Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

ZCash is controlled by a privately-owned company in the U.S., who gave themselves founder's rewards.

It's also designed in a way to allow "poison pills" - i.e. those in control can force a single transaction on a block, thus giving a vector to deanonymize someone.

You may ask, "Who would do something like that?" and the answer would be the U.S. government who can compel privately owned organizations via secret court subpoenas. Monero is more private than ZCash, and has a record of not acting on self-interests.




With monero you can analyze residuals to deanonymize people.


The IRS has paid out millions of dollars in a failed effort to deanonymize Monero transactions without a lawful subpeona. Thus, a lawful subpeona is still required in order to unseal Monero transactions in the US, I.e., to compel the production of a view-only cryptographic key.


Which takes quite a bit of time and hasn't been proven possible yet. Very different from an on-demand poison pill.


How does this work?


The video was posted elsewhere I think. Basically, if you view enough of the residual ring inputs you can link them together. This is not quite practical yet but assuming wide adoption of XMR chain stores, etc, would be able to do this attack.




Consider applying for YC's Fall 2025 batch! Applications are open till Aug 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: