Browse Source

phrasing

master
Duke Leto 4 years ago
parent
commit
6d78f0c21c
  1. 8
      sietch.tex

8
sietch.tex

@ -449,20 +449,20 @@ mitigation against it, called "Sietch". Sietch is already running live in produc
and undergoing it's first improvement from a round a feedback. This is not an academic
paper about pipedreams, it will describe production code and networks.
Beginning with a literature review of all known metadata attack methods that can be
We begin with a literature review of all known metadata attack methods that can be
used against Zcash Protocol blockchains. This includes their estimated attack costs
and threat model. This paper then describes the "ITM Attack" which is a specific instance
of a new class of metadata attacks against blockchains which the author describes
as "Metaverse Metadata" attacks.
A few other new privacy issues and metadata attacks against Zcash Protocol coins
will be enumerated for the first time publicly in this treatise.
The paper then explains Sietch in detail, which was a response to these new attacks.
We hope this knew knowledge and theory helps cryptocoins increase their defenses
against very well-funded adversaries including nation states and chain analysis
companies.
A few other new privacy issues and metadata attacks against Zcash Protocol coins
will also be enumerated for the first time publicly.
\begin{quote}
In privacy zdust we trust.

Loading…
Cancel
Save