-
### Is there an existing request for feature?
- [X] I have searched the existing issues
### What feature would you like?
To join a community, you have to paste the URL in session after having click…
-
I think the scenario description of how tech-savvy people can identify infected individuals is too convoluted, and the actual operation can be much easier and effective.
It is assumed the malicious u…
-
Hi,
I installed kloak via whonix repository (bullseye) and when I run `systemctl start kloak` the service crashes approximately after 1 sec:
```
× kloak.service - kloak anti keystroke deanonymizati…
-
Say Alice requests n nodes, A, and Bob requests n nodes, B. Each set A and B are populated uniformly at random. Thus the probability of overlap is limited and A and B are highly probably unique.
If…
dbosk updated
4 years ago
-
deanonymization was based on API path `https://dnevnik.mos.ru/core/api/profiles` which returns list of classmates. it was possible to match Contingent UUIDs from rating to classmates' UUIDs. but now i…
-
In order to initiate a transaction, users need to produce a `SingleProof`. Presently, producing this proof is prohibitively expensive on consumer-grade hardware: it requires almost a hundred Gb of RAM…
-
# Privacy vulnerability - deanonymization by Session ID
### Problem 1
The ID (or nickname, if got one) is only one, and you can't use it, if you have few alter-egos irl.
Example: I am just a gi…
qdhj updated
8 months ago
-
```
panic: runtime error: invalid memory address or nil pointer dereference
[signal SIGSEGV: segmentation violation code=0x1 addr=0x0 pc=0x64c915]
goroutine 22 [running]:
panic(0x7fa320, 0xc4200…
-
I have read the article Deanonymization in the Bitcoin P2P Network,but I couldn't find your appendix.May I get the original article with the appendix please?
-
tl;dr - Using a pretty simple scheme, `getStatus` can be modified to be allow auditing by clients, allowing them to detect partitioning or attempts to reveal the final transaction data in a way that t…