On the Security of the Dandelion Protocol