13
submitted 2 months ago* (last edited 2 months ago) by prancing389@monero.town to c/monero@monero.town

Nihilist puts out another very informative article, great work!

you are viewing a single comment's thread
view the rest of the comments
[-] Findmysec@infosec.pub 1 points 2 months ago

Nihilist, since you've watched the video can you make another post on the "heuristics" the presenter was talking about? I think the community needs to know how exactly their automated tool discards decoys from the list of transactions to consider.

[-] nihilist@monero.town 2 points 2 months ago* (last edited 2 months ago)

they discard the decoys when they're given the transactions of interest, this lets them know that this transaction they saw on their node actually comes from that subphoenable entity (centralised exchange), from there they have the list of transactions that went through and they can rule out the dandelion decoys. but otherwise they can't.

I also mentionned that they are looking at the fee structure on their malicious nodes, hence my recommendation to use the default fees. not sure if they're actually using the rest. (number of inputs and outputs ?)

[-] Findmysec@infosec.pub 1 points 2 months ago
this post was submitted on 07 Sep 2024
13 points (100.0% liked)

Monero

1667 readers
6 users here now

This is the lemmy community of Monero (XMR), a secure, private, untraceable currency that is open-source and freely available to all.

GitHub

StackExchange

Twitter

Wallets

Desktop (CLI, GUI)

Desktop (Feather)

Mac & Linux (Cake Wallet)

Web (MyMonero)

Android (Monerujo)

Android (MyMonero)

Android (Cake Wallet) / (Monero.com)

Android (Stack Wallet)

iOS (MyMonero)

iOS (Cake Wallet) / (Monero.com)

iOS (Stack Wallet)

iOS (Edge Wallet)

Instance tags for discoverability:

Monero, XMR, crypto, cryptocurrency

founded 1 year ago
MODERATORS