13
Postmortem of Monero CCS Hack: A Transaction Graph Analysis
(moonstoneresearch.com)
This is the lemmy community of Monero (XMR), a secure, private, untraceable currency that is open-source and freely available to all.
Wallets
Android (Cake Wallet) / (Monero.com)
iOS (Cake Wallet) / (Monero.com)
Instance tags for discoverability:
Monero, XMR, crypto, cryptocurrency
I’d avoid anything related to Cake Wallet (e.g. its remote nodes), seeing that the OP sgp = SamsungGalaxyPlayer is doing this side business—chain analysis, offering suspicious activity reports for CEXes, ready to collaborate with law enforcement if paid.
In 2022, it was noticed that someone from Team Cymru, a company trading net flow data, was a board member of the Tor Project, providing bandwidth, hardware, bridges (entry points to the Tor network). There was a fix: Remove Team Cymru hard-coded bridges.
Now “Moonstone Research” is proudly saying they can trace things that other companies can’t, and they’re related to Cake Wallet directly or at least indirectly, or so it seems.
This possible suspicion aside, the analysis itself is interesting. While it might be good news if we can identify the attacker, that would be actually very bad news for Monero!
Yes and no - Monero is well on the way to transitioning to the (nearly) full chain Decoy Selection range WIP
True. And no one even knows (yet) what was the problem to begin with.