• What is ‘flooding’? It’s the start of a new transaction broadcasted in all direction over the network. Where the transaction is communicate to all its peers, who in turn communicate to all their peers, with some checks to prevent redundant communication
• What are the two phases of a Dandelion broadcast and what happens in each phase? The phases are the anonoymity (stem) phase and the spreading (fluff) phase. The difference is that the anonymity phase uses a proxy node and the connection set changes with time.
• What potential weakness of Dandelion does Dandelion++ aim to address? The weakness of large scale rule breaking deanonymization attacks.
• Under the Dandelion++ protocol, what are the two ways to transition from the ‘stem’ phase to the ‘fluff’. The stem phase use dynamic connectivity and it proceeds in discreet intervals called epoch. For each epoch a node classifies itself as either a relayer or a diffuser, the nodes are determined at random at the start of each epoch. The node could also trigger the fluff phase.