The quantity going in and out of the mix is still obvious. Maybe it can't be tied to me with IP obfuscation, but block timing will still give away too much info
Do you mean that the nature of the transaction could be identified simply from the amount being transacted ?
I'm saying that the send can be correlated to the receive. The nature of it, who knows.
I'm saying that it's too much information. The blockchain is still transparent, and always should be. Information always adds up. Put as little correlative data out there as possible. The same script that correlates BTC could still correlate DRK.
It's less information, but it's still enough for a 3rd party to gather that A sent X to B.
You won't be able to tell that the change addresses from which A sends belong to A. So you'll see that B received X coins, but there's no way to link A and B.
This is a complicated argument to describe...
Lets back up just a little.
Lets pretend that MNs have IP obfuscation already implemented.
They still have identifiable signatures on the blockchain.
MNs will show up on the blockchain many orders of magnitude more often than non-MN clients. It's a blockchain-based form of traffic analysis. We can tell the difference between clients and MNs by this alone and it's REALLY obvious.
So, it will be clear to tell when the send is an MN and when it is not. Also, by the even more obvious fact that MNs just sign, they don't send/receive... (I was showing how IP obfuscation won't have any impact) So, even pre-denominated, pre-mixed coin quantity can be identified on block on which the TX is initiated: A. And, since it all pays out on one TX as well, it exits the fog on 1 block: B. Since A and B are obviously NOT MNs, A sent X to B. Just look at it backwards. Start with B and check the chain history of all non-MN traffic-level signature, poof, you find the input that matches.
Basically, we don't know that A is A, until wee see B, and it's the same as A, and there's a bunch of signatures in between, but no actual TX.... A sent X to B. Now, we still don't know who A and B are, but if they goof up just one time in their entire lives... Just like BTC's chain. amirite?
It's essentially the same qty/timing attack that exists on current BTC-forked blockchains. It just shifts from one metric to another.
Maybe I'll just ahve to wait for someone else to relocate me, that's just how it looks from here.