-
**The problem:**
The owner of a large exchange can uncover with high probability the transactional relationships between users of the exchange.
This is the iterated-EABE traceability problem. Th…
-
# Enhancing the Awareness, Utility, and Anonymity Set of Oxen - Part 4 - Promote ‘Perfect Forward Secrecy’ Purchasing by Invisible Social Graph Exploitation and Interactive In-App Prompts
The [ORC-…
-
In the initial use case of tight-knit friend groups, knowing people's IPs should be ok. Eventually for more global, publicly accessible use cases, it will be required to have an option for anonymity a…
-
Chapters 1, 2, 6 of Threat Modeling
- [x] All ethresearch post related to validator privacy
- [x] https://moodle.ufsc.br/pluginfile.php/2377555/mod_resource/content/2/Threat%20Modeling.pdf
…
-
## Basic Information
**Name:** Odysee (LBRY protocol)
**Category:** Video/Audio Platforms
**URL:** https://odysee.com/ (source code: https://github.com/lbryio/lbry-desktop/tree/odysee - see here …
-
There are protocols under discussion and development that could provide anonymity, unlinkability or other privacy properties even when relying on a CAPTCHA provider and further work in that direction …
-
ROBERT's authors refer often (3 times) to @vaudenay's [security analysis of DP-3T](https://eprint.iacr.org/2020/399.pdf) in their paper. Indeed, they position their paper as an alternative of "decentr…
-
Core Issue: Implementing Enhanced Privacy Measures for Community Members
As Scroll ZKP Native L2 prepares to launch its token in the future, one core issue that requires attention is the enhancemen…
-
[ORC](https://orc.network) is a peer-to-peer network of computers that coordinate anonymously over Tor to allocate their unused hard disk capacity into a collective, secure, and uncensorable cloud. Us…
-
# Abstract
This proposal proposes a method for creating an ephemeral identity token without revealing the Nostr public key (npub) while avoiding leakage of metadata or personally identifiable informa…