The Core Issue: Cluster Mempool, Problems Are Easier In Chunks
Cluster Mempool reorganizes mempool transaction sorting to align miner incentives, simplify architecture, and improve security for second layer protocols.
Applied MEV protection via Shutter's threshold encryption
Public mempools enable MEV frontrunning and significant losses; threshold encryption like Shutter conceals transactions until ordering, reducing extractable value.