Totally agree. The threat model will determine the right coinjoin implementation/approach, but fake coinjoins are almost pointless.
Which is the correct coinjoin approach in your opinion?
Please Login to reply.
No replies yet.