Announcing Flashbots Protect Fast Mode 🔥🏎

Fast mode is a way of using the Flashbots relay with a different set of tradeoffs, giving you more choice when transacting on Ethereum.
Regular bundles enjoy protection from frontrunning and reverts but can be slower than regular transactions (txns) sent through the public mempool.

"Fast mode" is a new txn type that inherits full frontrunning protection but can revert. In return, your txn is included faster.
When should you use bundles & when should you use fast mode?

Txns that frequently revert (e.g. swaps on popular pairs) or that should be at the top of the block ➡️ bundles

Txns that likely won't revert (e.g. swaps on long tail pairs) ➡️ fast mode
How do you add Flashbots Protect with fast mode?

1. Enter your MetaMask & click on your RPC endpoint at the top of your MetaMask. By default it says “Ethereum mainnet.”

2. Click “Custom RPC”
3. Add rpc.flashbots.net/fast with a chainID of 1 and currency of ETH.

4. Scroll to the bottom and click “Save”
Now your transactions are sent with fast mode 🏎️🔥
If you're excited about work like this or MEV in general we have open data, engineering, operations, and research roles!

See below for details and feel free to DM with any questions.

flashbots.notion.site/Flashbots-Job-…

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with @bertcmiller⚡️🤖🛡️

@bertcmiller⚡️🤖🛡️ Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @bertcmiller

Mar 21
1 year ago @NathanWorsley_ fired the 1st shot in a year of bot on bot attacks with Ethereum's most sophisticated actors

Millions of dollars were made and lost in what amounted to one of the most interesting subplots of crypto

Lets review last year's bot on bot attacks
First we'll begin with salmonella and how it rekt 🥪 bots. See the below if you don't know what 🥪 bots are

Against the backdrop of EIP-1559 being implemented Ethermine had announced in early March 2021 that they were creating an MEV program.

Checking the chain it was apparent they were 🥪ing users at the time

(They've since then stopped, by the way!)
Read 24 tweets
Feb 21
MEV-Explore v1 is live!

Major updates:
- Uses mev-inspect-py (previously used -rs)
- Added Uniswap v3
- Fixed a bug where some 🥪 were classified as arbs

Please note these numbers are lower bound estimates and not reflective of all MEV extracted

explore.flashbots.net Image
Huge shout out to @lvanseters, @guiiheise, and @taarushv for their work on creating a really powerful MEV analysis tool, mev-inspect-py.

Even beyond its use in Explore I'm sure mev-inspect-py will play an important role in MEV transparency and research

github.com/flashbots/mev-…
We're close to exposing the data behind Explore and output by mev-inspect-py in a format that should be easily accessible to everyone in the community 🙂

Stay tuned!
Read 6 tweets
Jan 14
Did you think that only DEX trades could be sandwiched anon?

Think again, cryptopunks can too

A thread on punk sandwiches
When punks were first made by @larvalabs the ERC721 standard wasn't around and neither was @opensea.

So punks have a custom marketplace with their own trading functions that have some nuance to them
The important functions for the story today are acceptBidForPunk() and enterBidForPunk(). Let's look at each and what is different.

First, enterBidForPunk lets a user place a bid on a specific punk.
Read 21 tweets
Jan 13
Longest arb ever? 14 hops across 10 assets for ~0.0025 ETH in profit

etherscan.io/tx/0x039a2697f… Image
Check out the ONGOING MEV in 2021 year in review if this interested you!

Hello to the group of people who just found this tweet? Where are you all coming from?
Read 4 tweets
Jan 12
One of the more weird MEV instances that I've seen: a double arb / Curve sandwich for the ETH/aETH pair (!)

tx 1: Curve <--> Uni v2 arb buying aETH on Curve, selling on Uni v2
tx 2: Victim buying aETH on Curve
tx 3: Uni v2 <--> Curve arb buying aETH on Uni v2, selling on Curve ImageImageImage
Seems like this might have been an accidental sandwich? The numbers being traded here are a little weird.
Read 4 tweets
Dec 13, 2021
A funny arb spotted in the Flashbots Discord (h/t: Riposte)

Searcher went from 0.0001 ETH to 0.46 ETH, paid 0.42 ETH to the miner... and they left $1m on the table

etherscan.io/tx/0x0f419881b…
Arb got eaten up next block: etherscan.io/tx/0xb9f890a4b…
Looking for anyone who would be willing to sell me 300 ETH for 820, uh, Penguin Party Fish.
Read 4 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(