@@ -66,7 +66,7 @@ Next, transactions are forwarded along this privacy graph during the "stem
66
66
phase." Finally, messages are broadcast to the network during the "fluff phase"
67
67
using the typical method of diffusion.
68
68
69
- [[File :bip-dandelion /1-dandelion.png |framed|center|alt=An illustration of Dandelion routing|Figure 1 ]]
69
+ [[File :bip-0156 /1-dandelion.png |framed|center|alt=An illustration of Dandelion routing|Figure 1 ]]
70
70
Figure 1
71
71
72
72
In order to select the privacy graph in a decentralized manner, each node
@@ -94,7 +94,7 @@ fingerprint attack allowing network-level botnet adversaries to achieve total
94
94
deanonymization of the P2P network after observing less than ten transactions
95
95
per node.
96
96
97
- [[File :bip-dandelion /2-attack.png |framed|center|alt=An illustration of a fingerprint attack|Figure 2 ]]
97
+ [[File :bip-0156 /2-attack.png |framed|center|alt=An illustration of a fingerprint attack|Figure 2 ]]
98
98
Figure 2
99
99
100
100
During a fingerprint attack, a botnet-style adversary with knowledge of the
@@ -104,7 +104,7 @@ attack, the adversary collects transactions at its spy nodes and matches these
104
104
observations to the simulated fingerprints. Our simulations have shown that this
105
105
attack results in devastating, network-wide deanonymization.
106
106
107
- [[File :bip-dandelion /3-attack-plot.png |framed|center|alt=A plot illustrating total deanonymization|Figure 3 ]]
107
+ [[File :bip-0156 /3-attack-plot.png |framed|center|alt=A plot illustrating total deanonymization|Figure 3 ]]
108
108
Figure 3
109
109
110
110
To avoid this issue, we suggest "per-inbound-edge" routing. Each inbound peer is
@@ -123,7 +123,7 @@ words, adversary knowledge is limited to the case of one observed message rather
123
123
than a rich profile of multiple transaction paths. Dandelion also breaks the
124
124
symmetry of diffusion, making the source of the transaction difficult to infer.
125
125
126
- [[File :bip-dandelion /4-dandelion-plot.png |framed|center|alt=A plot illustrating limited deanonymization|Figure 4 ]]
126
+ [[File :bip-0156 /4-dandelion-plot.png |framed|center|alt=A plot illustrating limited deanonymization|Figure 4 ]]
127
127
Figure 4
128
128
129
129
After a transaction has traveled along a Dandelion stem for a random number of
@@ -280,10 +280,10 @@ referencing Dandelion transactions.
280
280
==Implementation ==
281
281
282
282
A reference implementation is available at the following URL:
283
- https://github.com/mablem8 /bitcoin/tree/dandelion-feature-commits
283
+ https://github.com/dandelion-org /bitcoin/tree/dandelion-feature-commits
284
284
285
285
All features have been compressed into a single commit at the following URL:
286
- https://github.com/mablem8 /bitcoin/tree/dandelion
286
+ https://github.com/dandelion-org /bitcoin/tree/dandelion
287
287
288
288
==Compatibility ==
289
289
0 commit comments