|
|
@ -449,20 +449,20 @@ mitigation against it, called "Sietch". Sietch is already running live in produc |
|
|
|
and undergoing it's first improvement from a round a feedback. This is not an academic |
|
|
|
paper about pipedreams, it will describe production code and networks. |
|
|
|
|
|
|
|
Beginning with a literature review of all known metadata attack methods that can be |
|
|
|
We begin with a literature review of all known metadata attack methods that can be |
|
|
|
used against Zcash Protocol blockchains. This includes their estimated attack costs |
|
|
|
and threat model. This paper then describes the "ITM Attack" which is a specific instance |
|
|
|
of a new class of metadata attacks against blockchains which the author describes |
|
|
|
as "Metaverse Metadata" attacks. |
|
|
|
|
|
|
|
A few other new privacy issues and metadata attacks against Zcash Protocol coins |
|
|
|
will be enumerated for the first time publicly in this treatise. |
|
|
|
|
|
|
|
The paper then explains Sietch in detail, which was a response to these new attacks. |
|
|
|
We hope this knew knowledge and theory helps cryptocoins increase their defenses |
|
|
|
against very well-funded adversaries including nation states and chain analysis |
|
|
|
companies. |
|
|
|
|
|
|
|
A few other new privacy issues and metadata attacks against Zcash Protocol coins |
|
|
|
will also be enumerated for the first time publicly. |
|
|
|
|
|
|
|
\begin{quote} |
|
|
|
In privacy zdust we trust. |
|
|
|
|
|
|
|