BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//cfp.twed.org//WPBQCB
BEGIN:VTIMEZONE
TZID:CET
BEGIN:STANDARD
DTSTART:20001029T040000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:CET
TZOFFSETFROM:+0200
TZOFFSETTO:+0100
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:CEST
TZOFFSETFROM:+0100
TZOFFSETTO:+0200
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-mk6-WPBQCB@cfp.twed.org
DTSTART;TZID=CET:20260606T163000
DTEND;TZID=CET:20260606T165000
DESCRIPTION:Monero's cryptographic privacy is well-established but its P2P 
 layer is a different story.\n\nUsing Nebula\, ProbeLab's open-source netwo
 rk crawler\, we conducted the first large-scale topological crawl of the M
 onero network\, discovering over 29\,000 nodes and successfully handshakin
 g with more than 16\,000.\n\nThe findings are stark: over 81% of reachable
  nodes exhibit the peer ID mismatch pattern the Monero Research Lab associ
 ates with surveillance infrastructure while every flagged node tracing bac
 k to a single provider: Spruce Creek Networks LLC. Force-directed graph an
 alysis reveals a bifurcated overlay: a dense spy node core surrounding unp
 rotected peers\, and a self-segregated cluster of ban-list-enforcing nodes
 .\n\nWe present the methodology\, the topology\, ban list adoption rates\,
  and outline next steps: measuring how this surveillance density impacts D
 andelion++ propagation and transaction origin anonymity in practice.
DTSTAMP:20260513T020628Z
LOCATION:Hall 1 / Sala 1
SUMMARY:Mapping Spy Node Dominance in the Monero P2P Network - Yiannis Psar
 as
URL:https://cfp.twed.org/mk6/talk/WPBQCB/
END:VEVENT
END:VCALENDAR
