diff --git a/open-research-problems.md b/open-research-problems.md index 35726d2..bb60bf5 100644 --- a/open-research-problems.md +++ b/open-research-problems.md @@ -126,13 +126,13 @@ The goal is this research problem is to investigate and develop an asynchronous, Mimblewimble/Grin leverage [confidential transactions](https://en.bitcoin.it/wiki/Confidential_transactions) to hide the identity of the sender and recipients. As such, there are no public amounts or addresses. -However, it is possible for someone listening on the network to build a transaction graph and possibly clustering entities together. +However, it is possible for someone listening on the network to build a transaction graph and possibly cluster entities together. Ivan Bogatyy has shown this in practice, being able to [link 96% of Grin transactions](https://github.com/bogatyy/grin-linkability) broadcasted during the run of his experiment. -Techniques like [Dandelion++](https://arxiv.org/abs/1805.11060) mitigate this issue but are insufficient for a privacy coin. +Grin implements a [Dandelion++](https://arxiv.org/abs/1805.11060) inspired transaction propagation technique, which, besides the main goal of hiding the source IP address, also aggregates transactions during the stem phase. Unfortunately it cannot aggregate enough transactions to obscure the transaction graph and meaningfully reduce the linkability. -A much more promising design is this Mimblewimble [CoinSwap proposal](https://forum.grin.mw/t/mimblewimble-coinswap-proposal) +A much more promising design is the [Mimblewimble CoinSwap proposal](https://forum.grin.mw/t/mimblewimble-coinswap-proposal). -The goal of this research is to investigate ways to obfuscate the Grin transaction and implement such design. +The goal of this research is to investigate ways to obfuscate the Grin transaction graph and implement such design. ### Relevant Papers