Close Menu
    What's Hot

    BlackRock’s IShares Bitcoin Trust Shatters ETF Growth Record, Surpassing $70 Billion In Just 341 Days

    Bitcoin retakes $108K as millionaire whale goes 20x long on BTC price

    BitMine Immersion Technologies Buys 100 Bitcoin In First Treasury Acquisition

    Facebook X (Twitter) Instagram
    MarketsNews.co.uk
    • Live Chart
    • Brokers
    • Scam Broker
    • Reviews
    • Tools
      • Lot Size Calculator
      • Margin Calculator
      • PIPS Calculator
      • Profit & loss calculator
    Facebook X (Twitter) Instagram
    Start Trading
    Trending Topics:
    • Markets
    • Stocks
    • Cryptocurrency
    • Forex
    • Scam Broker
    MarketsNews.co.uk
    • Markets
    • Stocks
    • Cryptocurrency
    • Forex
    • Scam Broker
    Cryptocurrency

    Wabisabi Deanonymization Vulnerability "Disclosed"

    Anthony M. OrbisonBy Anthony M. OrbisonDecember 9, 2024No Comments3 Mins Read
    Share Facebook Twitter Pinterest Copy Link Telegram LinkedIn Tumblr Email
    Share
    Facebook Twitter LinkedIn Pinterest Email

    GingerWallet, the fork of WasabiWallet maintained by former zkSNACKs employees after the shut down of the Wasabi coinjoin coordinator, has received a vulnerability report from developer drkgry. This vulnerability would allow the total deanonymization of users inputs and outputs in a coinjoin round, giving a malicious coordinator the ability to completely undo any privacy gains from coinjoining by performing an active attack.

    Wasabi 2.0 was a complete re-design of how Wasabi coordinated coinjoins, moving from the Zerolink framework utilizing fixed denomination mix amounts, to the Wabisabi protocol allowing dynamic multi-denomination amounts. This process involved switching from homogenous blinded tokens to register outputs to claim your coins back, to a dynamic credentials system called Keyed Verification Anonymous Credentials (KVACs). This would allow users to register blinded amounts that prevented theft of other users’ coins without revealing to the server plain-text amounts that could be correlated and prevent linking ownership of separate inputs.

    When users begin participating in a round, they poll the coordinator server for information regarding the round. This returns a value in the RoundCreated parameters, called maxAmountCredentialValue. This is the highest value credential the server will issue. Each credential issuance is identifiable based on the value set here.

    To save bandwidth, multiple proposed methods for clients to cross-verify this information were never implemented. This allows a malicious coordinator to give each user when they begin registering their inputs a unique maxAmountCredentialValue. In subsequent messages to the coordinator, including output registration, the coordinator could identify which user it was communicating with based on this value.

    By “tagging” each user with a unique identifier in this way, a malicious coordinator can see which outputs are owned by which users, negating all privacy benefits they could have gained from coinjoining.

    To my knowledge drkgry discovered this independently and disclosed it in good faith, but the members of the team who were present at zkSNACKs during the design phase of Wabisabi were absolutely aware of this issue.

    “The second purpose of the round hash is to protect the clients from tagging attacks by the server, the credential issuer parameters must be identical for all credentials and other round metadata should be the same for all clients (e.g. to ensure that the server isn’t trying to influence clients to create some detectable bias in registrations).”

    It was brought up in 2021 by Yuval Kogman, also known as nothingmuch, in 2021. Yuval was the developer to design what would become the Wabisabi protocol, and one of the designers in actually specifying the full protocol with ‪István András Seres‬.

    One final note is the tagging vulnerability is not actually addressed without this suggestion from Yuval as well as full ownership proofs bound to actual UTXOs as proposed in his original pull request discussing tagging attacks. All of the data being sent to clients isn’t bound to a specific round ID, so a malicious coordinator is still capable of pulling a similar attack by giving users unique round IDs and simply copying the necessary data and re-assigning each unique round ID per-user before sending any messages. 

    This is not the only outstanding vulnerability present in the current implementation of Wasabi 2.0 created by the rest of the team cutting corners during the implementation phase. 

    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
    Previous ArticleSeveral large blasts heard in Damascus
    Next Article Wall Street ends lower as tech stocks decline By Reuters
    Anthony M. Orbison
    • Website

    Related Posts

    BlackRock’s IShares Bitcoin Trust Shatters ETF Growth Record, Surpassing $70 Billion In Just 341 Days

    June 9, 2025

    Bitcoin retakes $108K as millionaire whale goes 20x long on BTC price

    June 9, 2025

    BitMine Immersion Technologies Buys 100 Bitcoin In First Treasury Acquisition

    June 9, 2025
    Leave A Reply Cancel Reply

    Amazon.com, Inc.
    $217.27
    $3.70
    1.73%
    Meta Platforms, Inc.
    $697.39
    $0.32
    0.05%
    S&P 500
    $6,016.88
    $16.52
    0.28%
    Alphabet Inc.
    $177.71
    $2.99
    1.71%
    EUR/USD
    $1.14
    $0.0035
    0.31%
    EUR/JPY
    $165.12
    $0.071
    0.04%
    USD/CAD
    $1.37
    $0.0014
    0.10%

    Risk Disclosure: Trading in financial instruments and/or cryptocurrencies involves high risks including the risk of losing some, or all, of your investment amount, and may not be suitable for all investors. Prices of cryptocurrencies are extremely volatile and may be affected by external factors such as financial, regulatory or political events. Trading on margin increases the financial risks.
    Before deciding to trade in financial instrument or cryptocurrencies you should be fully informed of the risks and costs associated with trading the financial markets, carefully consider your investment objectives, level of experience, and risk appetite, and seek professional advice where needed.
    Fusion Media would like to remind you that the data contained in this website is not necessarily real-time nor accurate. The data and prices on the website are not necessarily provided by any market or exchange, but may be provided by market makers, and so prices may not be accurate and may differ from the actual price at any given market, meaning prices are indicative and not appropriate for trading purposes. Fusion Media and any provider of the data contained in this website will not accept liability for any loss or damage as a result of your trading, or your reliance on the information contained within this website.
    It is prohibited to use, store, reproduce, display, modify, transmit or distribute the data contained in this website without the explicit prior written permission of Fusion Media and/or the data provider. All intellectual property rights are reserved by the providers and/or the exchange providing the data contained in this website.
    Fusion Media may be compensated by the advertisers that appear on the website, based on your interaction with the advertisements or advertisers.
    We're social. Connect with us:

    Facebook X (Twitter)
    • Home
    • About us
    • Contact
    • Disclaimer
    • Privacy Policy
    © 2025 Marketsnews.co.uk

    Type above and press Enter to search. Press Esc to cancel.