Verge - Reading Assignment

  1. What two pieces of information are shielded on Verge? The IP address and the recipient address.

  2. What information is NOT shielded on Verge? Cross chain trading.

  3. Suppose Alice sends 15 XVG to Bob, and Alice’s and Bob’s ‘Master Public Keys’ are publicly known. Describe how an attacker could link Bob and Alice together, even using the privacy features mentioned above. The amount spent by alice and received by bob could be linked.

1 Like
  1. The sender’s IP address and recipient’s address are shielded on Verge.
    2.The code and amount of transactions is not shielded.
    3.By analyzing transactions and trying to link them that way.
1 Like

1. What two pieces of information are shielded on Verge?
Sender IP address, Receiver address
2. What information is NOT shielded on Verge?
Amount transferred
3. Suppose Alice sends 15 XVG to Bob, and Alice’s and Bob’s ‘Master Public Keys’ are publicly known. Describe how an attacker could link Bob and Alice together, even using the privacy features mentioned above.
The transaction amounts and timing could be compared using both master addresses.

1 Like
  1. What two pieces of information are shielded on Verge?
    IP Addresses and recipient’s addresses.

  2. What information is NOT shielded on Verge?
    Amount.

  3. Suppose Alice sends 15 XVG to Bob, and Alice’s and Bob’s ‘Master Public Keys’ are publicly known. Describe how an attacker could link Bob and Alice together, even using the privacy features mentioned above.
    Based on matching amounts and timing.

1 Like
  1. IP addresses & receiver address
  2. Amount
  3. with the amounts & timing
1 Like

1.- IP address and wallet addresses.

2.- TX amount.

3.- Linking TX amounts by analyzing them.

1 Like
  1. What two pieces of information are shielded on Verge?
    IP address
    Receivers address via stealth addresses

  2. What information is NOT shielded on Verge?
    Sender information presumably (like ring signatures provide)
    Transaction amount

  3. Suppose Alice sends 15 XVG to Bob, and Alice’s and Bob’s ‘Master Public Keys’ are publicly known. Describe how an attacker could link Bob and Alice together, even using the privacy features mentioned above.
    Timing and dusting attack-since the amount is known
    Master public key may be able to link one time use adddresses

1 Like
  1. The two pieces of information shielded on Verge are firstly, an IP obfuscation service. Verge integrates Tor in all of their wallets, thereby eliminating any single point at which the communicating peers can be determined through network surveillance that relies upon knowing its source and destination. Secondly, the use of Dual-Key Stealth Addressing, this allows senders to create an unlimited number of one-time destinations addresses on behalf of the recipient without any interaction between the parties. When multiple users send funds to a stealth address, rather than these transactions appearing on the blockchain as multiple payments to the same address, they instead appear as multiple payments going to different addresses.
  2. Information that is NOT shielded on Verge is the amounts sent in all transactions.
  3. Suppose Alice sends 15 XVG to Bob, and Alice’s and Bob’s ‘Master Public Keys’ are publicly known. Describe how an attacker could link Bob and Alice together, even using the privacy features mentioned above. Using a blockchain explorer to search for a transaction involving 15 XVG it would still be extremely difficult to link Alice and Bob due to the use of stealth addresses. Also, if there happened to be another transaction involving 15 XVG at the same time (assuming a saturated network), and coincidentally both these transactions are included in the same block, then I would say that it would then be impossible to link Bob and Alice together.
1 Like
  1. IP addresses (through tor) and sending and receiving addresses (through dual-jey stealth addresses and RingCT).
  2. The amount transacted.
  3. By analyzing the network for the same denominations in the transaction.
1 Like

Tor shields IP addresses, Dual-Key Stealth Addressing allows senders to create an unlimited number of one-time destinations addresses on behalf of the recipient without any interaction between the parties.

No mention of shielding amounts.

Similar to the way BTC is traceable, through the unshielded amounts.

1 Like
  1. What two pieces of information are shielded on Verge?

IP address and the receiver address

  1. What information is NOT shielded on Verge?

The sender address and the amount of the transaction

  1. Suppose Alice sends 15 XVG to Bob, and Alice’s and Bob’s ‘Master Public Keys’ are publicly known. Describe how an attacker could link Bob and Alice together, even using the privacy features mentioned above.

I think by linking the transaction and the time it was sent in order to figure out the receiver address. In this case Bob.

1 Like

1.) IP address
2.) amount, their code
3.) With amounts trx’s could be linked

1 Like
  1. IP addresses (using TOR) and wallet addresses (using stealth addresses)

  2. Amounts do not appear to be shielded.

  3. A person can derive all used addresses from their master public keys and thus view all received amounts.

1 Like
  1. What two pieces of information are shielded on Verge?

Sender and receiver IP addresses

  1. What information is NOT shielded on Verge?

Amount of the transaction

  1. Suppose Alice sends 15 XVG to Bob, and Alice’s and Bob’s ‘Master Public Keys’ are publicly known. Describe how an attacker could link Bob and Alice together, even using the privacy features mentioned above.

An attacker could link Bob and Alice if the number of transactions occurring at the same time is low and make the connection through timing the transaction, knowing also the amount of it.

1 Like
  1. By using Tor it conceals the IP address and using Dual key stealth addresses it conceals the real address of sender and receiver
  2. The code because of it open source policy and the amount of each tx is in the public ledger
  3. By timing the tx and searching the amount
1 Like
  1. IP address

  2. TX amount is visible.

  3. attacker could link the two by looking at how many addresses sent and received 15 xvg at the time of the TX.

1 Like
  1. IP addresses and the value of transactions.

  2. Verge Currency has a transparent ledger that allows anyone to view all of its transactions.

  3. Dusting attacks.

1 Like
  1. Two pieces of information are shielded on Verge: the sender and the receiver

1.1. the IP address = TOR IP obfuscation
TOR - The Onion Router, is an IP obfuscation service which enables anonymous communication across a layered circuit based network.
Verge integrates Tor in all of their wallets, thereby eliminating any single point at which the communicating peers can be determined through network surveillance that relies upon knowing its source and destination.

1.2. Dual-Key Stealth Addressing allows senders to create an unlimited number of one-time destinations addresses on behalf of the recipient without any interaction between the parties. Stealth addresses are a method by which additional obfuscation can be implemented to further protect the receiving party when transacting with Verge.

  1. Information that is not shielded on Verge is the amount of txs.

  2. An attacker could link Bob and Alice together, even using the privacy features mentioned above if he finds a way to connect Alice tx input of 15 XVG & Bob’s received UTXO analizing the time when the tx of the same denomination was created.

1 Like
  1. IP address and receiver public key on the payment
  2. Sender public key, amount, time of the transaction
  3. By calculating timing and amount of transaction. Also if TOR which mixes addresses is compromised.
1 Like
  1. Sender and recipient IP address

  2. Transaction amounts

  3. They could be linked by analysing transactions on the network.

1 Like