Schmidt on Nostr: “Assuming an attack timeframe of 12 months, our findings show that an attacker can ...
“Assuming an attack timeframe of 12 months, our findings show that an attacker can trace up to 47.63% of the transaction inputs at a cost of just 1,746.53 USD. Moreover, we show also that more than 90% of the inputs are affected by our tracing algorithm.”
FloodXMR: Low-cost transaction flooding attack with Monero’s bulletproof protocol
https://eprint.iacr.org/2019/455.pdfPublished at
2024-03-12 07:57:11Event JSON
{
"id": "5161b8e709e997a503d50fca7b48ee362ff859703bd41177b87b638786d57574",
"pubkey": "0d7ceca9e000e711e263bc14a2216ab74968a9e903eba214a714300adede5a20",
"created_at": 1710230231,
"kind": 1,
"tags": [],
"content": "“Assuming an attack timeframe of 12 months, our findings show that an attacker can trace up to 47.63% of the transaction inputs at a cost of just 1,746.53 USD. Moreover, we show also that more than 90% of the inputs are affected by our tracing algorithm.”\n\nFloodXMR: Low-cost transaction flooding attack with Monero’s bulletproof protocol\n\nhttps://eprint.iacr.org/2019/455.pdf",
"sig": "283d68725f145262a244b8e43c00cc32fbca604e4a05140517b16b3931a6739c0868ade92179e7262cebd0104165f8ef4c1e1c6f964d5c5b05ee71b998c4b0ec"
}