|
|
@ -91,7 +91,7 @@ |
|
|
|
\newcommand{\HushLists}{\termbf{HushLists}} |
|
|
|
|
|
|
|
\newcommand{\doctitle}{Attacking Zcash Protocol For Fun And Profit} |
|
|
|
\newcommand{\leadauthor}{Duke Leto} |
|
|
|
\newcommand{\leadauthor}{Duke Leto + The Hush Developers} |
|
|
|
|
|
|
|
\newcommand{\keywords}{anonymity, freedom of speech, cryptographic protocols,\ |
|
|
|
electronic commerce and payment, financial privacy, proof of work, zero knowledge\ |
|
|
@ -101,7 +101,7 @@ zk-SNARKs } |
|
|
|
pdfborderstyle={/S/U/W 0.7}, |
|
|
|
pdfinfo={ |
|
|
|
Title={\doctitle, \docversion}, |
|
|
|
Author={\leadauthor + The Hush Developers}, |
|
|
|
Author={\leadauthor}, |
|
|
|
Keywords={\keywords} |
|
|
|
} |
|
|
|
} |
|
|
@ -494,7 +494,7 @@ If dust can attack us, dust can protect us. |
|
|
|
|
|
|
|
\nsection{De-anonymization techniques literature review} |
|
|
|
|
|
|
|
\nsection{ITM Attack} |
|
|
|
\nsection{ITM Attack: z2z Transaction Linkability} |
|
|
|
|
|
|
|
... |
|
|
|
\nsection{Metaverse Metadata Attacks} |
|
|
|