210 похожих чатов

Question: Suppose I work for a crypto forensics firm. I want to

track walletA.

Tracking through SideShift
Wallet A sends $50k in USDT to sideshift, who changes it into ZEC and send a t2t to walletB.
When I see the $50k moving to Sideshift, I use a my SuperTool to scans all the known sideshift ouputs.
30 seconds after the t2t I see $50k of ZEC moving from SideShift to walletB.
I conclude that it is the same user.

Tracking from Zashi to CryptoPoker
30 minutes later I see a z2t being sent to a CryptoPoker wallet for $10k.
This is the only zt2 they have had for more than $1000 all week.

The next day CryptoPoker gets involved in a lawsuit and they are forced to dox all the transactions in the last week.
Jon Jones had a $10k deposit that day.
Now I can connect walletA to Jon Jones.

I could create more of these examples, but here's the point I'm making:
Even though a z2t doesn't explicitly identify the sender, a large chunk of ZEC moving around at a specific time of day, accompanied by other publicly viewable chunks of ZEC moving around, could imply a lot of information about where the wallet is coming from.
So while the user believes they are using best practices, these are still not enough to maintain privacy.

Does anyone have any thoughts on these higher level OpSec mechanics?

1 ответов

32 просмотра

Do not make z and t the same value when trading.

Похожие вопросы

Карта сайта