Li₿ΞʁLiøη 🏴a³ on Nostr: FloodXMR: #Monero spamming This paper shows how an attacker can take advantage of ...
FloodXMR: #Monero spamming
This paper shows how an attacker can take advantage of Monero’s Bulletproof protocol, which reduces transaction fees, to flood the network with his own transactions and, consequently, remove mixins from transaction inputs to break #privacy
https://eprint.iacr.org/2019/455.pdfPublished at
2024-03-11 19:53:44Event JSON
{
"id": "3c95aeb0a9456d248da200b59abb2a08651f0afb0de3051eb8e52c73114b0912",
"pubkey": "70441609369d77ea553d805ee9af58b29e4c39d5b08b3956741839c2f3feebcc",
"created_at": 1710186824,
"kind": 1,
"tags": [
[
"t",
"Monero"
],
[
"t",
"monero"
],
[
"t",
"privacy"
],
[
"t",
"privacy"
],
[
"r",
"https://eprint.iacr.org/2019/455.pdf"
]
],
"content": "FloodXMR: #Monero spamming\n\nThis paper shows how an attacker can take advantage of Monero’s Bulletproof protocol, which reduces transaction fees, to flood the network with his own transactions and, consequently, remove mixins from transaction inputs to break #privacy\nhttps://eprint.iacr.org/2019/455.pdf",
"sig": "1106dc6bcb8f3c683c0122a786dcaeb60ffa1c4696f4846b73e4455c015553c8d3c5f7f7fca51ced607a5fd1ed535ae20239e376eb76a2688d43d5ead45dbacd"
}