Analysis of monero transactions by chainalysis.

https://m.primal.net/LQvP.mp4

nostr:note108nesrxsqmwdle774spfwsk0y4w3qf9wnxj5xhml5x0n0y7rs9kqyf98s5

Reply to this note

Please Login to reply.

Discussion

Where's that Han dude?

😂

Run your own node, use Tor and you'll be fine.

No, with coinjoins it is not enough to use tor alone, because if so, they are vulnerable to tagging attacks.

Monero is basically a coinjoin, if you don't use different tor circuits for inputs and outputs you are vulnerable.

Tagging attack isn't a reliable method to deanonymize you since it requires all rings to be compromised which isn't likely.

It isn' "basically coinjoin" since coinjoins are centralized.

No, a network level attack has nothing to do with rings, another thing is that it is very expensive to perform a network level attack on Monero.

This is a great advertisement for Monero if you watch the video. From the start the Chainalysis agent is in awe of Moneros privacy.

Despite the target using a malicious public node, aside from trying to guess an IP address, they can't really gather much from it. He throws caveats through the whole video: "might be the user" "no strong indications" "I don't feel confident" "we have to keep in mind that's just one possibility...we do not know with any certainty..." "not many bread crumbs to follow"

And they still have zero knowledge of the amount of Monero sent or who it was sent to.

"If you are a privacy advocate it really is objectively better than Bitcoin