210 похожих чатов

This video is from chainalysis which say they can track

xmr
If they has done for tracking xmr what about arrr ?

10 ответов

12 просмотров

Chainanalysis only track Monero but havent done on Z shielded addresses yet

#?- Автор вопроса
Kaks (I WONT DM YOU FIRST)
Chainanalysis only track Monero but havent done on...

What is the special method they use to doing this operation suceful ?

#?
What is the special method they use to doing this ...

tl;dr: metadata from fake proxy nodes. Here's some commentary: https://decrypt.co/248728/monero-expert-fact-checks-chainalysis-video-claiming-xmr-transactions-can-be-traced

Len Sessions
tl;dr: metadata from fake proxy nodes. Here's som...

I think the point is that obfuscation is not enough and that opsec is definitely required when using it

#?- Автор вопроса
Len Sessions
tl;dr: metadata from fake proxy nodes. Here's som...

That's what I was thinking about when I found this video

#?
What is the special method they use to doing this ...

As i understood from the video i watched a several days ago, they go for IP adresses and for transaction fees to see a pattern. So theoretically, if you constantly change proxy and go via Tor or i2p and use a different priority (transaction fees) in your transactions, they will not be able to identify any pattern. Since pattern of behavior is THE thing they go for to identify people. If ring size gets expanded to 100 or more, they should be totally fucked with this method. At least if you transact a several times without any recognizable pattern.

#?- Автор вопроса
Sven
As i understood from the video i watched a several...

As i say i think they use malicious node, And they buy info from other which run node and has a large user

#?
As i say i think they use malicious node, And they...

Yes, seems so. This is also the reason i think TOR should be re-structured to every user being his own entry and also an exitpoint for others and not only those that happen to take the job on their own. I2P does do exactly this.

#?- Автор вопроса
Sven
Yes, seems so. This is also the reason i think TOR...

Yeah i agre 100% with this I dont know why tor dev not make this changes 🤷‍♂️🤦‍♂️

#?
Yeah i agre 100% with this I dont know why tor dev...

Change what? TOR is completely different from I2P, me personally i use I2P it does take small bandwidth but its more secure

Похожие вопросы

Обсуждают сегодня

@Benzenoid can you tell me the easiest, and safest way to bu.y HEX now?
Živa Žena
20
This is a question from my wife who make a fortune with memes 😂😂 About the Migration and Tokens: 1. How will the old tokens be migrated to the new $LGCYX network? What is th...
🍿 °anton°
2
What is the Dex situation? Agora team started with the Pnetwork for their dex which helped them both with integration. It’s completed but as you can see from the Pnetwork ann...
Ben
1
Anyone knows where there are some instructions or discort about failed bridge transactions ?
Jochem
21
@lozuk how do I get my phex copies of my ehex from a atomic wallet, to move to my rabby?
Justfrontin 👀
11
Hello, Is iExec also part of the "inception program" or another one ? Would it be a name to qualified the nature of the relationship between iExec and Nvidia? And does Secret ...
Ñïķøłäś
8
Ready for some fun AND a chance to win TKO Tokens? Join us for exciting minigames in our Telegram group! 🕒 Don’t miss out—games start on today 25 October 2024, at 8 PM! Ge...
Milkyway | Tokocrypto
255
any reference of this implementation?
BitBuddha
29
Also, why can’t the community have a vote/ say when it comes to initiatives like buybacks. Isn’t the point of crypto decentralisation? Don’t we deserve input as long term supp...
👨🏽‍🦰
13
Hi guys, any problem with Pulsebrige? Trying to transfer from wETH to ETH. First it tells me to connect my metamask "through mobile app" not desktop. Then I did and confirmed ...
Snowflakecrypto
13
Карта сайта