[1000 BTCD bounty]
I have outlined one controlled test:
https://forum.thesupernet.org/index.php?topic=76.msg995#msg995Hopefully there can be others identified.
So, the help I need is for ideas on how to crack the Teleport and also to implement such attacks.
Teleport uses public blockchains so the cloning (spend) events are visible on the blockchain. The part that makes it anon is that all teleports go from onetime use addresses to onetime use addresses. Effectively making a chain of tx without anything to link it to any actual person. Short of someone announcing (or being monitored) that a specific tx was theirs, I cannot think of any ways to correlate a spend on the blockchain with an account.
maybe if a node is monitored at the packet level, the signed tx being sent to the blockchain can be captured? To work around this, we would need to use remote pushtx nodes, eg. nodes that accept encrypted onions with signedtx inside and they submit to the coin's network.
For now, I want to make sure that even if the usage of the onion network is perfectly logged by the attacker, that the anon set is still all cloning events during the clonesmear timewindow. Of course, with each user's clonesmear parameter settable, I dont think it is even possible to know which tx are part of the anon set. And as usage grows, the anon set grows without any extra load on blockchains
James