Verge - Reading Assignment

  1. IP address, and receiver address
  2. sender and amount
  3. probably comparing timestamp and amount to guess the connection of Bob and Alice
  1. IP and receivers address.
  2. sender address and values
  3. They can be linked by analyzing transactions completed on the network.

1: Ip address via TOR and addresses using dual key stealth addresses.
2:Amount of TRX and sender
3:Using timing info and analyzing the amounts of the input and output and finding where the same amount is spent and by who on an BTC explorer

  1. IP addresses by using TOR and using stealth addresses.

  2. The transaction amounts.

  3. Dusting attack and following the UTXO’s.

1 Like
  1. What two pieces of information are shielded on Verge?
    The Ip Address and the destination address through dual key stealth addressing
  2. What information is NOT shielded on Verge?
    The amount sent
  3. Suppose Alice sends 15 XVG to Bob, and Alice’s and Bob’s ‘Master Public Keys’ are publicly known. Describe how an attacker could link Bob and Alice together, even using the privacy features mentioned above.
    Probably using timing and the Quanitiy in the UTXOs and where the unspent quantities are then transfered fürther too
  1. What two pieces of information are shielded on Verge?
    the address are shielded

  2. What information is NOT shielded on Verge?
    send and the ammount are not shielded

  3. Suppose Alice sends 15 XVG to Bob, and Alice’s and Bob’s ‘Master Public Keys’ are publicly known. Describe how an attacker could link Bob and Alice together, even using the privacy features mentioned above.
    by the amount that was sent and the time stamps

  1. What two pieces of information are shielded on Verge?
  • IP addresses
  • Sender and Receivers addresses
  1. What information is NOT shielded on Verge?
  • The transacted amount.
  1. Suppose Alice sends 15 XVG to Bob, and Alice’s and Bob’s ‘Master Public Keys’ are publicly known. Describe how an attacker could link Bob and Alice together, even using the privacy features mentioned above.
  • Analysing transactions completed on the network.
  1. The two bits of information that are shielded are the IP address via TOR and the reciever identity via Dual key stealth addressing.

2 The amount of the transaction is not shielded on Verge.

  1. If there was low network useage an attacker may be able to link transaction by their amounts as there would be few transactions with the same amount.

1: Verge will shield both the IP address as well as the receivers address
2: Verge will not shield the senders address and the values.
3 : An attacker could link Bob and Alice by trying to track them analyzing their transactions on the network.

What two pieces of information are shielded on Verge?

Since verge uses tor, its hiding the ip address, and it also uses stealth address which hides the receiver, so the ip address and receiver is shielded.

What information is NOT shielded on Verge?

The sender’s address doesnt seem to be sheilded though you can argue that that’s the purpose of the built in tor fuctionality, also it seems that the amounts sent isnt hidden either, though there obscured because of the way the stealth address are used.

Suppose Alice sends 15 XVG to Bob, and Alice’s and Bob’s ‘Master Public Keys’ are publicly known. Describe how an attacker could link Bob and Alice together, even using the privacy features mentioned above.

I imagine sitting back and observing and analyzing the network would turn up some identity revealing information, i remember hearing that tor isn’t 100% great at hiding your identity as it usually used in conjunction with other protocols such as vpn’s and maybe many more.

  1. What two pieces of information are shielded on Verge? The IP addresses and the receiving party tx’s via TOR and I2P.

What information is NOT shielded on Verge?

  • The senders tx address and onchain information.
  • The tx amount being sent and received.
  1. Suppose Alice sends 15 XVG to Bob, and Alice’s and Bob’s ‘Master Public Keys’ are publicly known. Describe how an attacker could link Bob and Alice together, even using the privacy features mentioned above. Transaction amounts could be tracked and potentially linked.
1 Like
  1. IP address by utilizing Tor and addresses through Dual-key stealth addressing.
  2. The amount of transactions.
  3. By analyzing the network for transactions of the same size.
2 Likes

1 TOR is implemented in the wallet and TOR hides both parties true IP addresses.

2 the transaction amount is visible

3 They can be linked by analyzing transactions completed on the network, knowing the amount, time of sent transaction etc… when volume of transactions is low it could be easier to see

2 Likes

What two pieces of information are shielded on Verge?
IP of sender using TOR
Receiver using stealth addresses

What information is NOT shielded on Verge?
Transaction amounts are not shielded on Verge

Suppose Alice sends 15 XVG to Bob, and Alice’s and Bob’s ‘Master Public Keys’ are publicly known. Describe how an attacker could link Bob and Alice together, even using the privacy features mentioned above.
An attacker could link Bob and Alice together through the transaction amount. Though dual-key stealth addressing allows for users to shield where UTXO’s are being sent, an attacker could link these addresses by looking at the time between one UTXO of 15 XVG and one input of 15XVG on the explorer. Stealth addressing is also optional which leads to more potential vulnerabilities

1 Like
  1. What two pieces of information are shielded on Verge? Verge integrates Tor in all of our wallets, thereby eliminating any single point at which the communicating peers can be determined through network surveillance that relies upon knowing its source and destination.
  2. What information is NOT shielded on Verge? The addresses that are used to transact with are not masked. In that sense the privacy aspect works similar to Bitcoin with optional Tor+I2P tunneling turned on which is supported in certain wallets.
  3. Suppose Alice sends 15 XVG to Bob, and Alice’s and Bob’s ‘Master Public Keys’ are publicly known. Describe how an attacker could link Bob and Alice together, even using the privacy features mentioned above. Through addresses that are used.
1 Like
  1. What two pieces of information are shielded on Verge?
  • IP address;
  • Wallet address of the receiver.
  1. What information is NOT shielded on Verge?
  • Transaction amount.
  1. Suppose Alice sends 15 XVG to Bob, and Alice’s and Bob’s ‘Master Public Keys’ are publicly known. Describe how an attacker could link Bob and Alice together, even using the privacy features mentioned above.
  • As the amount is neither shielded or split in denominations, and there are not many users of Verge, it could be rather easy to spot a specified amount moving. Then, the attacker would need to track the origin of these 15 XVG backwards to Alice, and forwards to Bob, and hope to find some identifying information.
1 Like
  1. It shields the IP through their Tor software and the address of the person receiving funds. This is due to “Dual-Key Stealth Addressing”
  2. The transaction amount and the sender
  3. On the chain, they can trace the amount “Bob” received and trace it back to “Alice”. They find the information of the sender (Alice) on the transaction amount and match it up with the same amount received by Bob
1 Like

Verge uses TOR, an IP obfuscation tool, to hide the ip addresses
The amount of the transaction is not sheilded. a Sender id is visible.
Perhaps through exploring the blockchain and comparing sent amounts and recieved amounts along with time stamps it could be possible yet unlikely to connect the dots. Bobs master public key is merely the hash output of a transaction conconated with a shared secret, thus no new knowledge is obtained.

1 Like

What two pieces of information are shielded on Verge?Verge integrates Tor in all of their wallets, thereby eliminating any single point at which the communicating peers can be determined through network surveillance that relies upon knowing its source and destination.Dual-Key Stealth Addressing allows senders to create an unlimited number of one-time destinations addresses on behalf of the recipient without any interaction between the parties. Stealth addresses are a method by which additional obfuscation can be implemented to further protect the receiving party when transacting with Verge.

  • What information is NOT shielded on Verge?You can see the amount in the transactions
  • Suppose Alice sends 15 XVG to Bob, and Alice’s and Bob’s ‘Master Public Keys’ are publicly known. Describe how an attacker could link Bob and Alice together, even using the privacy features mentioned above.They can be linked by analyzing transactions completed on the network.
1 Like

1.IP adress through Tor implementation in all Verge wallets and recipients addresses
2. sender address and overall value of Tx
3.An attacker could link Bob and Alice together through the transaction amount. Though dual-key stealth addressing allows for users to shield where UTXO’s are being sent, an attacker could link these addresses by looking at the time between one UTXO of 15 XVG and one input of 15XVG on the explorer.

1 Like