Hacker News new | past | comments | ask | show | jobs | submit login

How does this work?



The video was posted elsewhere I think. Basically, if you view enough of the residual ring inputs you can link them together. This is not quite practical yet but assuming wide adoption of XMR chain stores, etc, would be able to do this attack.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: