Pages:
Author

Topic: Wasabi Wallet - Open Source, Noncustodial Coinjoin Software (Read 8147 times)

legendary
Activity: 2730
Merit: 7065
Wasabi backend currently down due to funding issues... not long after I predict recently that we are going to see Wasabi shutting down their business slowly and gradually.
This is a perfect excuse to have for shutting down Wasabi, nobody can argue with funding issues, since it's obviously not profitable for them.  Roll Eyes
I am sure they will be back. Their blockchain analysis partner could be a lender of last resort if no other handler steps up. After all, it's just a loan that will be returned to them with future coinjoins... The honeypot story continues. But they will be stabbed in the back like everyone else once their handlers have had enough.
legendary
Activity: 2212
Merit: 7064
Wasabi backend currently down due to funding issues... not long after I predict recently that we are going to see Wasabi shutting down their business slowly and gradually.
This is a perfect excuse to have for shutting down Wasabi, nobody can argue with funding issues, since it's obviously not profitable for them.  Roll Eyes

Light the candle (again) please.
member
Activity: 378
Merit: 93
Enable v2transport=1 and mempoolfullrbf=1
I'm neutral, but I agree. There's always a non-zero chance that any software, network, system can and will be exploited.

Explain how to exploit it then.

It may not be proven in practice because there's probably not enough incentives for hackers to attack and exploit those coordinators. But on paper? You can't say that the system is "perfectly/100% not exploitable". That would be dishonest.

Explain how to exploit it then.
legendary
Activity: 2898
Merit: 1823
So, remember people. Wasabi is completely trustless software, as long as you already have private coins, trust another person to join your coinjoin, and deliberately blacklist yourself on every coordinator you connect. Trustlessness on steroids.

OK, if the Wasabi coordinators have those "weaknesses" in their system, what can the developers do to address them?
How does it sound to start being honest with your people? It's OK to admit that it is not completely trustless, people will get it. Neither Samourai, nor Joinmarket were completely trustless. There's always a small risk of getting Sybil attacked; it's just the way coinjoins are constructed. But, no, we have Mr. Absolute Truth here harassing anyone who dares to claim that Wasabi might not cure cancer.


I'm neutral, but I agree. There's always a non-zero chance that any software, network, system can and will be exploited.

Stop that.

Why shouldn't people who want to know about privacy learn that BlackHatCoiner and o_e_l_e_o were hired by a custodial blockchain analysis company? This warning can't be repeated enough after the years they spent camping this topic in order to scam newbie Bitcointalk users out of their coins and data.

OK, if the Wasabi coordinators have those "weaknesses" in their system, what can the developers do to address them?

What "weaknesses" are you talking about?



It may not be proven in practice because there's probably not enough incentives for hackers to attack and exploit those coordinators. But on paper? You can't say that the system is "perfectly/100% not exploitable". That would be dishonest.
member
Activity: 378
Merit: 93
Enable v2transport=1 and mempoolfullrbf=1
Stop that.

Why shouldn't people who want to know about privacy learn that BlackHatCoiner and o_e_l_e_o were hired by a custodial blockchain analysis company? This warning can't be repeated enough after the years they spent camping this topic in order to scam newbie Bitcointalk users out of their coins and data.

OK, if the Wasabi coordinators have those "weaknesses" in their system, what can the developers do to address them?

What "weaknesses" are you talking about?

So, remember people. Wasabi is completely trustless software, as long as you already have private coins, trust another person to join your coinjoin, and deliberately blacklist yourself on every coordinator you connect. Trustlessness on steroids.

You said "and" but you meant "or" instead - ANY ONE of these three methods allow the attack target to drain the attacker's wallet, so yes, it's trustlessness on steroids  Cool  Cool  Cool

There's always a small risk of getting Sybil attacked; it's just the way coinjoins are constructed. But, no, we have Mr. Absolute Truth here harassing anyone who dares to claim that Wasabi might not cure cancer.

Okay why can't you prove it then? You keep repeating this claim, but you haven't come up with any methods that would allow you to simultaneously exploit the trustless protocol in 3 different ways:

Your "solutions" don't protect you against a malicious coordinator

Why wouldn't my solutions protect me? Explain how I can still be Sybil attacked if I use the methods I described to you. Start with method 1, explain how the malicious coordinator could defeat it, then go on to method 2, explain how the malicious coordinator could defeat it, then go on to method 3 and explain how a malicious coordinator could defeat it.

Thanks to its design, the WabiSabi protocol is completely invulnerable to a Sybil attack and you've provided absolutely no evidence or argument otherwise.
legendary
Activity: 2534
Merit: 1713
Top Crypto Casino
One of the things that can immediately be noticed when someone such as Kruw comes along are the narcissistic tendencies. I use that word because not only does he never accept he is wrong, he does not even accept the mere possibility that he might be wrong. He has put an overinflated value on anything and everything he posts to the point he simply looks down at everybody else.

How on earth did someone with a serious egotistic condition as him even get that many coinjoins through a coordinator he names after himself?

But, no, we have Mr. Absolute Truth here harassing anyone who dares to claim that Wasabi might not cure cancer.
legendary
Activity: 1512
Merit: 7340
Farewell, Leo
So, remember people. Wasabi is completely trustless software, as long as you already have private coins, trust another person to join your coinjoin, and deliberately blacklist yourself on every coordinator you connect. Trustlessness on steroids.

OK, if the Wasabi coordinators have those "weaknesses" in their system, what can the developers do to address them?
How does it sound to start being honest with your people? It's OK to admit that it is not completely trustless, people will get it. Neither Samourai, nor Joinmarket were completely trustless. There's always a small risk of getting Sybil attacked; it's just the way coinjoins are constructed. But, no, we have Mr. Absolute Truth here harassing anyone who dares to claim that Wasabi might not cure cancer.
legendary
Activity: 2898
Merit: 1823
Having said that, no blockchain analysis representatives have an account here otherwise maybe they could given an answer.

Actually, we have a partner of a blockchain analysis company posting in in this thread: BlackHatCoiner.

BlackHatCoiner and o_e_l_e_o were both hired by the 'Mixtum" blockchain analysis company to get Bitcointalk users to deposit their BTC into their custodial spy network:


Stop that. They were merely challenging your system through a debate. It would be nice if you addressed the debate directly, rather than than replying with Ad Hominem attacks that attempt to discredit the debater even though their questions have some validity. Those challenges, if addressed, might also help improve Wasabi coordinator CoinJoins.

OK, if the Wasabi coordinators have those "weaknesses" in their system, what can the developers do to address them?

¯\_(ツ)_/¯
legendary
Activity: 2534
Merit: 1713
Top Crypto Casino
If you ask yourself honestly there is no doubt you will come to the same conclusion as most others on a specific aspect of your posting habits. There is nothing to achieve by periodically mentioning any member (especially one that was highly respected by the vast majority) that is not going to return to defend themselves against any allegation that you (or anybody else) is going to throw in their direction.

I have read the posts from BlackHatCoiner and it is clear he is more than capable of engaging with you (but surely you can leave other names out of your vendetta).

Actually, we have a partner of a blockchain analysis company posting in in this thread: BlackHatCoiner.

BlackHatCoiner and o_e_l_e_o were both hired by the 'Mixtum" blockchain analysis company to get Bitcointalk users to deposit their BTC into their custodial spy network:

Quote from: Mixtum
[3. Quality scoring of incoming transactions.
member
Activity: 378
Merit: 93
Enable v2transport=1 and mempoolfullrbf=1
So what do I do?  Do I have to get myself banned 10 times, which is also a big waste of time on my end particularly if time is a very important resource and I am a Target, while trying to find out if the Attacker is quitting due to Mining Fee burns?

I explained 3 different methods to detect a Sybil attacker, you don't have to get yourself banned:

My points proved conclusively that coordinators are trustless. You can even use all 3 anti Sybil methods together at once, you don't have to rely on just one:

- First, register your private coin to the coordinator. If it's accepted, then there's no Sybil attack.
- Second, ask your friend to register a coin to the same round. If it's accepted, then you've confirmed for a second time that there's no Sybil attack.
- Third, just to be absolutely sure, back out of the round during signing to check to see if the transaction was built to target you. If the transaction is created, you've confirmed for a third time that there's no Sybil attack.

If somebody is so keen on trying to attack a Target, then may be safe to assume the Target is likely very important and therefore the Funding could be huge.  And I imagine having a Million Dollars funding to spend on a Decoy Coordinator burning Mining Fees in an attempt of the successful Attack is not too extraordinary either.

Imagine the attacker wasting a million dollars in mining fees to set up a decoy only to be immediately detected with methods 1 or 2  Grin Grin Grin
hero member
Activity: 882
Merit: 1873
Crypto Swap Exchange
Honest coordinators issue temporary bans to non-signer inputs as a DoS protection measure, so a convincing Sybil attacker would have to do the same.
So what do I do?  Do I have to get myself banned 10 times, which is also a big waste of time on my end particularly if time is a very important resource and I am a Target, while trying to find out if the Attacker is quitting due to Mining Fee burns?

If somebody is so keen on trying to attack a Target, then may be safe to assume the Target is likely very important and therefore the Funding could be huge.  And I imagine having a Million Dollars funding to spend on a Decoy Coordinator burning Mining Fees in an attempt of the successful Attack is not too extraordinary either.
member
Activity: 378
Merit: 93
Enable v2transport=1 and mempoolfullrbf=1
Step 1: Find a coordinator.
Step 2: Check if he is a Sybil attacker by DoS-ing him.
Step 3: Have your coins blacklisted in that coordinator.
Step 4: Repeat step 1 until there are no coordinators left.

Lol!  Grin

I already gave you all the steps, you never responded to them, remember?

My points proved conclusively that coordinators are trustless. You can even use all 3 anti Sybil methods together at once, you don't have to rely on just one:

- First, register your private coin to the coordinator. If it's accepted, then there's no Sybil attack.
- Second, ask your friend to register a coin to the same round. If it's accepted, then you've confirmed for a second time that there's no Sybil attack.
- Third, just to be absolutely sure, back out of the round during signing to check to see if the transaction was built to target you. If the transaction is created, you've confirmed for a third time that there's no Sybil attack.
legendary
Activity: 1512
Merit: 7340
Farewell, Leo
Step 1: Find a coordinator.
Step 2: Check if he is a Sybil attacker by DDoS-ing him.
Step 3: Have your coins blacklisted in that coordinator.
Step 4: Repeat step 1 until there are no coordinators left.

Lol!  Grin
member
Activity: 378
Merit: 93
Enable v2transport=1 and mempoolfullrbf=1
How does the victim get to do that indefinitely when the coordinator is supposed to ban him after refusing to sign and disrupt the round? What prevents the attacker coordinator to simply mark these inputs as blacklisted, with DoS protection measure as an excuse?

Then you confirmed with 100% certainty that the coordinator was not trying to target you with a Sybil attack since they won't allow you to participate at all.
legendary
Activity: 1512
Merit: 7340
Farewell, Leo
It is needless to mention that all those "precautions" and "solutions" have to be made manually. The client can only tell you if your coins are refused, which gives no insights whatsoever of whether you're being Sybil attacked or not. In other words, it is outside the skill set of the overwhelming majority of users who just want some privacy.

This costs the target victim nothing, and they can repeat it as many times as they want.
How does the victim get to do that indefinitely when the coordinator is supposed to ban him after refusing to sign and disrupt the round? What prevents the attacker coordinator from simply marking these inputs as blacklisted, with DoS protection measure as an excuse?
member
Activity: 378
Merit: 93
Enable v2transport=1 and mempoolfullrbf=1
What if the Transaction is still created even if I am a target and am backing out?

Then you have the opportunity to burn the Sybil attacker's funds in mining fees. Honest coordinators issue temporary bans to non-signer inputs as a DoS protection measure, so a convincing Sybil attacker would have to do the same. During this ban time, the attacker would have to continue to pay mining fees to remix some portion of the UTXOs that the target originally observed in the transaction as well as their ancestors and descendants. The more convincing the attacker tries to be, the more mining fees they have to pay. This costs the target victim nothing, and they can repeat it as many times as they want.
hero member
Activity: 882
Merit: 1873
Crypto Swap Exchange
My points proved conclusively that coordinators are trustless. You can even use all 3 anti Sybil methods together at once, you don't have to rely on just one:

- First, register your private coin to the coordinator. If it's accepted, then there's no Sybil attack.
- Second, ask your friend to register a coin to the same round. If it's accepted, then you've confirmed for a second time that there's no Sybil attack.
- Third, just to be absolutely sure, back out of the round during signing to check to see if the transaction was built to target you. If the transaction is created, you've confirmed for a third time that there's no Sybil attack.
What if the Transaction is still created even if I am a target and am backing out?
member
Activity: 378
Merit: 93
Enable v2transport=1 and mempoolfullrbf=1
Having said that, no blockchain analysis representatives have an account here otherwise maybe they could given an answer.

Actually, we have a partner of a blockchain analysis company posting in in this thread: BlackHatCoiner.

BlackHatCoiner and o_e_l_e_o were both hired by the 'Mixtum" blockchain analysis company to get Bitcointalk users to deposit their BTC into their custodial spy network:

Quote from: Mixtum
3. Quality scoring of incoming transactions
We run a thorough background check of incoming funds through a proprietary algorithm.

2.1. Privacy Policy

Please refer to our Privacy Policy to get an understanding of our confidentiality obligations. You consent to the collection and use of information as described in the Privacy Policy.

2.2 Suspension or termination of services

Mixtum reserves the right to suspend or terminate access to services at any time at its own discretion, with or without reasons, with or without notification assuming no responsibility whatsoever.

For example, services may be suspended or terminated due to the following reasons:

    an actual or suspected violation of these Terms and Conditions;
    use of the service in such a manner that is conducive to the legal liability of Mixtum or Service malfunction;
    planned or unplanned maintenance, etc.

2.3 Unacceptable use

You agree that you personally will not commit, encourage or support the committal of:

    use of any unauthorized means to access the Mixtum service or use of any automated process or service (for example, spider, crawler or periodic caching of information stored or generated by Mixtum) except for the functions described in our API, as well as distribution of instructions, software or tools with this aim in view;
    modification, change, distortion or any other interference in work of the Mixtum service;
    disturbing or interference in operation of servers or networks used by Mixtum to deliver the Services;
    disabling, overload or degradation of Mixtum performance (or any other network connected to the service);
    use of the Mixtum service or website for any other purposes other than those specifically provided by these Terms and Privacy Policy;
    any illegal or fraudulent activity, as well as use of this Service in order to legalize illegal income, financing of terrorism, participation in schemes of phishing, forgery or other such falsification or manipulation;
    unauthorized spamming, pyramid schemes or any other activity duplicating unwanted messages should they be commercially oriented or of other nature.

2.4 Service updates

At any time and at its absolute discretion Mixtum can carry out unscheduled works related to the service modification, update and enhancement. We are liable to add or remove functions and cease activities of the service and website.
2.5 License and restrictions

Mixtum provides you with a personal nontransferable nonexclusive license to use the Service as it is stipulated for you by Mixtum. This license is provided under conditions and restricted to the provisions, stipulations and constraints stated in these Terms. Therewith, such license is intended for personal, noncommercial use. You may not copy, modify, create a derivative work of, decompile or otherwise attempt to extract the source code of the service or any part thereof, exclusive of data permitted by law, or expressly allowed by the Mixtum platform (use of templates, API, etc.). You may not reassign (or grant a sublicense of) your rights to use the service, or otherwise transfer any part of your rights in accordance with these Terms. These Rules do not provide you with any license or permission to copy, distribute, change or otherwise use any applications programming interface despite any provisions to the contrary. No property rights or ownership rights related to the Service are not granted to you according to these Terms. Mixtum reserves all rights that have not been expressly granted.
legendary
Activity: 2534
Merit: 1713
Top Crypto Casino
I have had Kruw on my ignore list for a very long time. I checked his answers after I asked him a couple of questions but he refused to address them directly therefore I have ignored him again. He chose to post nonsensical answers therefore as far as I am concerned he is (was and will always be) a waste of space and time. He wants to hold a certain position therefore will never give you a direct answer to your question. Having said that, no blockchain analysis representatives have an account here otherwise maybe they could given an answer.

Is there anyone left in this topic, who's understood what I said? Talking with TwistyPhrasy feels like a loss of my time.
member
Activity: 378
Merit: 93
Enable v2transport=1 and mempoolfullrbf=1
Is there anyone left in this topic, who's understood what I said? Talking with TwistyPhrasy feels like a loss of my time.

My questions weren't rhetorical. I'll repeat them for you:

Why wouldn't my solutions protect me? Explain how I can still be Sybil attacked if I use the methods I described to you. Start with method 1, explain how the malicious coordinator could defeat it, then go on to method 2, explain how the malicious coordinator could defeat it, then go on to method 3 and explain how a malicious coordinator could defeat it.

Your claim is that a malicious coordinator can exploit the trustless protocol in 3 different ways without being detected, yet you've provided absolutely zero explanation on how the malicious coordinator would achieve this.


I would warn users on using Wasabi, as it's caught into being flawed software: https://twitter.com/wasabistats

Why are you still trying to spread this lie after you already found out that the "wasabistats" Twitter account is flagging remixes as false positive merges?  This was already decisively proven to be a hit job account: https://twitter.com/Kruwed/status/1642612625883164672

Then your claim is that other participants in your coinjoin who remix hurts your privacy by decreasing the anonymity of your coins below what is displayed in the client:

Quote from: Twitter Post
Don't trust, verify!  120 of those 132 "output merges" are outputs being remixed, which are detected as false positives since KYCP cannot tell the difference between outputs merged to make a payment and outputs that were remixed in another coinjoin. https://i.ibb.co/YDPGYdC/sheet.png

You have it literally backwards: When coinjoin outputs are remixed, it makes it more difficult to trace funds in the initial coinjoin because it expands the number of possible options where a coin could travel before reaching its final destination.

So my question is, why are you lying about remixing, which increases privacy, by calling it a flaw? It's obvious you are lying about remixing hurting privacy, because if you weren't, then you would be running a coordinator that rejects remixed funds from joining new rounds.
Pages:
Jump to: