Hacker News new | past | comments | ask | show | jobs | submit login

Yes, in the Chainalysis video they say clearly that Dandelion++ is very effective so they have no confidence in IP addresses collected in those cases. You need to be foolish enough to directly connect to a malicious node while using your home IP, which obviously will leak the IP. I think a lot of people are just confused by the video because they go through examples that seem very 'constructed' and unrealistic. I mean, this is all very well known information to monero users and I can't believe anyone would be doing important transactions without using their own node and/or I2P/Tor etc



> I mean, this is all very well known information to monero users and I can't believe anyone would be doing important transactions without using their own node and/or I2P/Tor etc

And I wonder what an estimate is of % of transactions (by volume and value) that are sent from a full node vs public remote node and public web vs tor/i2p.

Obviously won’t be able to get an accurate answer, but one of the remote nodes in that pool might be able to provide some absolute numbers and a rough estimate of their share of connections in that pool.

Should be easy for them to differentiate clearnet vs tor exit node (and dunno how detectable i2p is).

Even the geo-dns mentioned in the article would be interesting data to see geo-source of transactions.




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: