7
submitted 6 months ago by chillband@monero.town to c/monero@monero.town
you are viewing a single comment's thread
view the rest of the comments
[-] LodeMike@lemmy.today 5 points 6 months ago

This is literally just seeing where data comes out to correlate where it goes in?

[-] Scolding0513@sh.itjust.works 6 points 6 months ago* (last edited 6 months ago)

Yeah, This seems to depend on a TOR exploit (Onion Address Analysis Method Based on Multiple Timed Sync Response Messages), plus controlling a [not small] amount of TOR nodes and also Monero nodes both at the same time, plus sending these signals to correlate traffic. The examples it gave said like a 1000 malicious Tor nodes (which may very well be possible) and half of all TOR-using Monero nodes

I went through the paper pretty thoroughly, and definitely don't think the probability in the real world is as high as the theoretical percentages they give, but I'm not an expert.

Nevertheless, I sinerely hope the TOR and Monero teams both look at this, it could be serious. Especially for TOR.

this post was submitted on 16 May 2024
7 points (81.8% liked)

Monero

1696 readers
32 users here now

This is the lemmy community of Monero (XMR), a secure, private, untraceable currency that is open-source and freely available to all.

GitHub

StackExchange

Twitter

Wallets

Desktop (CLI, GUI)

Desktop (Feather)

Mac & Linux (Cake Wallet)

Web (MyMonero)

Android (Monerujo)

Android (MyMonero)

Android (Cake Wallet) / (Monero.com)

Android (Stack Wallet)

iOS (MyMonero)

iOS (Cake Wallet) / (Monero.com)

iOS (Stack Wallet)

iOS (Edge Wallet)

Instance tags for discoverability:

Monero, XMR, crypto, cryptocurrency

founded 1 year ago
MODERATORS