_ _ _ _ _ _ _ | \| (_)__| |_ ___| |__ _ ___ _ | |___| |_ _ _ ___ ___ _ _ | .` | / _| ' \/ _ \ / _` (_-< | || / _ \ ' \| ' \(_-</ _ \ ' \ |_|\_|_\__|_||_\___/_\__,_/__/ \__/\___/_||_|_||_/__/\___/_||_|
📆 13 Dec 2021 | ⏱️ 2 minute read
I don't support the use of Monero or other proof of work cryptocurrencies since they're destroying the planet[1]. However, I know people are going to use Monero anyways. So it makes sense to give this warning.
There's a practical statistical attack on Monero related to its decoy selection algorithm[2]. Work to resolve the issue is in progress. It's not clear how severe this vulnerability is, but Monero's adversaries (DEA, FBI, IRS, NSA) may already be using it.
It might not be safe any more to rely on Monero for your freedom. If you still must use Monero, use non-KYC exchanges, different addresses for every transaction, and make sure your addresses never get linked to your real-world identity.
None of us knows how soon Shor-capable quantum computers will be built. But when they are built, Monero's privacy may be under threat yet again.
So just be aware that Monero isn't perfect and it may not protect you forever. The Monero blockchain is public. So when the cryptography is broken or there's a bug in the client software[3], your transactions have nowhere to hide. Shor-capable quantum computing may not come to pass, but just be aware that breaks in security happen.
You can practice defense in depth by treating Monero as if it's as transparent as Bitcoin. Then when there is a break in Monero's privacy, you can rest easy knowing you thought ahead.
🔗 2: decoy selection algorithm
🔗 3: bug in the client software
Copyright 2019-2023 Nicholas Johnson. CC BY-SA 4.0.