bitcoin-dev

Reiterating centralized coinjoin (Wasabi & Samourai) deanonymization attacks

Reiterating centralized coinjoin (Wasabi & Samourai) deanonymization attacks

Original Postby Yuval Kogman

Posted on: February 4, 2025 14:02 UTC

The discussion centers on the technical specifics and vulnerabilities associated with a tagging attack in a cryptocurrency context, particularly focusing on Bitcoin's privacy mechanisms and potential ways to deanonymize users through active adversarial tactics.

The conversation initially highlights an inadequacy in proposed mitigations against such attacks, especially when considering transactions that spend P2TR inputs, which only partially mitigate the simplest form of this attack. The discourse further delves into the intricacies of input-input link disclosures, sybil resistance, and undisclosed conflicts of interest, emphasizing the nuanced understanding required to address these concerns effectively.

A detailed account of the attack process is provided, showcasing the methodical steps an attacker can take, from querying round information to manipulating transaction signatures. This process underscores the vulnerability inherent in the communication between clients and a malicious coordinator, facilitated through isolated Tor circuits and unique round IDs, leading to potential deanonymization. The narrative also touches upon the technical aspects of Tor circuits and connections, highlighting the operational mechanics of Wasabi Wallet’s network communications and the implications for privacy.

The critique extends to the failure of implementing robust mitigations against such deanonymization strategies, despite prior discussions and suggestions within the community. It questions the absence of stronger, more effective measures that had been outlined before the release of certain software updates, pointing to a discrepancy between claimed and actual privacy protections. The analysis suggests alternative mitigation strategies, like redundant queries over isolated Tor circuits and deterministic shuffling of transaction data, which were not adopted or adequately addressed in the implementation phase.

Further examination reveals deeper issues related to input-input linking and its consequences for on-chain privacy. The discussion brings to light various methods by which a malicious coordinator could exploit protocol weaknesses to cluster transactions and erode user privacy systematically. Highlighted research and documented code behavior support the argument that current implementations fall short of protecting against intersection attacks and other forms of wallet clustering, contrary to some community claims and marketing assertions.

Address reuse and its avoidance are discussed as technical considerations, pointing out the limitations of current approaches and suggesting improvements that could enhance privacy and security. Additionally, the dialogue criticizes the lack of transparency and potential conflict of interest in the review process, urging for honesty and integrity in discussions surrounding privacy vulnerabilities and their solutions.

In summary, the exchange scrutinizes the effectiveness of existing privacy protection measures in the face of sophisticated deanonymization techniques, advocating for a more transparent, well-informed approach to enhancing user anonymity and security in cryptocurrency transactions.

Bitcoin Logo

TLDR

Join Our Newsletter

We’ll email you summaries of the latest discussions from authoritative bitcoin sources, like bitcoin-dev, lightning-dev, and Delving Bitcoin.

Explore all Products

ChatBTC imageBitcoin searchBitcoin TranscriptsSaving SatoshiBitcoin Transcripts Review
Built with 🧡 by the Bitcoin Dev Project
View our public visitor count

We'd love to hear your feedback on this project?

Give Feedback