I am familiar with the Mara Slipstream recommendation but after I contacted them and asked how they will handle a transaction with similar vulnerability, they were totally evasive, telling me that it is indeed likely that their pool participants could still snipe it and this puzzle has come to their knowledge
Why you contact them?
If someday I ever found a key. 100% I am going to use the mara service without doubt, Obviously I am going to document it well, like publish the sha256 hash here on bitcoin talk and maybe some other tech stuff.
Members of a mining pool don't see all the RAW transactions, they only see Block header of 80 bytes, it is faster than update 1MB every second
How can this really work pls??
"this" what? Please be more clear with your question.