Skip to content

Commit b44239a

Browse files
authored
Merge pull request bitcoin#710 from dandelion-org/dandelion-rebase2
BIP 156: rename figure filenames [trivial]
2 parents d8ba7da + dfd59bb commit b44239a

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

bip-0156.mediawiki

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ Next, transactions are forwarded along this privacy graph during the "stem
6666
phase." Finally, messages are broadcast to the network during the "fluff phase"
6767
using the typical method of diffusion.
6868

69-
[[File:bip-dandelion/1-dandelion.png|framed|center|alt=An illustration of Dandelion routing|Figure 1]]
69+
[[File:bip-0156/1-dandelion.png|framed|center|alt=An illustration of Dandelion routing|Figure 1]]
7070
Figure 1
7171

7272
In order to select the privacy graph in a decentralized manner, each node
@@ -94,7 +94,7 @@ fingerprint attack allowing network-level botnet adversaries to achieve total
9494
deanonymization of the P2P network after observing less than ten transactions
9595
per node.
9696

97-
[[File:bip-dandelion/2-attack.png|framed|center|alt=An illustration of a fingerprint attack|Figure 2]]
97+
[[File:bip-0156/2-attack.png|framed|center|alt=An illustration of a fingerprint attack|Figure 2]]
9898
Figure 2
9999

100100
During a fingerprint attack, a botnet-style adversary with knowledge of the
@@ -104,7 +104,7 @@ attack, the adversary collects transactions at its spy nodes and matches these
104104
observations to the simulated fingerprints. Our simulations have shown that this
105105
attack results in devastating, network-wide deanonymization.
106106

107-
[[File:bip-dandelion/3-attack-plot.png|framed|center|alt=A plot illustrating total deanonymization|Figure 3]]
107+
[[File:bip-0156/3-attack-plot.png|framed|center|alt=A plot illustrating total deanonymization|Figure 3]]
108108
Figure 3
109109

110110
To avoid this issue, we suggest "per-inbound-edge" routing. Each inbound peer is
@@ -123,7 +123,7 @@ words, adversary knowledge is limited to the case of one observed message rather
123123
than a rich profile of multiple transaction paths. Dandelion also breaks the
124124
symmetry of diffusion, making the source of the transaction difficult to infer.
125125

126-
[[File:bip-dandelion/4-dandelion-plot.png|framed|center|alt=A plot illustrating limited deanonymization|Figure 4]]
126+
[[File:bip-0156/4-dandelion-plot.png|framed|center|alt=A plot illustrating limited deanonymization|Figure 4]]
127127
Figure 4
128128

129129
After a transaction has traveled along a Dandelion stem for a random number of
@@ -280,10 +280,10 @@ referencing Dandelion transactions.
280280
==Implementation==
281281

282282
A reference implementation is available at the following URL:
283-
https://github.com/mablem8/bitcoin/tree/dandelion-feature-commits
283+
https://github.com/dandelion-org/bitcoin/tree/dandelion-feature-commits
284284

285285
All features have been compressed into a single commit at the following URL:
286-
https://github.com/mablem8/bitcoin/tree/dandelion
286+
https://github.com/dandelion-org/bitcoin/tree/dandelion
287287

288288
==Compatibility==
289289

0 commit comments

Comments
 (0)