Commit Graph

  • 14db294657 add clarification on where Tor is inserted for Zcash master Chelsea H. Komlo 2020-09-01 13:45:44 -0400
  • 9204445de8 add clarification on where Tor is inserted for Zcash Chelsea H. Komlo 2020-09-01 13:45:44 -0400
  • bf122426a0
    Zcash Network Privacy Assessment (#1) Chelsea Komlo 2020-08-31 22:28:08 -0400
  • e4a4de2a3d update terminology Chelsea H. Komlo 2020-08-31 19:54:06 -0400
  • 73e1047a03 fixups from review Chelsea H. Komlo 2020-08-31 18:41:55 -0400
  • d0133b50a4 touch up analysis Chelsea H. Komlo 2020-08-30 19:05:27 -0400
  • 9749577361 slight wording tweak Chelsea H. Komlo 2020-08-27 16:18:14 -0400
  • 4aa84072d5 add updated pdf Chelsea H. Komlo 2020-08-27 15:34:05 -0400
  • 03a914dc4a tweak recommendations Chelsea H. Komlo 2020-08-26 14:11:22 -0400
  • b28079112a clarify observations Chelsea H. Komlo 2020-08-24 12:14:00 -0400
  • 5d41266ec3 additional citation and detail Chelsea H. Komlo 2020-08-24 11:53:29 -0400
  • 7450799a7a emphasize end to end Chelsea H. Komlo 2020-08-13 18:52:56 -0400
  • 83b08b695b add block access pattern analysis Chelsea H. Komlo 2020-08-11 17:28:41 -0400
  • ed31d6c690 clean up threat analysis a bit more Chelsea H. Komlo 2020-08-08 23:39:06 -0400
  • e85bfa33ed tweak section Chelsea H. Komlo 2020-08-08 19:26:16 -0400
  • 3ffa24ea70 again, shift some analysis Chelsea H. Komlo 2020-08-08 19:13:06 -0400
  • 5588411055 light touchups Chelsea H. Komlo 2020-08-08 19:08:32 -0400
  • 7737226b53 shift some analysis around Chelsea H. Komlo 2020-08-08 17:29:35 -0400
  • 353366bdb4 change to network privacy assessment Chelsea H. Komlo 2020-08-04 11:01:54 -0400
  • 964a80a008 clean up analysis Chelsea H. Komlo 2020-08-03 15:17:01 -0400
  • fd6a6d2e22 specify use of shielded transactions in analysis Chelsea H. Komlo 2020-08-03 12:08:21 -0400
  • b69f30c7b4 update table and analysis Chelsea H. Komlo 2020-08-03 12:00:44 -0400
  • dc18a053d2 update table Chelsea H. Komlo 2020-08-03 11:10:21 -0400
  • 49e1d442f9 updated pdf Chelsea H. Komlo 2020-08-03 11:03:06 -0400
  • 9a74b046f3 start to clean up older analysis Chelsea H. Komlo 2020-07-31 21:23:41 -0400
  • 1cc499c07c update organization Chelsea H. Komlo 2020-07-31 21:13:49 -0400
  • c4be7581bb edits to introduction Chelsea H. Komlo 2020-07-31 21:10:37 -0400
  • a2c307cbb5 add additional threats to out of scope Chelsea H. Komlo 2020-07-31 20:06:34 -0400
  • 1a314765d0 flesh out observations; remove prior fingerprinting analysis Chelsea H. Komlo 2020-07-31 18:58:23 -0400
  • b2bc729e81 add observations Chelsea H. Komlo 2020-07-31 18:43:09 -0400
  • 6c82085da9 additional analysis Chelsea H. Komlo 2020-07-28 17:54:59 -0400
  • a62ad664a6 additional analysis Chelsea H. Komlo 2020-07-28 15:49:33 -0400
  • d89018b934 add updated pdf Chelsea H. Komlo 2020-07-27 12:09:44 -0400
  • 8c0a8389f5 analysis for zcash shielded next steps Chelsea H. Komlo 2020-07-25 23:04:12 -0400
  • e2337ac3bc add sketch of conclusion Chelsea H. Komlo 2020-07-25 13:31:20 -0400
  • b468cf3812 add clarifications for shielded transaction use Chelsea H. Komlo 2020-07-25 13:24:04 -0400
  • ca3704461f add analysis for unshielded case and plan to address Chelsea H. Komlo 2020-07-25 13:16:23 -0400
  • 2ca30056e9 fixups from henry feedback Chelsea H. Komlo 2020-07-10 17:04:28 -0400
  • d97cd977c1 written up analysis Chelsea H. Komlo 2020-07-10 16:02:40 -0400
  • 09effd3f5f tweak results Chelsea H. Komlo 2020-07-10 15:50:48 -0400
  • f24f334b7d add pir background Chelsea H. Komlo 2020-07-10 14:41:37 -0400
  • ca9e1a43e8 update notes for privacy analysis Chelsea H. Komlo 2020-07-10 11:24:54 -0400
  • f15cc26939 update table with additional scenarios Chelsea H. Komlo 2020-07-07 18:35:12 -0400
  • dc5b273f6e updated pdf Chelsea H. Komlo 2020-07-07 17:30:28 -0400
  • c705f482be fix up table Chelsea H. Komlo 2020-07-07 11:53:26 -0400
  • 48499c7ffc add rough sketch for light wallet setting Chelsea H. Komlo 2020-07-07 10:46:26 -0400
  • 89465ce887 add sketch of analysis for full node setting Chelsea H. Komlo 2020-07-07 10:16:18 -0400
  • 6ab1d092c9 dandelion notes Chelsea H. Komlo 2020-07-02 17:54:50 -0400
  • fdd14155a1 more results tweaks Chelsea H. Komlo 2020-07-02 14:31:34 -0400
  • 16f54e9782 re-worked table Chelsea H. Komlo 2020-07-02 14:04:18 -0400
  • 7bde83425b updated pdf Chelsea H. Komlo 2020-07-01 19:23:37 -0400
  • 835e75dc1d add additional header Chelsea H. Komlo 2020-07-01 18:45:58 -0400
  • f3edd2c0f9 take out unused header Chelsea H. Komlo 2020-07-01 18:41:52 -0400
  • 65d95f98dc update findings Chelsea H. Komlo 2020-07-01 18:38:13 -0400
  • 6ba9cef4a1 wip re-work of threat analysis Chelsea H. Komlo 2020-07-01 17:28:27 -0400
  • a6b6a4bdc7 further details on epistemic attacks Chelsea H. Komlo 2020-07-01 16:54:05 -0400
  • d293191f14 add analysis structure Chelsea H. Komlo 2020-06-28 20:04:59 -0400
  • 4ffb244a30 fix up compile error Chelsea H. Komlo 2020-06-28 19:59:02 -0400
  • 612bd52ff9 expand table to distinguish between two cases Chelsea H. Komlo 2020-06-26 20:39:08 -0400
  • a72ccd2eb4 add placeholder table Chelsea H. Komlo 2020-06-26 19:16:32 -0400
  • 4f802831d5 add loopix and update pdf Chelsea H. Komlo 2020-06-26 18:49:27 -0400
  • bcbd27d8af add description of tor Chelsea H. Komlo 2020-06-26 17:39:41 -0400
  • 65626ac0c6 add description for dandelion Chelsea H. Komlo 2020-06-26 16:16:49 -0400
  • 34d7f2abe7 add in system citation Chelsea H. Komlo 2020-06-26 16:08:08 -0400
  • 1bb06226a7 add paragraph about block access patterns Chelsea H. Komlo 2020-06-22 16:53:27 -0400
  • dc579b3094 tweak some details Chelsea H. Komlo 2020-06-08 20:40:24 -0400
  • a0c28bab65 fix up broken refs Chelsea H. Komlo 2020-06-05 23:02:52 -0400
  • dba2389fe6 add in readme Chelsea H. Komlo 2020-06-05 23:01:51 -0400
  • 7523904564 add in additional background Chelsea H. Komlo 2020-06-05 23:01:33 -0400
  • 3b86074349 add in additional out of scope items Chelsea H. Komlo 2020-06-05 22:41:33 -0400
  • f128da78ee typo Chelsea H. Komlo 2020-06-04 18:38:34 -0400
  • e475b0db53 fix up citation Chelsea H. Komlo 2020-06-04 18:26:38 -0400
  • 06dc99754d commit pdf to repo Chelsea H. Komlo 2020-06-04 18:23:13 -0400
  • 8d67739fae additional citation Chelsea H. Komlo 2020-06-04 18:16:31 -0400
  • cef29a0aab add citations for dandelion and bitcoin network privacy deanon attack Chelsea H. Komlo 2020-06-04 16:57:08 -0400
  • 2b4ba9b471 slight touch ups Chelsea H. Komlo 2020-06-04 16:50:11 -0400
  • 128f4b0a71 add in organization and comments Chelsea H. Komlo 2020-06-04 16:42:59 -0400
  • 901903a379 add in rough draft for adversarial model Chelsea H. Komlo 2020-05-29 22:40:05 -0400
  • b25034ad5a adding in information leaks Chelsea H. Komlo 2020-05-29 19:26:38 -0400
  • 49e8b6fbde clean up wording for tech report Chelsea H. Komlo 2020-05-29 12:16:21 -0400
  • d71773155e initial commit for threat model analysis Chelsea H. Komlo 2020-05-28 16:30:04 -0400
  • 18b7b56fa8 initial commit Chelsea H. Komlo 2020-05-28 16:08:50 -0400