bitcoin-dev
Reiterating centralized coinjoin (Wasabi & Samourai) deanonymization attacks
Posted on: January 6, 2025 13:07 UTC
Yuval Kogman raises questions regarding the possibility of detecting attacks on a system by analyzing historical data or server-side code, specifically inquiring if a key remained consistent over time, changed with each round, or was unique for every registration request.
These inquiries aim to understand if it would have been feasible to identify a targeted attack through proactive monitoring or retrospective analysis, assuming that application logs were adequately maintained to facilitate such a review. The discussion touches upon the potential for attackers to manipulate the system by influencing the server to issue different RSA keys or round IDs, thereby enabling them to track specific Unspent Transaction Outputs (UTXOs). This scenario underscores the importance of log management and the ability to trace interactions within the system to safeguard against or identify malicious activities.