I don't recall being contacted directly, but the attack has been discussed. It relies on a number of conditions. For example, if you are over Tor, they try to kick the machine off Tor, _assuming_ that it will fall back to non-Tor. That's only true for dual stack nodes, which are not really 100% anonymous anyway -- you're operating from your public IP anyway. On Wed, Nov 26, 2014 at 2:47 AM, Jean-Paul Kogelman wrote: > This paper was just posted on reddit that describes how an attacker can > de-anonymize clients on the bitcoin network. It mentions that the core devs > were contacted prior to publication. I was just wondering, how many of > these issues have already been addressed? > > > Paper (University of Luxembourg): > http://orbilu.uni.lu/handle/10993/18679 > > > Kind regards, > > Jean-Paul > > > ------------------------------------------------------------------------------ > Download BIRT iHub F-Type - The Free Enterprise-Grade BIRT Server > from Actuate! Instantly Supercharge Your Business Reports and Dashboards > with Interactivity, Sharing, Native Excel Exports, App Integration & more > Get technology previously reserved for billion-dollar corporations, FREE > > http://pubads.g.doubleclick.net/gampad/clk?id=157005751&iu=/4140/ostg.clktrk > _______________________________________________ > Bitcoin-development mailing list > Bitcoin-development@lists.sourceforge.net > https://lists.sourceforge.net/lists/listinfo/bitcoin-development > > -- Jeff Garzik Bitcoin core developer and open source evangelist BitPay, Inc. https://bitpay.com/