|
|
@ -530,7 +530,7 @@ by block explorers nor well understood by the industry. |
|
|
|
|
|
|
|
A \sheilded transaction has at least one \shielded address, referred to as a \zaddr. |
|
|
|
|
|
|
|
We here concern ourselves only with \textbf{Zcash Protocol} which allows us to specify |
|
|
|
We here concern ourselves only with \textbf{Zcash Protocol} \cite{Zcash} which allows us to specify |
|
|
|
a coherent language and symbols to describe the new ITM \zaddr linkability attack and mitigations |
|
|
|
against it. All techniques here could technically also be used against transparent |
|
|
|
blockchains, but since they leak all the useful metadata already, it would serve |
|
|
@ -802,7 +802,7 @@ By design, Sietch is opt-out and by default all users use it without knowing it, |
|
|
|
Sietch makes every individual shielded transaction more complex which creates a harder-to-analyze |
|
|
|
transaction graph, helping even users which have custom software that does not use Sietch. |
|
|
|
|
|
|
|
The effect of almost all Hush users using Sietch all the time without knowing it, is a |
|
|
|
The effect of almost all Hush \cite{Hush} users using Sietch all the time without knowing it, is a |
|
|
|
"herd immunity" against de-anonymization. The price is waiting a few extra seconds |
|
|
|
for each transaction and the Hush community feels it is quite well worth it. |
|
|
|
|
|
|
|