Grin developer fights off MimbleWimble protocol privacy post

The developer of a privacy-oriented cryptocurrency, Grin has denied allegations of a violation of the MimbleWimble security protocol.

Grin core developer Daniel Lenberg published a Medium post addressing the "factual inaccuracies" of Ivan Bogaty's article, which claims it violated Grin's privacy model.

Rich, researcher from the American company Dragonfly Capital Partners, told about how he managed to crack the Mimblewimble privacy protocol used by Green and other crypto-oriented security systems,

He wrote that “Mimblewimble’s privacy is fundamentally violated” and that, using just 60 dollars, he was able to “disclose the exact sender and recipient addresses for 96% Grin transactions in real time.”

The post went on to say that "the problem is inherent in Mimblewimble," and he doesn't believe there will be a way to fix the problem. Mimblewimble should no longer be considered a viable alternative to Zcash or Monero when it comes to privacy, he said.

Lenberg refuted Bagotogo’s claim that Mimblewimble was fundamentally wrong, and claimed that the researcher’s work does not constitute a true attack on the network,

The "attack" that the author claims was a well-documented and discussed issue of transaction graph I / O connectivity. This is not new to everyone on the Grin team or anyone who has studied the Mimblewimble protocol.

Developer Green concluded

The Grin team has consistently recognized that Grin's privacy is far from perfect. While the ability to link transactions is a limitation that we seek to mitigate as part of our goal of continually improving privacy, it does not “break” Mimblewimble or come close to being fundamental enough to render it or Grin's privacy features useless.

Download Grin wallet

Rate this article
Blockchain media