misc-research/Monero-Black-Marble-Flood
2024-05-28 19:13:21 +00:00
..
code First draft of Black Marble Flood: Best Options for Ring Size and Fee 2024-05-28 19:13:21 +00:00
pdf First draft of Black Marble Flood: Best Options for Ring Size and Fee 2024-05-28 19:13:21 +00:00
LICENSE.md Add GPL-2 to Monero-Black-Marble-Flood 2024-04-15 14:10:42 +00:00
README.md Add Monero-Black-Marble-Flood README.md 2024-03-27 16:52:35 +00:00

March 2024 Suspected Black Marble Flooding Against Monero: Privacy, User Experience, and Countermeasures

In the pdf directory is a rapid preliminary analysis of the suspected black marble flooding incident against Monero in March 2024.

To run the R analysis in the code directory, you must have monerod running on your local machine. If monerod does not have its RPC port at http://127.0.0.1:18081, you must change the url.rpc variable in output-index.R to the correct URL and port.

The analysis requires about 32 GB of RAM. The code should complete in a few hours.

Several R packages must be installed. These can be installed with:

install.packages(c("ggplot2", "data.table", "RJSONIO", "RCurl", "parallelly", "future", "future.apply", "zoo", "scales", "actuar"))

The R files should be run in this order:

  • output-index.R
  • spam-assumptions.R
  • block-size.R
  • empirical-effective-ring-size.R
  • effective-ring-size-projections.R
  • fee-behavior.R
  • mempool-tx-confirmation.R

The data analyzed in mempool-tx-confirmation.R was actively collected in real time at a few Monero nodes and is not yet publicly available.