1
submitted 8 months ago by bot@lemmit.online to c/monero@lemmit.online
This is an automated archive made by the Lemmit Bot.

The original was posted on /r/monero by /u/lt on 2024-03-09 11:16:32.


That is, this attack is aimed at de-anonymizing future transactions by stuffing the blockchain with tx known to the attacker. Thus reduce the effectiveness of ring signatures.

Flood attack tx are already 80% of the mempool. If this is allowed to go on for an extended period of time, most members of the future ring signatures could be from attacker controlled outputs.

By now you should get what I’m talking about: we need to dilute attackers tx with our own.

However, one question remains. How do we know when the attacker has stopped so we can stop our own flood.

no comments (yet)
sorted by: hot top controversial new old
there doesn't seem to be anything here
this post was submitted on 09 Mar 2024
1 points (100.0% liked)

Monero: the secure, private, untraceable currency

44 readers
1 users here now

This is the official subreddit of Monero (XMR), a secure, private, untraceable currency that is open-source and freely available to all.

founded 1 year ago
MODERATORS