Obscuring P2P Nodes with Dandelion
5 days ago
- #cryptocurrency
- #privacy
- #Dandelion++
- The weakest link in cryptocurrency privacy is often outside the blockchain.
- Technologies like stealth addresses and subaddresses anonymize transactions but metadata remains a vulnerability.
- Cryptocurrency nodes use peer-to-peer networks; multiple nodes can triangulate transaction origins.
- Dandelion++ protocol mitigates this risk by introducing 'stalk' and 'diffusion' phases to obscure origins.
- Dandelion++ is used in Monero and considered by other cryptocurrencies.
- Dandelion differs from Tor by protecting identity within the P2P network, not just before entering it.