[ 3 / biz / cgl / ck / diy / fa / ic / jp / lit / sci / vr / vt ] [ index / top / reports ] [ become a patron ] [ status ]
2023-11: Warosu is now out of extended maintenance.

/biz/ - Business & Finance

Search:


View post   

>> No.50559826 [View]
File: 366 KB, 2000x1656, 20220429_195403.jpg [View same] [iqdb] [saucenao] [google]
50559826

>>50559494
>>50559512
First of all the privacy models of MW and Monero are fundamentally different and even the article below explains further, thought it has outdated ring sizes.
https://scribe.rip/dragonfly-research/breaking-mimblewimble-privacy-model-84bcd67bfe52

For Mimblewimble, from said article:
>Using only $60/week of AWS spend, I was able to uncover the exact addresses of senders and recipients for 96% Grin transactions in real time.
>The problem is inherent to Mimblewimble, and I don’t believe there’s a way to fix it.

Now, with Monero growing both in transactions and ring sizes, dust attacks are less and less possible. Even with fake decoys you would need to control at least 65% of recent UTXOs just to start seeing any effects, and that is quite frankly fiction at this point. The guys are over at the MRL have already looked into it several times over the years, seriously feel free to ask them. Dust attacks *were* a problem just in the early days of Monero but even then I haven't heard anyone actually went through with it.

You're literally comparing apples with oranges.

Navigation
View posts[+24][+48][+96]