To prevent the monitoring attack, “the protocol must prevent Verifiers from revealing which task they are challenging until the final phase of the protocol.” [white paper addendum, page 42].
Verifiers no longer reveal which task they are challenging. They now submit a noisy hash of the taskID, instead of the taskID itself. At a later step in the protocol, they reveal which task they are participating in.
The detailed implementation spec can be found here.
To prevent the monitoring attack, “the protocol must prevent Verifiers from revealing which task they are challenging until the final phase of the protocol.” [white paper addendum, page 42].
Verifiers no longer reveal which task they are challenging. They now submit a noisy hash of the taskID, instead of the taskID itself. At a later step in the protocol, they reveal which task they are participating in.
The detailed implementation spec can be found here.