According to a bitcoin.stackexchange forum, because transactions are relayed prior to acceptance into a node’s mempool, Dandelion++ results in “potential DoS vectors if transactions can be systematically relayed via Dandelion but ultimately not be accepted to any node’s mempool.” In other words, transactions would get stuck, almost permanently, without every being accepted.

Bitcoin is not the only key crypto player to have not implemented or made use of Dandelion software.

Entities like Chainalysis, a blockchain analysis company, have also not dedicated many resources to Sybil attacks. “They’ve perfected blockchain analysis, so why bother with the much more expensive Sybil attack when they can just ingest data sources for correlation,” Spagni said.

This just serves as another reminder that nearly all blockchain data is publicly available—and surprisingly unsuitable for criminal activity.

News Source