> You need to look into timing analysis and BGP vulnerabilities in the Tor protocol

While looking at that, also look at how those vulnerabilities apply to monero's Dandelion protocol: https://arxiv.org/abs/2201.11860

Key quote: "our analysis of Dandelion and Dandelion++ indicates that they do not offer high anonymity either…an adversary that controls 20% of the nodes…[can] intercept [enough] transactions [to where] the median entropy is about five bits…equivalent to 32 possible originators per transaction."

Reply to this note

Please Login to reply.

Discussion

You can stack dandelion++ with Tor or i2p. Plus Monero has both on chain AND network level privacy. If dandelion++ is broken all that is proven is that your IP did A transaction. Not what the transaction consisted of since reciever and amounts are still blinded.

With lightning, the privacy is entirely reliant on the obfuscation of the chain of hops. If origin and desination are linked the whole transaction is revealed and linked to you.