Super Testnet's avatar
Super Testnet 7 months ago
by "unencrypted" I mean this: (1) all 16 members of the ring signature are provided in plaintext -- everyone can see them (2) the "real" sender is definitely one of them -- only 15 ring members are decoys, you can't make them "all" decoys because, as part of monero's design, you must put the real sender's pubkey in the ring signature by "crackable" I mean this: chain analysts can use data from their own wallets and those of their partners to eliminate some of the decoys in the ring signature -- e.g. if one of the decoy pubkeys belongs to them, and they know they didn't sign the transaction, they can remove that decoy, thus narrowing down the list of possible senders. Often, they can narrow it down to just one person, thus "cracking" monero's ring signature privacy and identifying the real sender. Here is a video where they do this multiple times, starting at minute 26:55

Replies (3)

1. I clarified the main question already: what are you asking the devs to encrypt here that they haven't already? In other words, what's the problem? 2. Everyone knows modern computer networks are "crackable," encrypted or otherwise, but you threw the word "crackable" in there. I was noting how weird that was and how you put it next to the word "unencrypted" like there was supposed to be some connection
1. I clarified the main question already: what are you asking the devs to encrypt here that they haven't already? In other words, what's the problem? 2. Everyone knows modern computer networks are "crackable," encrypted or otherwise, but you threw the word "crackable" in there. I was noting how weird that was and how you put it next to the word "unencrypted" like there was supposed to be some connection
Super Testnet's avatar
Super Testnet 7 months ago
> in what way is it "crackable"? I answer in this post: > How about I'll pick a transom and you'll "crack" the true spend? Sure, I'll do my best! I wrote a free and open source tool for this -- you can paste any monero tx and it will try to identify the true spend: It doesn't usually find it but sometimes it does. Give me a tx and I'll try it! Then you do my challenge, OK? The one where you pay a lightning invoice of my choice and tell me (1) the recipient's pubkey (2) the total balance held by that pubkey -- i.e. the same info I can get by paying a monero address For future reference, here is the invoice I'd like you to pay after I've completed your challenge: lightning:lnbc10079970p1p5rhqjdpp5wmje0gndr5cmnxwzala7jmuc3jylc33ef4kyhurgx5fdjks3rkwshp5he4v6k88ag5vmms9j7z43lc4u8apl0qd8ftdx2zqzdmtx596x60scqzdyxqrrxssp55gdlkuh6zp2mxx8sqwcz4372y7vhc757pn6rzf0y779e2k8c2yfs9qxpqysgqzl2v27xj5jzm8x45wt6kzkcnxnakmac5xy0c40y79jw6v2s43vqqcv9jralfaz7dl6nxkp0r8qxm7rwppydrfm2spmtu3f24thk5nycq9a9upl
Super Testnet's avatar Super Testnet
by "unencrypted" I mean this: (1) all 16 members of the ring signature are provided in plaintext -- everyone can see them (2) the "real" sender is definitely one of them -- only 15 ring members are decoys, you can't make them "all" decoys because, as part of monero's design, you must put the real sender's pubkey in the ring signature by "crackable" I mean this: chain analysts can use data from their own wallets and those of their partners to eliminate some of the decoys in the ring signature -- e.g. if one of the decoy pubkeys belongs to them, and they know they didn't sign the transaction, they can remove that decoy, thus narrowing down the list of possible senders. Often, they can narrow it down to just one person, thus "cracking" monero's ring signature privacy and identifying the real sender. Here is a video where they do this multiple times, starting at minute 26:55
View quoted note →
โ†‘