What is the goal of a dusting attack?
My understanding of a dust attack is an attack on a wallet, to de-anonymize identity of the person or institution controlling the wallet/funds.
If a dusting attack is successful, how is the victim at risk?
If a dusting attack is successful, the attacker will then try to steal funds or information from the owner through phishing attacks or even cyber-extortion threats or even violence if they have enough information.
Do dusting attacks work for type-1 HD wallets, type-2, or both?
From my understanding, a type-2 wallet would be more vunerable because if the wallets address are deterministic there is some correlation between the address created, its feasible that some kind of connection can be made. where as a type-1 wallet everything is more randomized and no address has any correlation to another.
I definite want more insight here, thank you to whoever gives me that.
What features did Samourai Wallet add to protect against dusting attacks?
The First thing Samourai did was notify there users, second they implemented a âdo not spendâ feature that lets users mark suspicious funds so there funds arenât included in future trans actions.
I understand that the suspicious funds would be joined when money is spent through a new utxo that becomes created on the wallet, how would i as a user stop this from happening? moving my funds from the wallet, leaving the dust in the abandoned wallet?