Event JSON
{
"id": "592f9edf21d4b88fdf72d7434f3586fe6a13d6bf12beecc35f37886b239ce728",
"pubkey": "70441609369d77ea553d805ee9af58b29e4c39d5b08b3956741839c2f3feebcc",
"created_at": 1749490260,
"kind": 1,
"tags": [
[
"e",
"0f4188831cbea8ebb275af7b5b2fdd85d2534ad632d70f735ee9a26567b5a905",
"",
"root"
],
[
"e",
"12ebc297338aa0c62f90bbb62f94617f93cdbbbfb15edb3d83f2d4bc3edb1387"
],
[
"e",
"89ebe1c51d7d253d170681984a9854971e1391d3cf3cb41c2e28acf446b22e5a",
"",
"reply"
],
[
"p",
"0326b57e042e0892839adc73784689d485bffd285a1dccfe9c5adada479a1d4c"
],
[
"p",
"b133bfc57bed61c391d4e8f953b906c7f1709c438d91c75fb6daf79449d5789d"
],
[
"r",
"https://www.getmonero.org/2025/04/05/ospead-optimal-ring-signature-research.html?utm_source=chatgpt.com"
]
],
"content": "OSPEAD (Optimal Ring Signature Research) is a recent study (April 2025) that measures anonymity efficiency and detected a risk: the attacker could guess the anonymous signature in 1 out of 4.2 cases instead of 1/16.\n\nBut beware: this is only a theoretical finding. So far, an \"ospead fix\" has not been implemented, because it would involve a hard fork, and the intention is to resolve it in a more comprehensive way with FCMP++.\n\nSo:\n\nOSPEAD illustrates a real vulnerability in the selection of decoys, but there is still no technical solution in production.\n\nThe definitive solution will be part of FCMP++, which will robustly solve the modeling and privacy issues (and will arrive when the code is fully audited and tested).\n\nhttps://www.getmonero.org/2025/04/05/ospead-optimal-ring-signature-research.html?utm_source=chatgpt.com",
"sig": "96ddfb814cf730f4d1923c34872fa60612e6b4c14e1138cd46d16fe8ab9a106422255af0c87287b147bf8beb83037a361a284f86fff14c7bebd2967ab7a7e63e"
}