FloodXMR: #Monero spamming

This paper shows how an attacker can take advantage of Monero’s Bulletproof protocol, which reduces transaction fees, to flood the network with his own transactions and, consequently, remove mixins from transaction inputs to break #privacy

https://eprint.iacr.org/2019/455.pdf

Reply to this note

Please Login to reply.

Discussion

kudos to the red team, blue team got some work to do.

Doesn't this kill #monero? Already having this conversation in other note, but for some reason I cannot link here.

Old paper and fairly sure this vulnerability was already patched, but correct me if I'm wrong LiberLion

Doesn't affect hidden amounts or addresses either.

So this is what they would theoretically know:

Alice sent ? to ?

And it is also harder than you might think to sustain this kind of attack. ArticMine goes over the details in recent Monero Talk:

https://www.youtube.com/live/UeUGiSreegs?si=hIxFstNyY4_7vTwi&t=5753

Start 1:36:00