Monero people will tell you monero is untraceable but you can watch a video of chainalysis tracing it transaction by transaction. Here is the video: Here are the timestamps: 26:55 - Morphtoken to the perp 30:43 - Perp to ChangeNow or Liquid Exchange 32:49 - Perp to Exodus Wallet 35:08 - Perp to Exodus Wallet or mining pool 36:51 - Perp to Centralized Exchange or Merchant POS, this is how they nabbed him

Replies (27)

jfc why don't you try intellectual honesty and tell the people what *off chain* information is required for this to be possible? instead of just implying this is possible with any random tx πŸ™„
"I'm going to explain why I think Monero is super cool. It really is the frontline of the arms race between cryptographers and investigators like us...Monero has an incredible developer team they are always looking for weaknesses in their privacy protocols, and so they're really proactive in making their protocol the most secure and private that it can be. So theres just really interesting things happning here cryptographically and so that means we also have to do interesting things to *try* and track it." "I'm not feeling super confident about this" "It appears" "We believe" They basically only managed to trace it because the target used a chainalaysis node to broadcast their transaction + coordinating with centralized swap services + didn't hide their IP address. Who would've thought? πŸ€·β€β™‚οΈ Remove any one of those 3 and they wouldn't have been able to.
Anything going thru the internet is traceable. This monero vs bitcoin is silly already.
When Fluffy Pony got arrested in South Africa and the whole Magic Crypto Friends broke up and quietly went their separate way And , no one said a word about it that was my clue Monero was compromised
You continue to spread FUD and lies and demonstrating your ignorance about Monero. That debate you did with Luke moderated by Seth was painful to listen to, but I managed to sit through the whole thing, only to hear you repeatedly twist words and attempt to deceive the audience, in very much the same way you are doing here. Both Luke and Seth were very patient with you indeed. You were not arguing in good faith. Where Monero and Bitcoin are both accepted it tends to overtake Bitcoin, Lightning or no Lightning - in fact, for some reason, Lightning payments always seem to pale in comparison to onchain bitcoin payments when those stats are published (shopinbit, @npub1l49c...62g8, @Mynymbox - Privacy friendly hosting solutions, etc) Where anonymity and privacy are an absolute must (DNMs) the market uniformly chose Monero. This is undeniable, the facts speak for themselves. You demonstrate the hubris and arrogance of the central planner, when you assert to know better than the people whose very freedom is at stake, concerning which is the better tool for the job. The market has already chosen, and it isn't Lightning. Sorry. You want the truth to be something else, and it isn't, but your ideological dogma prevents you from seeing it. I want to use the better tool for the job. Today that's #monero. If tomorrow it's something else, I'll switch. Hint: it's probably not gonna be the tech endorsed by Blackrock.
There is no public data about lightning transactions. They can insert nodes in the network, but the data will be like those dandilion ip traces. The fees are whatever their nodes ask for, not what the sender chooses. The amount is slightly obfuscated in that there will be fees to account for, but that's probably the most revealing thing they can learn about. If they are exit nodes, the fees might help them identify that, but not sure how they identify that they are entry nodes. After all that, there is very little they can ask an exchange for when they want more info about a payment UNLESS the payment originated from that exchange. But a payment to an exchange is practically a blind payment for them.
A one time stealth address as far as I can tell is just using a unique address each time... Something bitcoiners should be doing already, that wallets already push for. Breaking the tx graph is done with the ring signatures, but even that is not perfect as shown in the video. It's pretty damn good to be clear, but it does leave breadcrumbs.
point taken. those stealth addresses appear on chain in the ring signatures and theres no way of knowing if theyre decoys or not (unless The Adversary has control of the sending wallet, as in the video). the combination of the two break the txgraph and are pretty different from just using unique addresses on a transparent chain. but yeah its a Blockchain and there's information recorded that can be analyzed.
atori's avatar
atori 1 year ago
Churning your outputs just one time already significantly increases privacy.
Most battle-tested privacy coin. Largest development in the space aside from Bitcoin and Ethereum.
You can do that with Bitcoin but doesn't make economic sense to do with smaller payments. It will likely get eaten up by tx fees when you go to spend it. Moneros blockchain also enforces it. You can't accidentally re-use the same stealth address even if you try. Not being able to perform amount analysis doesn't hurt either.
tell me you dont understand open source software without telling me you dont understand open source software πŸ™„
It doesn't really make economic sense to use on-chain with smaller payments in general. Sending small amounts to a single address doesn't make a bigger utxo, so you still have dust, just all at the same address. Lightning solves for that at least.
It does make sense on Monero Yes, Lightning does solve that (although it brings new issues), but I though we were talking about on-chain addresses
↑