This all sounds nice but fall apart with one malicious sender.
Login to reply
Replies (2)
do you want to back that up with an actual argument?
Decoy-analysis heuristucs uses basic statistical heuristics to strip away unlikely decoys in a ring and isolate the real spend, an approach that does not break cryptography but is trivial for a state-level adversary with ample data and resources to execute at scale.