11:37:05 https://dl.acm.org/doi/abs/10.1145/3589335.3651487 11:37:07 Deanonymizing Transactions Originating from Monero Tor Hidden Service Nodes 11:54:40 vtnerd: anything from this paper we can improve? ^ 15:00:43 I wonder if these people are familiar with proper disclosure protocols... 15:54:13 Conclusion 2 is the primary note. 16:40:48 selsta: we can definitely improve the time_sync request message which is leaking the remote tor address in certain situations. Also, randomly select whether a tx is related over tor another time instead of always forwarding over clearnet 16:42:06 I have to read again to make sure I didn't miss something though 22:08:35 same Threat Actors published https://www.ndss-symposium.org/wp-content/uploads/ndss24-posters-6.pdf 22:08:46 >A Two-Stage Encrypted Cryptomining 22:08:47 Traffic Detection Mechanism in Campus Network 22:09:05 >Stratum protocol is widely adopted in Bitcoin, Monero, 22:09:07 and Ethereum for communication. Thus, we focus on their 22:09:09 different implementation of Stratum protocols and conducted 22:09:11 a comprehensive investigation of related papers, source code, 22:09:13 and collected cryptomining traffic datasets. Stratum protocol 22:09:15 is mainly structured around four message formats: miner 22:09:17 subscription, miner authentication, mining job notification, 22:09:19 and share submission. Our active probing method focuses on 22:09:21 different specific implementations of the first three messages 22:09:23 with each corresponding success and error responses. 22:09:25 Our active probing method is based on subscription message 22:11:19 better suited for #monero-research-lounge 22:43:12 oh sorry