xmr
If they has done for tracking xmr what about arrr ?
Chainanalysis only track Monero but havent done on Z shielded addresses yet
What is the special method they use to doing this operation suceful ?
tl;dr: metadata from fake proxy nodes. Here's some commentary: https://decrypt.co/248728/monero-expert-fact-checks-chainalysis-video-claiming-xmr-transactions-can-be-traced
I think the point is that obfuscation is not enough and that opsec is definitely required when using it
That's what I was thinking about when I found this video
As i understood from the video i watched a several days ago, they go for IP adresses and for transaction fees to see a pattern. So theoretically, if you constantly change proxy and go via Tor or i2p and use a different priority (transaction fees) in your transactions, they will not be able to identify any pattern. Since pattern of behavior is THE thing they go for to identify people. If ring size gets expanded to 100 or more, they should be totally fucked with this method. At least if you transact a several times without any recognizable pattern.
As i say i think they use malicious node, And they buy info from other which run node and has a large user
Yes, seems so. This is also the reason i think TOR should be re-structured to every user being his own entry and also an exitpoint for others and not only those that happen to take the job on their own. I2P does do exactly this.
Yeah i agre 100% with this I dont know why tor dev not make this changes 🤷♂️🤦♂️
Change what? TOR is completely different from I2P, me personally i use I2P it does take small bandwidth but its more secure
Обсуждают сегодня