Techleaks24 🇵🇸
585 subscribers
97 photos
7 videos
87 links
For the patient and well researched investor.
Download Telegram
A few words on Binance whose recent actions seem to have caught many by surprise. Binance's Chief Compliance Officer is Noah Perlman, the son of Itzhak Perlman, a world famous violinist who had at least a patronage relationship with Jeffrey Epstein. Epstein spent $300-$400k to build a lodge for Noah's father that was later reported to have been used as lair to recruit young girls in Interlochen's Center for the Arts in Michigan. Early in his career Noah worked as coordinator for crimes against children for the DOJ. Then as his career advanced, he moved towards financial services. In the final pre-COVID years he spoke publicly about the importance of financial surveillance to contain populism.

Businesses like Binance are surveillance nodes. If you haven't noticed yet, when these surveillance nodes reach a certain scale they start attracting people like Noah Perlman who have a certain background (ex-law enforcement with an Epsteinian backdoor) and certain views (financial surveillance & control).
🤯5💯3
If we're to believe the official story, Cassie Heart, the founder of Quilibrium, is rejecting VC offers because they all want to engage in token warrants. Instead, she is looking for sophisticated investors who believe in Quilibrium's long term value creation capabilites and are willing to invest without asking for tokens in return. One can't help but wonder, is she bluffing and if not, what kind of VC invests without requesting tokens in return? There are 2 possible explanations:

1) Cassie is well aware of the centralized essence of her project but also very ambitions, so by sophisticated she means investors with a surveillance & control agenda (like Peter Thiel or Microsoft proxy funds). To put it in deep state jargon, she is looking for access into elite money. I think that's possible but not really plausible. Aside from those I can't think of any other kind sophisticated investors, that peddle in crypto, that are willing to put money in projects without token warrants. Unless, of course, they have a special relationship with the founder (like the one hinted in my tongue-in-cheek bullish tweet this morning).

2) Conspiracies and memes aside, the most likely explanation, in my opinion, is that Cassie has already raised enough seed and most of the money has been invested in a mining operation. The plan is to mine as much as possible of the coin early on while posturing as anti-VC and keeping a low profile to avoid attracting too much attention and competition. This is to make sure that her mining operation gets most of the supply now that rewards are high.

Privacy, decentralization and fair launch are just marketing buzzwords here. Quilibrium can't really claim a fair launch because there is no open source code of the mining algo and there is no fixed emissions curve. So insiders obviously have a huge edge. It can't claim to be a privacy project because it's scope is data hoarding and processing. But their launch strategy reminds me a lot of Kaspa, whose team received $8M in funding that was used to set up a mining operation. And, as they mined, they kept advertising the project as a hobby to outsiders. Just like with Kaspa early on, there are no official Quilibrium social media channels, everything seems community run and even the Telegram group where Cassie hangs out is private. So what do I think of Quilibrium? I think that it's another crypto experiment worth keeping an eye on because it has a strong community where most seem to be drinking the kool aid.
👍2
Are crypto publications like Glassnode being used by big funds to manipulate markets? 2024 is a halving year, so it's similar to 2016 and 2020. But in this week's analysis of onchain data, which reminded me of why I cancelled my subscription a long time ago, Glassnode insinuates that btc is behaving like in 2019. They see similarity in 3 onchain metrics: 1) STH relative unrealized losses; 2) LTH/STH-supply ratio; 3) sell-side risk ratio. STH refers to the unrealized losses of short term holders, or people who bought bitcoin in the last 6 months. Currently STH unrealized losses are mainly in the sub 10% range, typical of post halving consolidation periods. In 2019 STH-UL oscillated between 18-29% in Q4 when there was a major capitulation event. 2024 is behaving like other halving years, see 2016 and 2020. In 2020 we can discard the covid spike because it was due to an outlier event. Same for LTH/STH supply ratio.
2
Just like in the previous 2 halving years, the ratio went down (as long term holders took profit in the pre-halving rally), moved up as price consolidated and new holders graduated into the long term holder cohort, and then moved down again when the post halving rally (parabolic phase) kicked in and long term holders took profit again. Finally they mention the sell side risk ratio, which is meaningless other than to confirm the ongoing consolidation and that those selling have been doing so around break even. What else to say? That one should probably bookmark Glassnode's analysis (week 36 2024) as a blatant example of market manipulation. 2019 is mentioned 3 times, 2020 not even once.
1
Media is too big
VIEW IN TELEGRAM
For a long time I've argued that Dero offers state of the art privacy, superior even to that of Monero. Monero is traceable through a process known as key image triangulation. This was passingly stated once by Captain in the Dero Discord without further elaboration. With more research, and upon familiarizing myself with the Lazarus' wannacry XMR tracing case, I came up with a mental model of how it coud work and posted many tweets on the attack vector. Other Monero KOLs however rejected my claims as "FUD" because they rested on TXO and key image analysis, and "EAE is well known & key images are indistinguishable". In reality TXO analysis goes well beyond EAE. Today we finally have proof of that. Here is a video of a chain analysis investigator explaining how Monero chain analysis works. This video was recorded in August 2023. Everything I have said so far on this topic turns out to be 100% true.
🔥11👏5🤡1
This media is not supported in your browser
VIEW IN TELEGRAM
Here is a clip that I have cut from the Chainalysis video presentation. This part proves how Chainalysis traced monero TXOs for 4 hops, and they could have probably gone on for another 14 hops if required. Therefore Monero TXOs are traceable just like Bitcoin UTXOs. And the vulnerability is not IP address tracking but key image analysis that allows Chainalysis's tool to rule out transactions where an output is used as decoy versus the transaction where the output is actually spent. That allows forward tracing indefinitely. Like I've been saying for a few days now, Monero has just been proven to be completely obsolete and transparent. For those who follow me and know Dero well, this is not really news. We are seasoned crypto users who do their homework regularly. Many others however will have to choose between denial and rationality. And I wouldn't want to be in their place right now, I can tell you that.
🔥13🤡3👍2👎2💩1🤣1
Key image analysis is a fascinating riddle from an intellectual point of view, although it's catastrophic for Monero (bc very easy to solve, especially with AI). Many seem to still not understand how KI analysis works so here is another attempt at clarifying it in simple terms. Monero uses the UTXO accounting model, but with a layer of Pedersen Commitments on top. All these UTXOs are then updated quasi-homomorphically by addition and substraction (because PCs have homomorphic properties). So far so good. If not that the structure of Monero is such that being UTXO it must prevent that these UTXOs are spent twice, and for that key images are used. There is no layer on top of key images in Monero, we see them naked as they are in each transaction. Their whole function of preventing double spends depends on them being easily queryable, so the network can detect DS attempts quickly (whenever the same key image appears in 2 transactions). The amount of key images in a transaction tells us the amount of UTXOs that are being spent in that transaction. So each monero transaction consists of a number of key images (1, 2, 3...or higher for consolidation transactions) that is equal to the number of inputs being spent in the transaction, 16 TXOs attached to each key image (among them hides the real TXO belonging to that key image) and transaction outputs (most of the time 2, one the sender's change and the other being receiver's TXO). The riddle is to find out for as many transactions as possible which TXOs belong to the key images present in that transaction. Since these TXOs are used continuously by the network as decoy, by exposing the key image of as many TXOs as possible we can rule them out as decoy in other transactions where they appear but their key image doesn't appear. This is where many Monero enthusiasts get lost, they think to start mapping key images to TXOs we need to solve the DDH problem. To visualize how we can map TXOs to key images without breaking the DDH problem we must simply think that TXOs have metadata: entity they are associated with (referencing centralized party data but not only), blockheight when they were produced, IP that broadcasted them (if user wasn't running a node), fee structure and so on. So an AI can look for subtle patterns in TXO metadata, and whenever TXOs that seem related to the same entity appear among inputs of the same transaction it is highly likely that those are the TXOs being spent. A common pattern human investigators look for is TXOs associated with the same entity as defined by CEX data, but an AI can look for deeper patters in fee structure, propagation time, block height and so on and so forth identifying many pairs or groups of TXOs related to the same people even without knowing who these people are (because they never used a CEX). The key vulnerability here is that the UTXO model fragments user balances in smaller parts allowing for patterns to emerge. Since it's highly unlikely that TXOs belonging to the same entity appear among inputs as decoys, detecting related TXOs allows unmasking their key images in transactions where they appear together. And then it allows mapping even more key images to their real TXOs by excluding the related TXOs that we know have already been spent. Since Monero has no smart contracts, and users have to go through CEXes, an AI is helped massively by CEX data where CEXes report their transactions with their spent TXOs. Since these TXOs appear as decoy in many other transactions, having a database of them accelerates deanonymization further. This is why all Monero transactions up to today should be considered deanonymized, the key vulnerability here is the UTXO accounting model and the presence of key images which allow us to have onchain proof of when a TXO is spent, exposing it as decoy in other transactions where its key image is not present. Contrary to Monero, Dero uses the account model and has both sender and receiver privacy. Dero accounts are updated homomorphically, so one can't spot "related ring members" in dero. And there
👍13👎52
are no key images, so even if we know that a certain account was a spender in a certain transaction, we have no way of knowing when that account is spender or decoy in other transactions where it appears among spenders or receivers (Monero TXOs can be spent only once, and when spent their key image must be included in the transaction). Because, contrary to Monero, Dero has receiver rings too. So there is no "receiver TXO" we can associate to an entity. We've got no clue which of the 16/32/128 ring members is the actual receiver. And finally Dero also has smart contracts, which gives users much more autonomy and makes them less dependent on centralized third parties.
👍6👎31
The curious case of Rui Siang Lin. Lin was identified as the owner and operator of the darknet Incognito market. Incognito exit scammed in early March 2024, and as if that was not enough, few days later it started mass extorting its own users (in yes this is an extortion style) threatening to dump all their chat records by the end of May unless they paid a fee ranging from $100 to $20k. They also had a status page where concerned buyers could check if the vendors they had bought from had paid the extortion fee (in green) or not (in red). If red, that meant the buyer information of those who bought from that vendor was at risk of being leaked to law enforcement. Lin was identified as the owner and main operator of Incognito and was arrested in May 20th 2024. From Lin's indictment we learn that what led investigators to him was one of his Namecheap accounts which received funds from one of Incognito's BTC wallets to buy a domain in early 2022. In the indictment there are also strong amount correlations through the years between the amount of cryptocurrency deposited in Lin's CEX accounts and the growth in Incognito's trade volume (the platform took 5% from every sale). Overall this adventure netted Lin ~$4.5M in profits. Based on the information published in the indictment it is clear that it wasn't Monero that gave away Lin, but bad opsec.

There is however a curious event that took place in early March, when Incognito started extorting its own users: the Monero network was flooded with spam transactions. Those who heard my X space from last week, will remember that I spoke of how deanonymizing monero basically boils down to the fact that there are no valid decoys and the decoy algo is fed huge amounts of burnt TXOs. This is because protocol simply burns its own decoys. Those who listened will also remember that I explained how this vulnerability is unfixable and any attempts to upgrade the algo into picking better decoys are like the blind man asking the deaf man for directions. The reason is simple, there will never be any good decoys in Monero because TXOs are spent sooner or later. When spent their key image is published somewhere onchain and then mapped to them through key image analysis. Since TXOs can be spent only once, mapping their key image definitively burns the TXO. So unless one addresses the core vulnerability, that is the UTXO accounting model, any patches will always be easily bypassable. For example, I explained how the algo was updated to prioritize recency when picking TXOs as decoys but one can then use this 'upgrade' to trace transactions live as they happen by simply spamming the blockchain with a high number of transactions with something like a transaction gun or a monero mixer. The spammer would control all of the TXOs of these transactions, and if these TXOs make up 99% of the TXO volume, then the decoy algo has a 99% chance of picking decoys from spammers' TXOs. This would therefore allow the spammer to filter out decoys even more quickly, without having to wait for TXOs to get burnt. This specific attack vector in monero is known as the black marble attack. The curious timing of the transaction spam strongly suggests that in March we witnessed an important instance of a black marble attack. The amateurs and wishful thinkers will of course find another explanation that confirms their bias that Monero is private. So in the next post I will include a few images related to this case and, among others, a chart that shows the timing of the spam. The evidence is simply too strong and leaves no room for personal opinions.
👍5💯2
The first image is from the a Monero cross chain swap FixedFloat that advertises itself as non custodial, yet it confiscated 1 BTC from Lin because of a "partner exchange". Worth bringing it up here because it is a reminder that nothing on Monero is non custodial. This will always be the case with Monero cross chain solutions because Monero does not have smart contracts. The other 2 screenshots are from the extortion message and the payment status page. The final image is from transaction spam in March-April 2024 that coincided with the time window when the extortion payments took place, highly likely to be a black marble attack.
💯5👍1
5 RULES TO MAKE TRACING YOUR MONERO MORE DIFFICULT

Despite being obsolete as tech, Monero is still the ‘privacy’ coin with the most liquidity out there. Since some may be forced to use it while liquidity catches up with Dero’s better tech, here is a list of best practices that make tracing your Monero more difficult (albeit not impossible):

1. When you buy, always split in as few transactions as possible. If you can, buy all at once and do not split your transactions at all. If you split then you will be creating multiple TXOs associated to yourself which makes tracing much easier and cheaper. Even if you’ve no adversaries, you’d still be making deanonymization of other people’s transactions more difficult.

2. Use different non-KYC exchange accounts with different emails/metadata to deposit/sell different TXOs. Do not combine or spend all your TXOs in one place, or they will all be associated to you. Even if you’ve no adversaries, you’d still be making deanonymization of other people’s transactions more difficult.

3. Do not transact in times of network spam. If the network is getting spammed then that’s most likely a black marble attack which means deanonymizing any transactions that take place during the spam is much easier and cheaper than usual. All you have to do is sit it out, wait for the spam to end, then wait another 3-6 months after the spam so the spammy TXOs get old. Then do your transaction.

4. Consolidate and then churn with 1 month time gaps. If your balance is split among different (U)TXOs then most likely those TXOs have been picked up by some AI algo and associated to a single entity (you in this case). To break up any links then first consolidate your TXOs. After you consolidate your entire balance will be located in one TXO. Be careful though, this TXO is earmarked as belonging to the same entity as your previous TXOs so it’s very important that you churn it. For churning to work it’s important that the churning transaction is not too close in time to the consolidation transaction, otherwise an AI will know you’re churning. So wait ~1 month and send your entire balance to another one of your TXOs. If you do this every month for 4/5 times then it will be much more difficult to connect your final TXO to the parent TXOs. Even if you’ve no adversaries, you’d still be making deanonymization of other people’s transactions more difficult.

5. Don’t use Monero as cash. Avoid tipping, websites like Monezon or other reckless behaviours associated with cash use. If used as cash Monero ends up deanonymizing all its own transactions. So it’s key to discourage others as well from using it as cash. For example, anyone accepting tips in Monero is creating hundreds of TXOs associated to themselves. These TXOs are very bad decoys and will be used to deanonymize other people’s transactions. Or by using a website like Monezon you would be adding even more metadata to your TXOs, some of which KYC grade. Even if you’ve no adversaries, you’d still be making deanonymization of other people’s transactions more difficult.

If everyone follows these tips then Chainalysis will have a much harder time tracing Monero giving all users more time to slowly and seamlessly start switching to Dero.
👍6👀3
Media is too big
VIEW IN TELEGRAM
If you type Bitmonero in the Monero official Telegram, your message will get automatically removed/censored. The reason lies in the history of Monero. A quick recap: The 1st implementation of Cryptonote, Bytecoin, was leaked to the public in March 2014. A bitcointalk forum user (Thankful_for_today) warned everyone that 82% of Bytecoin's supply had been mined & announced his intention to relaunch it from block 0 and call it Bitmonero. TFT successfully built the genesis block & Bitmonero was born (1st fair launched Cryptonote implementation). Fluffypony and other forum users who had close to no coding skills and no understanding of Cryptonote hijacked Bitmonero with a hardfork and kicked out TFT. This is why the word Bitmonero is censored in the Monero Telegram today.

NB: There are several cues pointing to TFT being Captain Dero. You can find my full research on the history of Monero & connections to Dero here https://techleaks24.substack.com/p/the-full-history-behind-monero-nobody
4🤡32🤯2🤬1
Monero's core vulnerability is that the blockchain is structured around TXOs. TXOs have 2 properties that kill privacy: 1) they can be spent only once and that when spent 2) their key image is published onchain. Therefore once we determine where a TXO is spent via key image analysis, that TXO is effectively burnt and can be filtered out as decoy in all the other transactions where it appears among inputs. Burnt TXOs help deanonymize transactions by exposing senders and by burning even more TXOs. It's an inductive process that is fatal for Monero's privacy, because Monero cannot get rid of TXOs. This is also why FCMP++ doesn't fix Monero, because it doesn't address the core issue. Increasing the number of ring members to millions of TXOs doesn't add any more privacy when millions of TXOs have already been burnt. Dero, on the other hand, is built around accounts. Dero accounts have one special property: they are updated in encrypted state homomorphically. So an account can be updated more than once, and contrary to a TXO, no additional onchain metadata accompanies an account whenever its balance is updated (such as key images with TXOs). As a result of this, Dero maintains privacy despite any form of onchain metadata analysis because even if we expose an account as spender or receiver in one transaction, we have no way of knowing what that account does in other transactions where it appears among receiver or sender rings.
👍121🤯1
This gap in tech is a certainty and as result of it, it's inevitable for Dero to flip XMR valuation wise. The current gap in valuation with XMR is >100x. Although hard to say when this gap will be filled, we can try & guess. As per my August 25th post, Dero's uptrend should start in Q1 2025. Bitcoin's price action also lines up well with that scenario. After the election, Bitcoin should resume its upward trend & rotation out of Bitcoin into alts probably won't start until we are close to or above the $100k mark (probably in Q1 '25). Then, risk on money looking for higher returns will trigger alt season. Dero's halving is in Jan '26. In Q1 '25 the halving will be within a 1 year radius which should start fuelling more buy pressure. And then there are other events stacked between here & the '26 halving: bug patch, Atlantis burn, tech upgrade. For these reasons I'm convinced Dero's flippening of XMR will happen in this cycle and when it happens many will be caught by surprise.
👍72🤣1😡1
In Zcash private transactions are optional, Zcash combines transparent UTXO transactions with shielded notes. Privacy applies only to shielded notes. ARRR, on the other hand, uses the same technology as Zcash, except that privacy is not optional because by default all transactions are shielded. To ensure privacy, Zcash and ARRR use a technology known as zero knowledge proofs (Zkp). The name comes from the fact that despite being UTXO blockchains, when someone sends you coins in ARRR (or in a shielded ZEC transaction) you cannot see the utxo of the sender. This is why it's called "zero knowledge" proof, because the transaction ID contains ZERO information about the spent UTXO. It only contains proof that the transaction adheres to protocol rules (ie. no new coins were created).

As a sender you sign a shielded note with the address where you want it to be sent, and then zk-SNARKs are used to generate new shielded notes for the receivers that are published on the blockchain. Imagine a black box. Every block, senders insert the shielded notes they intend to spend inside the box with a unique nullifier attached and the receiver address. Nullifiers are similar to Monero key images, but contrary to KIs they are not attached to any TXO/commitment (in Monero each KI is attached to a ring of 16 TXOs one of which is the real sender).

Monero also uses the UTXO accounting model. In every monero transaction at least one new key image is published onchain tied to 16 TXOs, and at least 2 new TXOs are created. Contrary to a Zcash shielded transaction, the spent TXO(s) is obfuscated by 15 decoy TXOs. Thanks to RingCT the network can verify that the key image attached to a ring belongs to one of the TXOs in the ring, without revealing to which one exactly it belongs. However, despite the obfuscation mechanism, we can still start mapping spent TXOs to their key images by conducting pattern analysis of key image and TXO metadata. Mapping TXOs to their key images allows filtering decoys, just like seen in the Chainalysis video presentation to the IRS leaked in September. Filtering decoys breaks Monero because it reveals the real flow of the money from one TXO to another, obliterating privacy. I've explained this process in depth in my 11/4 and 9/24 posts. In short, the underlying UTXO architecture leaks links between the TXOs despite the obfuscation attempts.
👏8🤔1