Questions tagged [attack]

Reference to any attack, real or hypothetical of the Monero network, services or users

26 questions
22
votes
2 answers

What privacy issues did Monero have and still has?

Has there been any scientific research regarding the promised privacy and security of Monero? Have there been attacks on the Monero network in the past? If so, what has been done to combat those? Are there currently any risks for my privacy when…
James Cameron
  • 733
  • 4
  • 14
15
votes
2 answers

How can individuals safeguard themselves and the community against a key reusing fork?

Regardless of the true intention behind the MoneroV developers, it forking off the existing Monero blockchain poses danger to the privacy of Monero users. While the MoneroV forking date has been put off, it may (un)surprisingly occur punctually next…
Link Ng
  • 343
  • 2
  • 9
15
votes
2 answers

What is MoneroV, and how is it different than Monero?

I have heard of an upcoming airdrop called MoneroV. Can someone explain the relationship between Monero and MoneroV, and explain their differences?
sgp
  • 8,836
  • 7
  • 43
  • 113
8
votes
1 answer

How can Monero defend against a "majority of view keys" attack?

My question is a follow-up on a recent thread on Reddit: In this talk! a question was asked how many of view keys are needed to see through the whole blockchain and deanonymize all the transaction. Riccardo Spagni answered around 80%, which is…
dpzz
  • 4,539
  • 4
  • 22
  • 46
8
votes
1 answer

Is transaction malleability an issue with Monero?

Is transaction malleability an issue with Monero, like it is in Bitcoin? If so, is there an identified possibility to solve it? If it isn't an issue, what makes the difference?
6
votes
1 answer

Monero wallet packet sniffing

I've been comparing the weaknesses of Monero and Bitcoin. Following from this about bitcoin packet sniffing. I'm just wondering what an attacker can do if he's on my LAN and can sniff packets on the network. As for the case for Bitcoin, an attacker…
user153882
  • 163
  • 3
6
votes
1 answer

Is it possible to trace an output in the Monero blockchain?

In MRL-0004, it's said: Bob wishes to send 0.75 XMR to Alice, and will pay 0.01 XMR in fees. The Monero that Alice receives, 0.75 XMR, will be delivered as two new unspent transaction outputs with amounts 0.7 XMR and 0.05 XMR. Further, an…
6
votes
1 answer

Replay attacks and address differentiation after a hard fork?

Just in case there will be some time a XMR Classic fork ... Are there any technical solutions in the protocol to prevent replay-attacks after a hard fork? Is there any possibility to distinguish whether a receiver’s address is on an old chain or the…
Marusha
  • 333
  • 1
  • 8
5
votes
1 answer

What are the threats against I2P?

Threat modeling is a process by which potential threats can be identified, enumerated, and prioritized What are the considered attacks in I2P's threat model ?
Moroccan Engineer
  • 2,968
  • 2
  • 12
  • 34
4
votes
1 answer

How hard is it to find the originating IP of a monero transaction (pre Kovri)?

I can only theorize about how you would attempt to trace someone's IP. I want to know the opinions of people more knowledgable about the subject.
gdoober
  • 685
  • 4
  • 14
4
votes
1 answer

Does Monero protect against timing analysis?

Does Monero protect against timing analysis? As I understand it, Monero mixes the transactions so that you cannot definitively determine UserA sent money to UserB. Not 100%, but because the outputs are being mixed with UserS, UserQ, UserL, it would…
4
votes
0 answers

With RingCT, could an adversary get into a bunch of ring signatures to decrease privacy?

Let's say I want to deanonymize Monero. What if I create a ton of RingCT outputs, such that, say, +99% of them are mine. Since amounts don't matter with RingCT, it can be very small amounts (like one atomic unit each). Now if in a ring signature, 4…
Christopher King
  • 3,120
  • 14
  • 65
2
votes
1 answer

What is an airdrop attack?

I just came across this thread on Twitter discussing Zcash and Monero usage in Dark-Net Markets. This quote bothers me: too much risk that an "airdrop attack" deanonymizes a chain like Monero @lightcoin 4:59 AM - 13 May 2018 What is an airdrop…
q9f
  • 685
  • 3
  • 10
  • 26
2
votes
2 answers

Does the daemon that mines a block see the transactions in clear text?

I was thinking about a theoretical attack vulnerability. Suppose that if the daemon that mines the block is able to see transactions in clear text, then it would be able to log this information in a side-database? Is this possible?
dpzz
  • 4,539
  • 4
  • 22
  • 46
2
votes
1 answer

If enough sub-addresses under a single seed are known, can that seed be reverse-engineered?

I'm gonna be accepting XMR as payment for my business. Customers purchase a single item for each transaction, so for convenience on my end I'm planning to have each product paid for through one unique sub-address per product with all sub-addresses…
1
2