This (FUD) paper is not about deanonymizing XMR transactions. Monero's privacy features are strong and stable. It is more about getting the real IP of the sender with a probability of 0.77, if an attacker injects 179 Tor hidden service nodes into the Monero P2P network (oage 3).

Reply to this note

Please Login to reply.

Discussion

I don't understand how this is related to Monero at all.

How can a tor hidden service's IP be anonimized if it can only be connected through 6 hops? Unless they sybil the tor network...

If several of those hops are attackers, they can coordinate timing.

But then it's a sybil attack on the Tor network, not on monero... Right?