-
Notifications
You must be signed in to change notification settings - Fork 66
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
linkability (open-research-problems): improve and mention practical results #264
base: master
Are you sure you want to change the base?
Changes from 1 commit
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -126,13 +126,13 @@ The goal is this research problem is to investigate and develop an asynchronous, | |
|
||
Mimblewimble/Grin leverage [confidential transactions](https://en.bitcoin.it/wiki/Confidential_transactions) to hide the identity of the sender and recipients. As such, there are no public amounts or addresses. | ||
|
||
However, it is possible for someone listening on the network to build a transaction graph and possibly clustering entities together. | ||
However, it is possible for someone listening on the network to build a transaction graph and possibly cluster entities together. Ivan Bogatyy has shown this attack works in practice, being able to [link 96% of Grin transactions](https://github.com/bogatyy/grin-linkability) broadcasted during the run of his experiment. | ||
|
||
Techniques like [Dandelion++](https://arxiv.org/abs/1805.11060) mitigate this issue but are insufficient for a privacy coin. | ||
The [Dandelion++](https://arxiv.org/abs/1805.11060) inspired transaction propagation technique implemented in Grin was insufficient to mitigate the attack. It successfully hides IP addresses but cannot aggregate enough transaction to obscure the transaction graph. This is insufficient for a privacy coin. | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Dandelion++ is mostly used for obfuscating the source of the transaction. We happen to also aggregate transactions during the stem phase, but I don't think this was intended to sufficiently mitigate collecting the information. It was always well understood that's not sufficient for blind aggregation. |
||
|
||
A much more promising design is this Mimblewimble [CoinSwap proposal](https://forum.grin.mw/t/mimblewimble-coinswap-proposal) | ||
A much more promising design is the [Mimblewimble CoinSwap proposal](https://forum.grin.mw/t/mimblewimble-coinswap-proposal). | ||
|
||
The goal of this research is to investigate ways to obfuscate the Grin transaction and implement such design. | ||
The goal of this research is to investigate ways to obfuscate the Grin transaction graph and implement such design. | ||
|
||
### Relevant Papers | ||
|
||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think this was unfairly labeled as an "attack" in Bogaty's article. This is just a well known way of gathering information that's already public.