- They share the same core protocol.
- A Sybil attack happens when a small number of users falsifies new identities and pretends to be a much larger in number.
- Hiding an individual transaction among a large number of transactions.
- Samurai implementation of zerolink makes it more expensive to hack than the one used by Wasabi.
- How are Wasabi and Samourai wallets related?
It started out as the same application from the same team. Then the app and the team forked du to design choices.
- What is a âSybil attackâ?
It is a situation where a pool of supposedly unique users is made of fake identities linking to unique users. The goal of this attack is to dilute the anonymity set.
- How does Samourai protect against Sybil attacks?
By managing incoming public keys in a centralized server.
- What âtrade-offâ does Samourai make in order to achieve #3? Why is Wasabi critical of this?
This approach is like having a watchdog that keeps the costs down, while implementing the mixing feature. The problem is that it revolves around a centralized server, which goes against the crypto mentra.
-
How are Wasabi and Samourai wallets related?
they both fail to give bitcoin fungibility. -
What is a âSybil attackâ?
one user pretends to be more users -
How does Samourai protect against Sybil attacks?
they âprotectâ with centralization. rip
"This matter of Samouraiâs reliance on a backend server is one that SW admits does require the trust of users âthat Samourai isnât trying to sell their public key data to third parties.â LOL ok. -
What âtrade-offâ does Samourai make in order to achieve #3? Why is Wasabi critical of this?
Anonymity and decentralization are sacrified, which i thought would be the whole point of the serviceâŚ
- How are Wasabi and Samourai wallets related?
- At one point, Samourai and Wasabi were the same application: an implementation of CoinJoin called ZeroLink. The two lead developers decided to split the project due to differences in implementation methods.
- What is a âSybil attackâ?
- A Sybil attack is one in which a few users falsify new identities, creating the impression that there are more users than there are in reality. This means that the anonymity set is smaller than it actually is.
- How does Samourai protect against Sybil attacks?
- Due to its pricing mechanism, Samourai claims that itâs implementation of ZeroLink, called Whirlpool, is too expensive for malicious actors to attempt a Sybil attack.
- What âtrade-offâ does Samourai make in order to achieve #3? Why is Wasabi critical of this?
- Samourai relies on a centralized, backend server to process usersâ extended public keys. Wasabi is critical of this reliance because it requires that Samourai users trust that Samourai isnât trying to sell their public key data. They point out that anonymity using Whirlpool can be broken given that user addresses are sent to a backend server.
-
The core design is quite identical
-
A small number of user trying to be to be a large number
-
They made it more expensive
-
The use of a backend
Why would that be the case? Technically they were both the same projects that forked at one point.
- Both part of the same initial product(ZeroLink) that split due to implementation differences.
- user falsifies new identities and pretends to represent a large number of participants, when in reality, there are much fewer particiipants.
- Hide unspent txs among a large number.
- Whirlpool increases the cost for bad actors to break the anonymity of other users through a Sybil attack.
- Both worked together on building the implementation of ZeroLink
- Where a small number of users falsifies new identities and pretend to be uch larger in number.
- By using Whirlpool it makes it more expensive for malicious acts
- Samourai relies on a centralized backend server to process this which can always be hacked.
- How are Wasabi and Samourai wallets related?
Both run on the same protocol.
- What is a âSybil attackâ?
When there are a lot of fake accounts on a platform in order to give the impression of a big and active community, real users then are kind of exposed.
- How does Samourai protect against Sybil attacks?
Wasabi does hide your UTXOs in a large pool, so tracking becomes difficult.
- What âtrade-offâ does Samourai make in order to achieve #3? Why is Wasabi critical of this?
The ZeroLink âWhirlpoolâ is more costly for attackers to land a Sybil attack.
- How are Wasabi and Samourai wallets related? â competitors but were once the same application which later forked due to implementation opinion differences
- What is a âSybil attackâ? â when an attacker or group of attackers creates a larger number of digital identities to conduct the attack
- How does Samourai protect against Sybil attacks? Mixing transactions by shuffling UTXOs into a pool to make tracking harder
- What âtrade-offâ does Samourai make in order to achieve #3? Why is Wasabi critical of this? Samurai is more centralized as it requires senders to send their public keys and Wasabi believes it will sell this data.
-
They both hide your [unspent transaction outputs] in a âsufficientlyâ large crowd
-
A person or group of people pretending to be a larger group of identities through the use of false identities
-
When you use the wallet, you send Samourai all of your public keys in the form of an extended public key (XPUB) that lets Samourai have unique access to all of your current and future addresses. Samourai mixes all these addresses and stores them at their back end server.
-
Trade-off is the centralization of all the information. Wasabi is critical of the reliance on a single backend server because the users has to trust Samourai for not selling off their data
Wasabi and Samourai Wallets - Reading Assignment
- How are Wasabi and Samourai wallets related?
A. They are both mixing services to be used with the Bitcoin blockchain, they both have a natural competition for the fees involved and incentivized to monopolize to increase their functioning anonymity set. Both projects started from the same root developers.
- What is a âSybil attackâ?
A. A Sybil attack in this instance seems to have come from a party with unknown incentives to congest the anonymity set full of public keys which they had control over the privates. And so they could render the âmixedâ transactions with data of send and receive address and their transaction history. According to Samourai is this the case.
- How does Samourai protect against Sybil attacks?
A. Samourai Wallet protects against Sybil attacks with a fee model to disincentivize by making one to be more costly for attackers.
- What âtrade-offâ does Samourai make in order to achieve #3? Why is Wasabi critical of this?
A. Samourai wallet gave up decentralization through use of a common backend server. They may have opposing principles.
-
How are Wasabi and Samourai wallets related? They are the same application, but different implementation regarding its pricing mechanism.
-
What is a âSybil attackâ? Sybil attach is where a small number of users falsifies new identities and pretends to be much larger in number.
How does Samourai protect against Sybil attacks? Samourai uses a backend server to process users public keys.
What âtrade-offâ does Samourai make in order to achieve #3? Why is Wasabi critical of this? The tradeoff is using a centralized server needing to rely on trust.
1. How are Wasabi and Samourai wallets related?
They are both forks of the same original codebase.
2. What is a âSybil attackâ?
Where multiple fake identities are created in a network to gain a disproportionally large influence. State actors use this approach in facebook a lot, to drive harmful narratives on different topics.
3. How does Samourai protect against Sybil attacks?
Samouraiâs whirlpool pricing algorithm is different, and according to them makes sybil attacks expensive.
4. What âtrade-offâ does Samourai make in order to achieve #3? Why is Wasabi critical of this?
Samoraiâs process is more expensive, and they use centralized servers for the mixing. Wasabi is critical because they view Samaraiâs approach as a fundamentally inferior design, and are irritated Samourai are spinning the design decision as a benefit.
The have the same core protocol.
Sybil Attack = a small number of users falsifies new identities and pretends to be much larger in number.
Wasabiâs technique is to hide your UTX in a large crowd.
Samouraiâs implementation of ZeroLink has an other pricing mechanism than Wasabi.
-
How are Wasabi and Samourai wallets related?
They are competitors but have been formed via a fork of the same protocol base. -
What is a âSybil attackâ?
It is a method of creating a large number of pseudonymous identities and uses them to gain a disproportionately large influence on the network. -
How does Samourai protect against Sybil attacks?
What makes a Sybil attack more possible is the ease and cheapness at which someone can create new identities. According to Samourai they have a fee model to disincentevise attackers through increasing costs for potential attackers. -
What âtrade-offâ does Samourai make in order to achieve #3? Why is Wasabi critical of this?
They made a trade off of decentralisation. Wasabi believes or is weary that Samourai will sell or misuse their data in the future.
1. How are Wasabi and Samourai wallets related? The were the same application but split to implement their privacy differently.
2. What is a âSybil attackâ? Where a single or small number of users creates many false or shell identities in order to make out that the anonymity set is large and diverse. But in essence their isnât much privacy in a small âactualâ set.
3. How does Samourai protect against Sybil attacks? Via pricing. Its more expensive to create an attack.
4. What âtrade-offâ does Samourai make in order to achieve #3? Why is Wasabi critical of this? Centralized back end servers looking at extended public key data. Requires the trust of users as all of their future addresses are seen too.
- How are Wasabi and Samourai wallets related?
Both Wasabi and Samourai use the Zerolink protocol.
- What is a âSybil attackâ?
A Sybil attack is one where an attacker pretends to be so many people at the same time. It is one of the biggest issues when connecting to a P2P network. It manipulates the network and controls the whole network by creating multiple fake identities. To a single view, these different identities look like regular users, but behind the scenes, a single entity is called an unknown attacker who controls all these fake entities at once. While the Eclipse attack is about eclipsing certain nodes whereas the Sybil attack targets the whole network.
- How does Samourai protect against Sybil attacks?
Samouria protects against sybil attacks by using a centralized server.
- What âtrade-offâ does Samourai make in order to achieve #3? Why is Wasabi critical of this?
- Centralized back end servers looking at extended public key data. Requires the trust of users as all of their future addresses are seen too.
- Wasabi is a competitor to Samourai wallet and have similar designs.
2.A Sybil attack falsifies identity and breadth of coins (makes larger) so that the anonymity set is not as large as Wasabi details.
3.Samourai offered a mixing technique, where you hide your inputs in a âSea of walletsâ.
4.Samourai uses a centralized backend and thus can be broken. The trade-off is decentralization, something Wasabi is critical of.
- How are Wasabi and Samourai wallets related?
Initially they were the same application but they split up as its developers had different implementation ideas. - What is a âSybil attackâ? When a small number of users creates fake accounts to make the anonymity set appear bigger, when it really isnât.
- How does Samourai protect against Sybil attacks?
The pricing mechanism is different, which makes Sybil attacks in Samourai more expensive. - What âtrade-offâ does Samourai make in order to achieve #3? Why is Wasabi critical of this?
Samouraiâs implementation relies on centralized servers. Wasabi is critical of this as it requires Samouraiâs users to trust that their data will be kept secure.