this post was submitted on 04 Jun 2024
6 points (65.0% liked)
Monero
1666 readers
33 users here now
This is the lemmy community of Monero (XMR), a secure, private, untraceable currency that is open-source and freely available to all.
Wallets
Android (Cake Wallet) / (Monero.com)
iOS (Cake Wallet) / (Monero.com)
Instance tags for discoverability:
Monero, XMR, crypto, cryptocurrency
founded 1 year ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
Deanonymizing Transactions Originating from Monero Tor Hidden Service Nodes
That is the actual title of the paper, which is very different to what OPs implies.
also the attack requires a very large % of both monero nodes communicating with tor and also tor nodes themselves. unless there is something im not understanding. i read the paper for a while, that's what it seemed to me
In the Tor community we are considering how much a relay operator can have in total and where we draw the line. NTH currently has almost 20% exit traffic and we (5 orgs in an AS) have a bit more. https://nusenu.github.io/OrNetStats/
looks like 20% of guards are run on Hetzner gear. this is really bad considering they are knowm to be backdoored by feds. yet somehow everyone forgot, like they always do. sad shit.
Yes, for years we in the Tor community have been trying to point out this to new relay operators: https://community.torproject.org/relay/technical-considerations/ Try to avoid the following hosters:
Guards, bridges and middle relays can actually be operated at nearly any hoster. They don't get abuse and don't attract attention. It's difficult to find a hoster for an exit. It's best to have your own AS.
thanks for the additional info.
tor project needs to make a big announcement or something, because basically you can consider these nodes as being run by the fucking NSA/5eyes. this is really bad. one of the reasons i dont trust TOR alone for certain things anymore.
interesting stuff, thanks for the info.
also did you see this in the paper?
is this a bug or a feature? have you spoken to anyone in the tor community about this? is there a going to be a mitigation for this? this seems concerning, yet I've seen no one talk about, which is even more concerning.
Edit: my bad, I forgot this is a Monero thing lol, not a TOR node thing