Breaking Monero Episode 05: Input Selection Algorithm

Monero Community Workgroup
17 Jan 201913:58

Summary

TLDRIn this episode of 'Breaking Monero', the hosts delve into the intricacies of the ring input selection algorithm, exploring beyond the term 'randomly selected'. They discuss the evolution from a completely random distribution to a recent zone selection and finally to a matching distribution model, based on empirical observations. The conversation highlights the importance of balancing the selection algorithm with ring size for optimal privacy, addressing heuristics like the 'newest output' and 'coinbase outputs' to enhance plausible deniability in ring signatures.

Takeaways

  • πŸ”’ The video discusses the Manero ring input selection algorithm, which is crucial for maintaining privacy through ring signatures in cryptocurrency transactions.
  • πŸ”„ The term 'randomly selected' is criticized for being vague and inaccurate when describing the selection of decoys in ring signatures.
  • πŸ“Š The script explains that a completely random distribution of ring inputs can lead to heuristics that adversaries might use to de-anonymize transactions, such as the tendency to spend newer outputs more often.
  • 🌐 An improved approach is the 'recent zone selection', which gives preference to more recent outputs within a certain time frame, thus making it harder to identify the actual spent output.
  • πŸ“‰ The Manero team has moved towards a 'matching distribution' model, which is based on empirical observations and aims to mimic real-world transaction patterns more closely.
  • πŸ“˜ The script emphasizes the importance of the selection algorithm's continuous iteration to counteract new and existing heuristics that could compromise privacy.
  • πŸ€– The selection algorithm incorporates elements of randomness, ensuring that no two transactions will have identical ring signatures, even if they follow the same model.
  • πŸ’° The discussion includes the handling of 'coinbase outputs', which are newly generated funds and are treated differently in the selection algorithm to avoid heuristics based on their novelty.
  • πŸ” The script mentions the complexity of creating a selection algorithm that is resistant to all possible heuristics, acknowledging that it's an ongoing challenge.
  • πŸ”„ The importance of balancing improvements to the selection algorithm against potential unintended consequences is highlighted.
  • πŸ”‘ The video concludes with the goal of providing the best plausible deniability through ring signatures, with a commitment to ongoing improvement and iteration.

Q & A

  • What is the main topic discussed in the 'Breaking Monero' episode?

    -The main topic discussed in the episode is the Monero ring input selection algorithm, focusing on the nuances and specifics of how decoys are selected in ring signatures.

  • Why is the term 'randomly selected' considered vague in the context of Monero's ring signatures?

    -The term 'randomly selected' is considered vague because it does not accurately describe the complex process behind the selection of decoys in Monero's ring signatures, which involves more than just random chance.

  • What is a 'recent zone selection' in the context of Monero's ring input selection algorithm?

    -A 'recent zone selection' refers to a method where the algorithm is more likely to select decoys from a specific recent time period, such as the last 1.8 days, to make the selection appear more plausible and less predictable.

  • What are the potential issues with a completely random distribution method for ring signatures?

    -A completely random distribution method can lead to unintended consequences, such as the creation of strong heuristics that an adversary might use to guess the real output based on the age of the outputs, often assuming newer outputs are more likely to be spent.

  • How does the matching distribution algorithm differ from the completely random one?

    -The matching distribution algorithm is based on empirically observed distributions and mathematical models, making the selection of outputs more representative of actual spending patterns rather than purely random.

  • What is a 'coinbase output' in the context of Monero?

    -A 'coinbase output' is a special output in every Monero block of transactions that generates new money as part of the protocol, rewarding miners for their work.

  • Why might an adversary consider coinbase outputs as decoys rather than the real spend?

    -An adversary might consider coinbase outputs as decoys because they are newly generated money and it is assumed that people are less likely to spend this 'new money' as the true spender.

  • What is the significance of the ring size in relation to the selection algorithm?

    -The ring size is significant because it affects the effectiveness of the selection algorithm. A larger ring size can help mitigate the shortcomings of a less-than-perfect selection algorithm, while an improved selection algorithm can make better use of a given ring size.

  • How does the selection algorithm need to evolve to maintain privacy in Monero?

    -The selection algorithm needs to evolve continuously to counter new heuristics and analysis methods that adversaries might develop, ensuring that the privacy provided by ring signatures is maintained and strengthened over time.

  • What is the ultimate goal of the Monero team regarding the ring signature selection algorithm?

    -The ultimate goal of the Monero team is to provide the best plausible deniability possible with ring signatures, and they aim to achieve this by continuously iterating and improving the selection algorithm.

Outlines

00:00

πŸ” Exploring Monero's Ring Signatures and Input Selection

This paragraph delves into the intricacies of Monero's ring signature input selection algorithm. Initially, the concept of 'randomly selected' decoys was criticized for its vagueness and potential inaccuracies. The speaker introduces a visual example to illustrate different selection methods, starting with a completely random distribution that could lead to heuristic vulnerabilities, such as the tendency to spend newer outputs. The paragraph discusses the evolution of Monero's approach, moving from a simple recent zone selection to a more sophisticated matching distribution model based on empirical observations. The aim is to enhance privacy by making the selection of decoys less predictable and more representative of actual spending patterns.

05:01

πŸ›  Refining Monero's Selection Algorithm Against Heuristics

The second paragraph continues the discussion on Monero's input selection algorithm, emphasizing the continuous refinement process to counteract various heuristics that could compromise privacy. It highlights the challenge of balancing the inclusion of coinbase outputs, which are special transaction outputs generating new money, to avoid creating patterns that adversaries might exploit. The speaker explains how the algorithm was adjusted to mitigate the heuristic involving the age of outputs and the introduction of a small window to select outputs, resulting in fewer coinbase outputs being chosen. The paragraph also touches on the complexity of addressing multiple heuristics and the ongoing effort to improve the selection algorithm to maintain Monero's privacy standards.

10:03

πŸ”„ The Arms Race of Privacy: Iterating Monero's Selection Algorithm

The final paragraph wraps up the discussion by emphasizing the ongoing arms race in financial privacy. It acknowledges the inevitability of trade-offs in refining the selection algorithm and the importance of addressing both major and minor heuristics. The speaker uses the analogy of road maintenance to illustrate the continuous need for improvement and adaptation in the face of new challenges. The paragraph also discusses the relationship between ring size and the selection algorithm, noting that increasing the ring size can mitigate the impact of a less-than-perfect algorithm, while an improved algorithm makes better use of a larger ring. The goal remains to provide the best plausible deniability through ring signatures, with a commitment to ongoing iteration and improvement.

Mindmap

Keywords

πŸ’‘Ring Input Selection Algorithm

The ring input selection algorithm is a method used in cryptocurrencies like Monero to determine which transactions, or 'outputs', will be included as decoys in a ring signature. This process is crucial for maintaining transaction privacy. In the video, it is discussed how the algorithm has evolved from a completely random selection to a more sophisticated model that considers various factors to avoid heuristic analysis by adversaries.

πŸ’‘Ring Signatures

Ring signatures are a type of digital signature that allows a person to sign a transaction on behalf of a group of people without revealing their identity. In the context of the video, ring signatures are used in Monero to ensure that transactions cannot be traced back to a specific sender, enhancing privacy. The script discusses how the selection of decoys within these signatures is refined to avoid patterns that could be exploited.

πŸ’‘Decoys

Decoys in the context of ring signatures are additional transactions included in the ring to obscure the real transaction. The video explains how the selection of these decoys is not random but follows a specific algorithm designed to prevent easy identification of the actual transaction, which is key to maintaining privacy in Monero.

πŸ’‘Heuristics

Heuristics in this video refer to the strategies or rules of thumb used by an adversary to make an educated guess about the real transaction within a ring signature based on patterns or trends. The script discusses how the ring input selection algorithm has been improved to counteract these heuristics and prevent easy identification of the actual transaction.

πŸ’‘Coinbase Outputs

Coinbase outputs are special transactions that generate new currency as a reward for mining new blocks in a blockchain. In the script, it is mentioned that these outputs are treated differently in the selection algorithm to avoid heuristics that might associate newly generated money with being less likely spent as the real transaction in a ring signature.

πŸ’‘Random Distribution

Random distribution in the script refers to an initial method of selecting decoys for ring signatures, where transactions were chosen without any pattern or preference. However, this method was found to be less effective due to the potential for heuristics based on transaction age, leading to the development of more sophisticated selection algorithms.

πŸ’‘Recent Zone Selection

Recent zone selection is a strategy mentioned in the video where the algorithm is more likely to select decoys from a recent period in the transaction history. This approach was an improvement over completely random selection, as it made it harder for adversaries to apply heuristics based on the age of the transactions.

πŸ’‘Matching Distribution

Matching distribution is a more advanced selection algorithm discussed in the video, which attempts to mimic the observed transaction patterns in the Monero network. This method increases the likelihood of newer transactions being selected as decoys, which counters heuristics that might assume newer transactions are less likely to be the real one.

πŸ’‘Plausibility

In the context of the video, plausibility refers to the ability of a ring signature to make all transactions within the ring appear equally likely to be the real transaction. The goal of the ring input selection algorithm is to enhance plausibility and make it difficult for anyone to determine which transaction in the ring is the actual one.

πŸ’‘Continuous Improvement

Continuous improvement is a concept emphasized in the script, highlighting the ongoing process of refining the ring input selection algorithm to counter new and existing heuristics. It underscores the dynamic nature of privacy preservation in cryptocurrencies, where the algorithms must evolve to stay ahead of potential analysis techniques.

πŸ’‘Privacy

Privacy is the overarching theme of the video, focusing on how the ring input selection algorithm contributes to the financial privacy offered by cryptocurrencies like Monero. The script discusses various aspects of the algorithm that are designed to protect the identity of the transaction sender and ensure that transactions cannot be traced back to them.

Highlights

Exploring the nuances of Manero's ring input selection algorithm and the inaccuracies of the term 'randomly selected'.

Introduction to the concept of ring signatures and decoys in the context of Manero's privacy features.

Demonstration of a completely random distribution algorithm and its potential flaws.

Heuristics that favor spending newer outputs over older ones and their implications for privacy.

The introduction of a recent zone selection to counteract the heuristics based on output age.

The evolution from a random system to a matching distribution model based on empirical observations.

How the newest outputs are more likely to be selected in the current Manero selection algorithm.

The importance of the timing aspect in the selection algorithm and its role in enhancing privacy.

Addressing the challenge of coinbase outputs and their potential as a heuristic for adversaries.

Modifications to the selection algorithm to mitigate against heuristics involving coinbase outputs.

The complexity of creating a selection algorithm that is resistant to all possible heuristics.

The analogy of plugging holes to describe the continuous improvement of the selection algorithm.

The relationship between ring size and the selection algorithm in providing strong privacy.

The arms race in financial privacy and the iterative process of improving selection algorithms.

The importance of balancing changes to the selection algorithm to avoid inadvertently creating new vulnerabilities.

The goal of providing the best plausible deniability possible with ring signatures in Manero.

The commitment to continuous iteration and improvement in Manero's ring signature selection algorithm.

Transcripts

play00:00

welcome back to breaking monaro today we

play00:02

are talking about Manero

play00:03

ring input selection algorithm we've

play00:06

spoken in the past about ring signatures

play00:08

and decoys in other previous episodes

play00:10

and suring specifically has talked about

play00:12

how the decoys are selected but it uses

play00:15

a very vague word called a vague phrase

play00:18

at least called randomly selected right

play00:21

and in this episode we're gonna get far

play00:23

more nuance far more specific about what

play00:26

we mean by this this mysterious phrase

play00:28

and also the phrase itself isn't very

play00:30

accurate either so it's important to add

play00:33

some additional clarification here on

play00:35

what's actually happening and there's a

play00:38

lot more to random than

play00:40

behind-the-scenes so I'm going to start

play00:41

with the screenshare showing an example

play00:43

of some of my narrows input selection

play00:46

algorithms over the past so on the top

play00:49

here you can see an example of a

play00:51

completely random distribution algorithm

play00:55

algorithm so on the Left you have old

play00:57

outputs that were generated at the very

play00:59

very beginning of my narrows history on

play01:01

the right you have new outputs that are

play01:03

generated very very recently especially

play01:05

within the past few days or so let's say

play01:08

that the green circle is the actual

play01:11

output that was spent this is the real

play01:13

money to sent and the blue ones are the

play01:15

decoys that are selected now a

play01:17

completely random distribution method

play01:20

might sound great to begin with because

play01:22

you know any input could be selected for

play01:24

any reason but this leads to a lot of

play01:27

unintended like consequences as a result

play01:30

so you can make pretty strong heuristics

play01:33

that say people are far more likely to

play01:36

spend new money than old money so as a

play01:40

result the latest input the green one

play01:43

highlighted here is most likely to be

play01:45

the real one and well you don't

play01:48

necessarily have the ground truth to

play01:50

prove that this is true it could be

play01:52

tested as very reliable over time you

play01:55

could make the potentially very strong

play01:57

heuristic there and you can see in the

play01:58

example on the screen on the first on

play02:00

the first line there that is the case

play02:02

because that's often the case right so

play02:05

Manero sought to improve upon this

play02:07

iterate upon this and you can see on the

play02:09

second line there there's an example of

play02:11

a recent zone selection

play02:13

so you have again the whole history of

play02:16

Menards outputs but you have a short

play02:19

recent zone period where you're more

play02:22

likely to select other decoys from the

play02:25

specific period so the narrows code

play02:28

might specify for instance that the

play02:30

recent zone needs to be about 1.8 days

play02:33

and that you should select about half of

play02:35

the decoys from this said recent zone so

play02:38

you can see on this example here that

play02:40

about half the decoys are selected from

play02:42

this recent zone and then for the rest

play02:44

of the tale going back to previous tie

play02:46

like the very beginning of my narrows

play02:47

history you still have the ability to

play02:49

select these outputs but they're less

play02:52

common than new outputs and this helps

play02:54

address the specific heuristic we're

play02:57

speaking about where the the latest

play02:58

output is the most the latest output in

play03:01

the ring is usually the true one because

play03:03

now you have a more latest out latest

play03:06

decoys included in this ring so

play03:08

therefore you have a more plausible

play03:11

selected outputs in this case and the

play03:13

recent zone was nice and simple it was a

play03:15

really easy way to implement this sort

play03:16

of feature and it would definitely was

play03:18

an improvement over the existing

play03:22

completely random system Manero began

play03:24

with but it's not ideal

play03:26

and so Manero has moved to what more

play03:29

resembles the bottom line there which is

play03:31

a matching distribution one that is

play03:34

based on empirically observed

play03:37

distributions based off what we've

play03:39

Manero and outside Reacher's researchers

play03:42

found with Bitcoin and Manero it's a

play03:45

mathematical model so you can see that

play03:47

in this case the newest outputs are even

play03:50

more likely to be selected for instance

play03:51

so this hopefully this diagram helps

play03:55

show how it's not just about how many

play03:58

inputs there are in a transaction it's

play04:00

also about how you select them and

play04:02

there's a lot of implications on how

play04:04

these are actually selected but it's

play04:06

more than just timing as I show here

play04:08

timing is just one part of how this is

play04:10

done and for it to this end Sarang is

play04:13

going to speak a little bit more

play04:14

specifically about other factors

play04:16

involved in the selection algorithm yeah

play04:19

absolutely

play04:19

I mean and it's worth noting that you

play04:21

know technically the way that we still

play04:22

do it and the way that we've always done

play04:23

it did have elements of randomness to it

play04:25

I mean random is kind of it's a

play04:27

it's often a really poor word right so

play04:29

for example even though typically the

play04:31

outputs that you'll choose kind of

play04:32

follow that particular mathematical

play04:34

model there is an element of randomness

play04:36

involved so you know two people can

play04:38

definitely choose very very different

play04:39

rings but you know on average they'll

play04:41

follow a pattern that looks

play04:41

approximately like the pattern that

play04:43

you've showed so there's always still

play04:45

randomness into it but like you said

play04:47

timing heuristics or you know guesses

play04:49

that an adversary might they make make

play04:51

based just on the age of the output like

play04:53

you said are only one heuristic they're

play04:55

pretty big heuristic right because you

play04:57

know in general for a lot of old

play04:59

transactions you could guess what you

play05:00

thought the newest one was and and you

play05:02

know you might be right although you

play05:03

couldn't prove it you know implicitly

play05:05

but timing is just one part and we've

play05:08

iterated since then to kind of mitigate

play05:10

against other smaller heuristics that

play05:12

were not timing based on us the one

play05:14

example deals with something called

play05:15

coinbase outputs if you're not familiar

play05:17

with the term basically every Manero

play05:20

block of transactions that is generated

play05:21

has a special output in it that

play05:23

generates new money as part of the

play05:24

protocol that's kind of what helps to

play05:26

reward miners for doing work in part and

play05:28

those coinbase outputs I like to think

play05:30

of as you know newly generated money so

play05:32

in general do people spend newly

play05:34

generated money or coin based outputs as

play05:36

the true spender you know probably not

play05:38

necessarily as often as non-new might or

play05:41

nonpoint base outputs so for example if

play05:43

I happen to choose ring that contained I

play05:45

don't know 10 coin based outputs and

play05:47

then my true output which was not a coin

play05:49

base output an adversary might look at

play05:52

that and think hmm I would say it's much

play05:53

more likely that this person you know

play05:55

didn't spend a coin base out because

play05:57

that's all very new money so that could

play05:59

be a heuristic that they might use they

play06:01

might think coin based outputs are

play06:02

probably decoys well in that case that

play06:04

would kind of imply that we should

play06:05

select fewer a coin based outputs as

play06:07

part of our rings how many is too many

play06:09

or too few I mean that's not a very

play06:11

well-defined problem with a very

play06:12

well-defined solution but as we've

play06:15

iterated our selection algorithm to make

play06:16

it better against this you know guess

play06:18

newest heuristic involving output age

play06:20

you know we probably introduced more

play06:22

coin based outputs then some people

play06:24

would have liked so we made a slight

play06:25

modification to the algorithm where

play06:27

instead of just choosing a block and

play06:29

then yanking a decoy out of it which

play06:31

tends to give us more coin based outputs

play06:33

than fewer instead we actually look at a

play06:35

very small window around that particular

play06:37

block so our effectively increasing the

play06:39

size of the bin from which we get to

play06:41

choose our outputs and what that ends up

play06:42

meaning statistically is that we end up

play06:44

choosing fewer coin based outputs which

play06:46

kind of mitigates against this much

play06:48

smaller heuristic and that of course is

play06:50

not the only heuristic type you might

play06:51

come up with either so coin based

play06:53

outputs are one thing an adversary might

play06:54

use to look at to try to make guesses

play06:56

timing which we've worked on of course

play06:58

and have talked about might be one that

play07:00

a adversary might use um there's other

play07:02

ones for example if I have a transaction

play07:05

that has two different inputs each of

play07:07

those has a separate ring maybe the

play07:09

adversary is able to look at the

play07:11

different decoys and outputs that are in

play07:13

those rings and maybe the adversary will

play07:15

find that there's a transaction way back

play07:17

when in the blockchain that generated

play07:19

two different outputs and maybe one of

play07:21

those outputs appears in one of the

play07:23

inputs to my new transaction and the

play07:25

other output appears as an input to the

play07:27

other one again it's just a guess

play07:28

because it may have happened by chance

play07:30

but probably not the adversary might try

play07:32

to conclude that the outputs that were

play07:34

generated in a previous transaction are

play07:36

now being spent by me and might make

play07:38

some conclusions based on that again

play07:40

without external information a heuristic

play07:42

is not a proof but it gives the

play07:44

adversary something that they might try

play07:45

to guess so in general this is very very

play07:49

complex I will say right now it is

play07:51

pretty impossible to get rid of all

play07:53

possible heuristics so we can always

play07:55

make our selection algorithms better and

play07:57

as Justin pointed out and as I've kind

play07:58

of hinted at we have done this over time

play08:00

we iterate to get better and better a

play08:02

good way to think about this is

play08:04

something that Justin brought up in fact

play08:05

kind of with like a plugging of a whole

play08:07

analogy if you want to give that what

play08:08

you kind of liked yeah of course so um

play08:12

what an example like we we know of a

play08:14

specific heuristic for instance the the

play08:17

guessed newest heuristic might be an

play08:19

example so we can iterate Manero

play08:22

selection algorithm to help counter this

play08:25

sort of heuristic and the actual

play08:26

effectiveness of it but in doing so

play08:28

we're still choosing some other way to

play08:32

select outputs that people can't develop

play08:34

heuristics for so there's no limit to

play08:37

the number of heuristics that people can

play08:38

come up with they can continue making

play08:41

complicated heuristics over time pretty

play08:43

much no matter what we do so we're

play08:45

always plugging these holes that we're

play08:47

aware of and the biggest holes we know

play08:49

of but we might indirectly be making

play08:52

smaller holes we might

play08:54

making holes that were not necessarily

play08:55

aware of because maybe the heuristics

play08:57

haven't been conceived yet especially by

play08:59

participants in the Monaro community so

play09:01

this is definitely something that will

play09:04

need continuous improvement it needs

play09:07

continuous iteration in order to make it

play09:09

better to keep patching these holes

play09:11

you can't just pave a road and never

play09:13

expect to have potholes you have to

play09:14

suffer through it like the Minnesota

play09:16

winters like I have where you go and

play09:18

have to keep patching these potholes

play09:19

that keep appearing right they keep

play09:21

coming out and when you think you're

play09:23

done some trucks gonna drive over it and

play09:24

come up with and make a new one right so

play09:27

these these sort of circumstances keep

play09:29

happening apologies for that terrible

play09:30

analogy I'm trying to place terrain here

play09:33

but yeah we try to address the big ones

play09:35

first the example of the guest nuke uist

play09:38

but there might have been some

play09:39

consequences as an example by changing

play09:42

the selection algorithm to follow a more

play09:45

mathematical distribution we actually

play09:47

selected more of those coin based

play09:48

outputs and we needed to go back and

play09:50

sort of refine how we did this work was

play09:52

every improve was every iteration still

play09:54

an improvement overall from what we can

play09:57

see now it should be yes we addressed

play09:59

the existing heuristics and done more

play10:02

good than harm but there's always going

play10:04

to be some sort of trade-off that we're

play10:06

going to sort of keep playing with and

play10:09

so to speak yeah absolutely I mean we we

play10:12

definitely receive reports all the time

play10:14

about people who come up with you know a

play10:15

particular small pattern that they might

play10:17

see among certain transactions or

play10:19

outputs based on the way that we make

play10:20

our selections and some of those are

play10:22

very very small um doesn't mean that you

play10:24

know as optimal that we keep them in

play10:25

there but you know to some extent it's

play10:29

not necessarily always obvious how to

play10:30

make an absolute good change to counter

play10:34

some of those small heuristics without

play10:35

inadvertently kind of ruining the work

play10:37

that we've done for some of the much

play10:39

bigger heuristics so you know if we see

play10:41

a small heuristic pointed out and we

play10:42

don't change our algorithm because of it

play10:44

you know it doesn't mean that we are not

play10:46

concerned about those heuristics but it

play10:48

means that we always have to balance the

play10:49

good that we'd be doing by making such a

play10:51

change with the inadvertent harm that

play10:53

might be caused by it so it's it's

play10:55

always an arms race right financial

play10:57

privacy as a whole as you're probably

play10:58

learning from this video series is an

play11:00

arms race analysis only gets better over

play11:03

time and that's great you know just

play11:05

because we receive small reports

play11:06

sometimes and big reports other

play11:08

about different heuristics that come up

play11:10

doesn't mean we don't want to see them I

play11:11

love seeing those reports I love

play11:13

learning more about what other people

play11:14

are doing with this analysis but it just

play11:16

reminds me that it is an arms race

play11:17

analysis gets gets better we get better

play11:20

because of that you know that might

play11:22

invite more analysis which just has kind

play11:24

of this spiraling effect toward us

play11:25

getting better

play11:26

yes speaker speaking about spiraling

play11:29

effects towards getting better one of

play11:31

the great things about ring signatures

play11:32

is that the selection algorithm and the

play11:35

ring size sort of go hand in hand and

play11:37

sort of a positive or negative feedback

play11:39

loop it's supposed you're purposely

play11:41

making things worse but as Mineiro

play11:44

increases its ring size it sort of

play11:46

decreases the severe negativeness of

play11:50

perhaps a bad selection algorithm there

play11:52

are some limitations of a selection

play11:54

algorithm if you just keep picking more

play11:56

and more inputs for example right more

play11:58

and more decoys the you know

play12:01

shortcomings of a specific algorithm

play12:03

might decrease will or should ideally

play12:05

decrease meanwhile if you improve your

play12:07

selection algorithm you make better use

play12:10

of the decoys that you have so these two

play12:12

components are really critically

play12:15

important and having strong privacy in

play12:18

venero making the most out of his ring

play12:20

signatures because if you have a larger

play12:24

ring size with the terrible selection

play12:25

algorithm then you're not going to have

play12:27

great privacy because you're able to

play12:29

develop really strong here as six

play12:30

potentially and likewise if you have a

play12:32

really even if you had a some mechanism

play12:36

of having a perfect algorithm under

play12:38

every circumstance but you had a like

play12:41

really small ring size for example then

play12:43

you're also not great either so these

play12:44

things really critically work hand in

play12:47

hand at providing really the privacy

play12:50

that ring signatures offer it's more

play12:52

than just what they say they provide out

play12:54

of the box which is one out of inman

play12:57

arrows cases he's now 10 11 one out of

play12:59

11 are possibly spent it's all the

play13:02

additional metadata itami analysis

play13:04

coinbase metadata that is associated

play13:07

with this and so the selection algorithm

play13:09

needs to adjust over time to to

play13:11

compensate for this otherwise we could

play13:14

just pick the first 10 outputs that were

play13:16

ever generated on maneras blockchain and

play13:17

be like oh it's either the latest order

play13:19

of the first 10 and that's obviously not

play13:21

very

play13:22

so you know it's input selection

play13:25

algorithm is very important from

play13:27

narrowing signatures

play13:28

all right Sarang do you have any last

play13:29

closing thoughts to leave the viewer

play13:31

with just that our goal still remains to

play13:34

provide the best plausible deniability

play13:35

possible with ring signatures and over

play13:38

time we continue to learn about better

play13:39

and better ways to do that and so we

play13:41

keep iterating and iterating and

play13:42

iterating to get better and we're

play13:44

absolutely not perfect now but we

play13:46

continue to try to get better and better

play13:49

all right Thank You Sarang thank you

play13:52

everyone for watching this episode of

play13:54

breaking Manero we will catch you in the

play13:55

next one thank you

Rate This
β˜…
β˜…
β˜…
β˜…
β˜…

5.0 / 5 (0 votes)

Related Tags
MoneroRing SignaturesPrivacyAlgorithmDecoysRandom SelectionCryptocurrencyBlockchainHeuristicsFinancial Privacy