• g2devi
    link
    fedilink
    arrow-up
    4
    ·
    13 days ago

    Very interesting video. Is far as I can see, there are really only three points of weakness that were exploited by the chain analysis. The first was if the transaction was started using one of their Monero nodes. The second was exchanges or partner services. The third was the fee structure used. So as long as you use the default fees, use trusted Monero nodes (especially your own), and you either don’t use exchanges/partner services or at the very least, have multiple wallets where each wallet connects to at most one exchange/service (i.e. one wallet has public money inflows from a single service and another has public money outflows from a single service), it would be virtually impossible to have your transactions traced.

    • antidote@monero.town
      link
      fedilink
      arrow-up
      2
      ·
      13 days ago

      Your suggestion to have separate wallets for inbound, and outbound doxxed transactions is actually very good