2025-06-22 –, Main Stage
According to recent analysis by the Monero Research Lab, one or more anti-privacy adversaries have set up many spy nodes on the Monero network, composing up to 40 percent of reachable node addresses. Connections to these spy nodes would make up an estimated 15 percent of the privacy-sensitive outbound connections established by honest nodes that use the default configuration. This talk will quantitatively estimate the privacy impact of spy nodes even when Monero's Dandelion++ protocol is used. The following countermeasures will be evaluated: opt-in IP address ban lists, anonymity networks like Tor and I2P, a Dandelion++ alternative called Clover, subnet deduplication, and protocols that verify that an internet address is really operating a distinct node. The Confidentiality, Integrity, and Availability triad in information security will guide comparisons of these countermeasures.
Rucknium is an empirical microeconomist affiliated with the Monero Research Lab. He uses statistical analysis to research improvements to Monero’s privacy and security. His contributions include: reducing time to first transaction confirmation by 60 seconds, analysis of the 2024 black marble spam attack and evaluation of countermeasures, optimal decoy selection for ring signatures, countermeasures against spy nodes on the network, analysis of the privacy risk of nonstandard transactions, and evaluation of the security of the 10 block lock on re-spending transactions.
GitHub: https://github.com/Rucknium
Website: https://Rucknium.me