pull down to refresh

Monero people will tell you monero is untraceable but you can watch a video of chainalysis tracing it transaction by transaction.
Here are the timestamps:
26:55 - Morphtoken to the perp 30:43 - Perp to ChangeNow or Liquid Exchange 32:49 - Perp to Exodus Wallet 35:08 - Perp to Exodus Wallet or mining pool 36:51 - Perp to Centralized Exchange or Merchant POS, this is how they nabbed him
143 sats \ 2 replies \ @nullcount 6h
I'm not convinced that anything can be "untraceable". Every action in the "real world" leaves a trace of some sort. Its just a matter of who can find the trace, and whether they can decode the trace such that it reveals something about the "real" action that occurred.
XMR relies on obfuscation of traces that everyone has access to.
LN relies on limiting access of transparent traces to only the nodes that route a txn.
Different approaches. Apples and Oranges.
Just because a protocol makes it easier to "act" with fewer and/or obfuscated traces than another protocol, does not necessarily prevent someone from using the protocol in a (wrong) way that creates MORE/TRANSPARENT traces.
reply
Yup, it's fundamental in informationt theory. When you write a seed on paper there are indents in the table. If you grind the indents to sawdust that can be reconstructed. It's all a matter of, like you said, who has the capability to find the information and to decode it.
This is actually a fundamental part of cryptography too. "All the computers in the world would take a quintillion years to crack this key" is saying the same thing: it can be cracked, but there's no practical way to do it with current technology. So things can be practically untraceable without being absolutely untraceable.
reply
220 sats \ 2 replies \ @ek 7h
So far:
01:43 "Monero is really the frontline of the arms race between cryptographers and investigators"
03:22 "If you are a privacy advocate, then Monero is really objectively better than Bitcoin"
05:26 "Monero is also untraceable"
Perp to Centralized Exchange or Merchant POS, this is how they nabbed him
You think that's a flaw in Monero if you send it to a KYC exchange? Admittedly, I haven't watched the full video yet. But is it so hard to accept that Monero has better privacy than Bitcoin and that's what makes it useful?
reply
446 sats \ 1 reply \ @ek 6h
6:45 "There is talk of increasing Ring CTs further, potentially into the hundreds which would make our job much more difficult because a big part of this is how to remove the decoys and actually perform some rudimentary tracing"
13:04 Explaining Dandelion: "At a certain, randomly selected point, a node will choose to start spreading a tx all around in the network. So if you are receiving it at that later stage, you have no idea whether that IP address you're receiving it from is the same IP address that it came from and in fact, it is very likely that it is not. The initiator's IP address is essentially invisible to you. [...] A lot of how we do our monero tracing involves IP observation of services. [...] Dandelion has made that impossible."
16:29 "We tend to look at the fee structure to identify behaviors."
20:33 "A user connected to one of our nodes in order to broadcast their tx. We're sort of bypassing Dandelion when they do that. The user connects directly to us, so we are able to see their IP address."
23:05 "Now let's introduce our simulation: we were asked to investigate a DNM, and specifically the admins who are believed to operate potentially out of Columbia."
23:32 "The admin was swapping from Bitcoin to Monero using the swapping service Morphtoken."
25:45 "Like I mentioned before, we attempt to collect IP addresses of services [...] and identify those so we can potentially find exit points for funds or subpoenable entities."
27:09 "[The swap] occurred before Dandelion was introduced."
29:01 "A user connected to our node to broadcast a tx [...] turns out the IP address is probably from a VPN."
33:25 "This is not going to be a good lead to follow with law enforcement because Exodus does not collect user information afaik. But it helps us to understand a little bit more of our target and maybe that is an indication that they are potentially using Exodus wallet. [...] We do not know with any certainty that our target is actually using Exodus."
35:17 - again IP address found because they didn't run their own node but it's also again from a VPN
37:16 - again didn't run their own node and this time IP address is from Columbia, not from a VPN!
38:26 - connected IP address to an entity that can be subpoenaed => prison :(
this is how they nabbed him
Yeah, by not running your own node and literally connecting to a fed node.
Thank you, this was very informative. I'm more bullish on Monero's privacy than before.
Conclusion: don't receive bitcoin as a DNM admin, run your own node, praise Dandelion, don't use KYC exchanges to cash out.
reply
#879820 I had similar thoughts...
reply
Why isn’t this in the monero territory?
reply
Technically monero fits under the umbrella of crypto... Plus Monero territory is more expensive to post. But if it's a good post, I think you get the sats back quickly. This... isn't a good post IMO, so keep it out of ~monero territory lol
reply
Didn't know there was one when I posted.
reply
That was released by a Monero community member and shows chainalysis using honeypot nodes to probabilistically figure out which IP broadcast a transaction. If you run your own node or use one you're 100% certain about this is impossible.
reply
Perp to Centralized Exchange
Try again.
Only stupid criminals get caught. How do I know? Because you never hear about the smart ones. And using a centralized exchange is stupid.
Monero is not magic. _Of course it can be traced. _ I struggle to see the point of even posting this? The use case of Monero for spending is that it affords BETTER privacy than Bitcoin. Do you deny this?
The following is from the Monero FAQ.

Privacy

How is Monero’s privacy different from other coins?

Monero uses three different privacy technologies: ring signatures, ring confidential transactions (RingCT), and stealth addresses. These hide the sender, amount, and receiver in the transaction, respectively. All transactions on the network are private by mandate; there is no way to accidentally send a transparent transaction. This feature is exclusive to Monero. You do not need to trust anyone else with your privacy.
More Info: About Monero

Is Monero magic and protects my privacy no matter what I do?

Monero is not magic. If you use Monero but give your name and address to another party, the other party will not magically forget your name and address. If you give out your secret keys, others will know what you've done. If you get compromised, others will be able to keylog you. If you use a weak password, others will be able to brute force your keys file. If you backup your seed in the cloud, you'll be poorer soon.

Is Monero 100% anonymous?

There is no such thing as 100% anonymous. If nothing else, your anonymity set is the set of people using Monero. Some people don't use Monero. Monero may also have bugs. Even if not, ways may exist to infer some information through Monero's privacy layers, either now or later. Attacks only get better. If you wear a seatbelt, you can still die in a car crash. Use common sense, prudence and defense in depth.
reply
0 sats \ 0 replies \ @guts 4h
It's not, prove tracing one transaction
reply
"Don't believe the hype" tends to be a good approach to any claim that sounds too good to be true.
reply
Anyone claiming it to be "untraceable" is ignorant as the traceability is highly dependent on usage patterns and even more so on OPSEC fails via usage of honeypots as seen in the chainalysis video.
It is an interesting video and shows the basics of monero tracing which is only a good thing for the average user to be aware of. But it also demonstrates that the only reason they were able to find the guy was the amateur mistake of him using a public clearnet RPC node for broadcasting transactions with their home IP. All he had to do to avoid this would have been to use a wallet like Feather that only interacts with the blockchain via tor.