09:35:10 i am seeing quite a few papers over the last while of the "AI-based approaches" to chain analysis/financial crime investigation. has anybody seen this approach applied to privacy-preserving chains? 09:36:09 an example: https://arxiv.org/abs/2310.13787 09:49:43 unless i'm stupid i think Rucknium dealt with this? 09:50:27 Oh nvm it wasn't rucknium 09:50:28 see https://donate.magicgrants.org/monero/projects/ring_signature_ai 09:51:18 https://raw.githubusercontent.com/ACK-J/Monero-Dataset-Pipeline/main/Lord_of_the_Rings__An_Empirical_Analysis_of_Monero_s_Ring_Signature_Resilience_to_Artificially_Intelligent_Attacks.pdf 10:29:05 oh nice, thanks syntheticbird 12:09:48 That was my paper, let me know if you have any questions 13:34:35 The proper way to reference it would be helpful! 16:20:39 This paper referenced it in this format 16:20:40 https://ieeexplore.ieee.org/document/10963663/references 16:20:42 A.-J. ACK-J, “Lord of the rings: An empirical analysis 16:20:44 of monero’s ring signature resilience to artificially 16:20:46 intelligent attacks,” 2022. [Online]. Available: https : / / raw . 16:20:48 githubusercontent . com / ACK - J / Monero - Dataset - Pipeline / main / 16:20:50 Lord of the Rings An Empirical Analysis of Monero s Ring 16:20:52 Signature Resilience to Artificially Intelligent Attacks.pdf. 19:27:10 hi 19:30:27 imho you touch on a sensitive topic here