Replying to Avatar Cyph3rp9nk

Analysis of monero transactions by chainalysis.

https://m.primal.net/LQvP.mp4

nostr:note108nesrxsqmwdle774spfwsk0y4w3qf9wnxj5xhml5x0n0y7rs9kqyf98s5

Run your own node, use Tor and you'll be fine.

Reply to this note

Please Login to reply.

Discussion

No, with coinjoins it is not enough to use tor alone, because if so, they are vulnerable to tagging attacks.

Monero is basically a coinjoin, if you don't use different tor circuits for inputs and outputs you are vulnerable.

Tagging attack isn't a reliable method to deanonymize you since it requires all rings to be compromised which isn't likely.

It isn' "basically coinjoin" since coinjoins are centralized.

No, a network level attack has nothing to do with rings, another thing is that it is very expensive to perform a network level attack on Monero.