this post was submitted on 13 Mar 2025
5 points (85.7% liked)

Monero

1851 readers
11 users here now

This is the lemmy community of Monero (XMR), a secure, private, untraceable currency that is open-source and freely available to all.

GitHub

StackExchange

Twitter

Wallets

Desktop (CLI, GUI)

Desktop (Feather)

Mac & Linux (Cake Wallet)

Web (MyMonero)

Android (Monerujo)

Android (MyMonero)

Android (Cake Wallet) / (Monero.com)

Android (Stack Wallet)

iOS (MyMonero)

iOS (Cake Wallet) / (Monero.com)

iOS (Stack Wallet)

iOS (Edge Wallet)

Instance tags for discoverability:

Monero, XMR, crypto, cryptocurrency

founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
[–] azalty@jlai.lu 1 points 5 days ago* (last edited 5 days ago)

The website's article completely bases itself on https://duke.hush.is/memos/6/

Both are spreading FUD about churning. The 2 wallets method is also churning, but "easy" version because you're separating the results. The end result is still dangerous: you could spend 2 of your "Outgoing" coins in the same transaction, which is really easy to identify, provided both coins are from the same source.

I'd argue the stastical risk of establishing a trace thanks to a serie of churns is extremely unlikely. Nobody will churn 6+ times anyways, and the advantages of churning far outweighs the ones of not churning.

Sadly, they also don't state anything about how that "MAP Decoder Attack" works. After searching, it's pretty interesting, and we come onto the pretty well known issue that decoy distribution isn't perfect.

FCMP will fix this. In the meantime, please churn for any sensitive transaction. Either method (2 wallets or classic churning) works and the effects are always good, even if other mistakes are made (except if sweeping all).

I have to say I haven't really checked much of Rucknium's work, but it's pretty damn precise. Guy knows what he's talking about. Our next big threat will be malicious remote nodes, like he said!