watch the mempool, they can still narrow you down unless you batch at fixed intervals or blend with other outbound noise. The best defense is still not letting your origin be reachable and keeping the broadcast path isolated from whatever receives the webhook.

Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!