Skip Navigation
Incident report: Denial-of-Service (Feather Wallet)
  • Thank you for answering my questions. Having much more knowledge in this area, what is your gut feeling about it being not random spam DDoS, but a way to get some type of sensitive data, that can make identifying users easier? Happy to receive a PM and won't share.

  • Incident report: Denial-of-Service (Feather Wallet)
  • I just noticed your username. Thank you for the project, Feather is amazing. I have a question though. I know Ruckinum ran an analysis and thinks this is not a black marble flood, but I can't help but think it's a way go somehow break the anonymity of monero, whether just sent amounts, or received amounts, which would still give a wealth of information.

    I don't believe this is a random (D)DoS/spam. This is a deanon attack. I know it in my gut. I don't know enough about the internals of monero but I think you might.

    Specifically...

    The bug was triggered when the number of RingCT outputs on the blockchain exceeded 100 million

    For instance, this transaction was constructed using a manipulated output distribution. Can you determine what the true spend is? Notice that all ring members are older than 1y 200d except for one 6-day-old output. Unless the user checks the ring on a block explorer and knows what to look out for, they would not notice that their transactions are being fingerprinted.

    My understanding is that the 16 (or 15+real?) rings are all real, prior transactions. Are the transactions reused? If not, then they exhaust the supply of rings and now have great statistical advantage going forward. If they are reused, then they can tell the real spend by discarding any spend that's been used more than once. Is that correct?

    I can't help but believe this is part of something larger, along with all the previous attacks in the last 2 years and now Samourai, Liquid pulling out of US, attacks on tor, RISAA and mandatory KYC on US cloud providers and domain registrars...

    On that note, we've known LE has tools for years now (Chainalysis and 1-2 others) that can in some circumstances give a lead on who a target is, likely via statistical analysis. The tools are only available to law enforcement so the methods aren't known. My thoughts are, in no particular order:

    1. They run or have compromised a lot of 'activist' nodes and xpubs are sent to the nodes in light wallets, unsure if this is how it works, or if that was unique to Samourai's whirlpool design. If this was the case, light wallets use currently online available servers, so chances are a user connects their wallet to tens of servers. Users who run their own nodes would be unaffected but I think the majority of monero users use light nodes.

    2. They have tools that monitor public ledger chains, and watch the amounts in/out. You use an exchange service to trade $500 of BTC to XMR, the amounts (fees included) are correlated over time, leading to known persons selling via KYC services. Probably least likely option but unsure how XMR works in depth.

    3. They run and/or work with (gag order) no-KYC major services that would have that information, as well as other more 'centralized' helpful no-KYC exchange services that know exactly what amount and address the funds are going to and where they came from.

  • Incident report: Denial-of-Service (Feather Wallet)
  • I just noticed your username. Thank you for the project, Feather is amazing. I have a question though. I know Ruckinum ran an analysis and thinks this is not a black marble flood, but I can't help but think it's a way go somehow break the anonymity of monero, whether just sent amounts, or received amounts, which would still give a wealth of information.

    I don't believe this is a random (D)DoS/spam. This is a deanon attack. I know it in my gut. I don't know enough about the internals of monero but I think you might.

    Specifically...

    The bug was triggered when the number of RingCT outputs on the blockchain exceeded 100 million

    For instance, this transaction was constructed using a manipulated output distribution. Can you determine what the true spend is? Notice that all ring members are older than 1y 200d except for one 6-day-old output. Unless the user checks the ring on a block explorer and knows what to look out for, they would not notice that their transactions are being fingerprinted.

    My understanding is that the 16 (or 15+real?) rings are all real, prior transactions. Are the transactions reused? If not, then they exhaust the supply of rings and now have great statistical advantage going forward. If they are reused, then they can tell the real spend by discarding any spend that's been used more than once. Is that correct?

    I can't help but believe this is part of something larger, along with all the previous attacks in the last 2 years and now Samourai, Liquid pulling out of US, attacks on tor, RISAA and mandatory KYC on US cloud providers and domain registrars...

    On that note, we've known LE has tools for years now (Chainalysis and 1-2 others) that can in some circumstances give a lead on who a target is, likely via statistical analysis. The tools are only available to law enforcement so the methods aren't known. My thoughts are, in no particular order:

    1. They run or have compromised a lot of 'activist' nodes and xpubs are sent to the nodes in light wallets, unsure if this is how it works, or if that was unique to Samourai's whirlpool design. If this was the case, light wallets use currently online available servers, so chances are a user connects their wallet to tens of servers. Users who run their own nodes would be unaffected but I think the majority of monero users use light nodes.

    2. They have tools that monitor public ledger chains, and watch the amounts in/out. You use an exchange service to trade $500 of BTC to XMR, the amounts (fees included) are correlated over time, leading to known persons selling via KYC services. Probably least likely option but unsure how XMR works in depth.

    3. They run and/or work with (gag order) no-KYC major services that would have that information, as well as other more 'centralized' helpful no-KYC exchange services that know exactly what amount and address the funds are going to and where they came from.

  • Incident report: Denial-of-Service (Feather Wallet)
  • Note that someone should pass to the feather dev(team?)

    In version 2.6.7 you can send the same coin without waiting for the 10 block confirmation. I have a feeling that's going to cause some true spend detections.

  • Large loans in monero
  • When gold was used as currency, it would be shaved off using a scale to confirm the weight (gold is a very soft metal, easily 'sliced' off the coin/bar. Shopkeepers had their own scales but wary customers could carry gold pocket scales to confirm the weight.

    Just like you can spend fractions of a cryptocoin, you can spend fractions of a precious metal coin.

  • Large loans in monero
  • XMR PRICE
    
    (2/4/24) $165
    
    (4/13/24) $115
    

    That's a 30% decrease in about 2 months. As an aside, 30% is the APR for most high-interest loans.

    The idea is there, but something like DAI would be better to look at, although it remains to be seen how long crypto will be used and accessible (especially once CBDC rolls out and legislators getting even more heavy-handed with non-CBDC coins.)

  • New XMR ID signup // Free stagenet alias!
  • FTA:

    The key thing to note is that no observer can link two addresses together. However, it is possible for the sender to link payments together if the receiver re-uses addresses.

    For example, if you withdraw from ExchangeA using AddressA, and then go on to issue another withdrawal from ExchangeA using AddressA, the exchange will easily be able to link these two withdrawals together by simply comparing the withdrawal addresses (even if you used different accounts). Furthermore, if ExchangeA is cooperating with ExchangeB, it would be possible for both exchanges to link address-reusing withdrawals together.

    Additionally, even if the sender is not cooperating with other entities in order to link transactions together, it is still possible for the sender to unwittingly link transactions together if their software is poorly implemented and erroneously re-uses the same random data for multiple transactions. Basically, the receiver is relying on the sender to generate good random data in order to generate a one-time key. If the sender fails to use good random data, then the "one-time" key isn't "one-time", and transactions can possibly be linked.

    So, for maximum protection against linkability, it's a good idea to generate a new addresses for transactions that you don't want linked.

    Further reading: https://localmonero.co/knowledge/monero-subaddresses?language=en

    I think this can easily be achieved by generating a new subaddress for every request. ( I don't know how OpenAlias works, maybe it already does this.)

  • Can one use a pre-paid debit card with privacy.com?
  • You can't with privacy.com or other big services, but there are other services that let you either generate a no-KYC reloadable credit card, or buy a prepaid international card that works for almost everything.

  • New XMR ID signup // Free stagenet alias!
  • Question. Does this somehow generate a new subaddress for every request? I ask because address reuse is dangerous for the privacy of monero. While most people don't know this, I assume you do.

  • Dad has the chops to be a project manager.
  • Chances are this is a kid or NEET and all his friend wants is a super simple website with basic info for his local business. Dad is either doing him a favor, or giving him some pocket change so he'll stop bothering him for money for a month. This is what happens when you don't teach your children to be adults, and give them everything instead. Seen it too many times.

  • Dad has the chops to be a project manager.
  • Based on this interaction alone and his dad deciding the price for him, I'm going to make the wildly assumptious assumption this is a 20s/30s(/40s?) unemploymed guy living at his dad's house rent free.

    If my assumptions are incorrect, sorry mate, you did not win the dad lottery.

  • I think an intern helps them tie their shoes too
  • Some of them, sure. Usually old people that ran out of neuroplasticity 40 years ago. But there are a lot more that function well enough and IT guys (specifically the guys, IT gals usually either have a better idea or hide it better) have a tendency to think of them as useless, where if they had to do their job for a day they'd be as lost as an old guy spooked by the window location change.

  • 3 days 🤯
  • Yeah but he's just a temporarily inconvenienced billionaire, the rest of these welfare queens are out here collecting rent and sitting around all day. They don't need the money like he does. As soon as he gets a job, he'll hustle that first billion in no time.

  • 3 days 🤯
  • His YouTube shorts (500/day goal) is videos of Elon musk saying things, with the background music alternating between the sigma male tune and the movie clip tune.

    Did you see how ELON MUSK OWNED💯 DON LEMON by getting flustered at the question of "half your advertisers have left the platform, if X fails, isn't that on you?" so he told Don he should choose his words carefully because the interview clock only had 5 minutes left? And then Don was OWNED because he rephrased the question?

    LMAO. SUCK IT CNN. OWNED!

  • Mystery smell reported across regions of Russia and Finland
  • The ones I'm thinking of grow on the rot inside birch trees and are hard, not slimy, and very slow growing so You're only supposed to sustainably take every 3rd one you come across. And if they're on a different tree, not birch, that's when the issues arise with toxicity. I am picturing it right now I just can't think of the name.

  • I think an intern helps them tie their shoes too
  • So many people in IT don't understand this. I'm glad I did a lot of customer service while programming was still just a hobby.

    Developing the product or supporting the product dev team in some way (tech support, project managers, etc) is great, but if the company doesn't have people to schmooze other people to give them money, your product doesn't have much financial value.

  • politics @lemmy.world Synnr @sopuli.xyz
    Cracked - How Half Of America Lost Its F**king Mind
    www.cracked.com How Half Of America Lost Its F**king Mind

    I'm going to explain the Donald Trump phenomenon in three movies. And then some text.

    94
    InitialsDiceBearhttps://github.com/dicebear/dicebearhttps://creativecommons.org/publicdomain/zero/1.0/„Initials” (https://github.com/dicebear/dicebear) by „DiceBear”, licensed under „CC0 1.0” (https://creativecommons.org/publicdomain/zero/1.0/)SY
    Synnr @sopuli.xyz
    Posts 1
    Comments 257