From what we know on the "public key sniping" issue so far any my understanding is:
- Revealing the public key in the mempool immeadiately sets of a double spending attack by the sharks - depending on miners rules they might or might not adhere to RBF or first timestamp ordering and might just accept the higher fee -> never reveal the pubkey in the mempool and work out a private deal with a miner to "shadow-mine" this transaction is the only safe way.
- Revealing a signature to prove I own the private key is also unsecure -> communication channel with miner needs to be secure and miner needs to be trusted not to use the same attack vector as the sharks as soon as I send the private transaction to them
Under these assumptions, my game plan would be:
1. Create a post here in the forum containing:
- SHA256 hash of the private key along with my target address where I intend to send the coins to.
- SHA256 hash of a message containing a text stating my intention to send the coins to my adress along with the miner name I intend to work with.
Ask the forum to cite this post to avoid edibility and prove of time stamp.
2. Contact the miner and work out a deal to shadow-mine and include the transaction in a block without broadcast. Set an appropriatly high fee depending on the deal. There is trust required here that the miner does not act malicious (possibly via a 3rd party), however the miner name is included in the SHA256 hased message in this forum. I will notify the miner that I will reveal the message for everyone to verify via the hash in case the miner does not stick to the agreement. This is not a safeguard to revert the transaction or anything, but hopefully will prevent the miner from acting malicious in order to preserve reputation.
3. Send the transaction details to the miner.
4. Hope for the best. If everything goes well, no need to reveal the message. The name of the miner is known then anyway.
Makes sense?