Zcash was built on the original Bitcoin design which was not meant to be an anonymous cryptocurrency. And so there were a lot of things that Bitcoin nodes do that are perfectly fine within the threat model of Bitcoin but suddenly not fine at all once you're moving to Zcash. So in Zcash when I want to send you a transaction I'm essentially going to encrypt this transaction in such a way that only you can decrypt it and sort of find the coin that is spent. That's kind of point number one. Point number two is that the Bitcoin client processes transactions one after the other in a single thread of execution. This is essentially all you need for the attack. We then extended these attacks

Get the Snipd
podcast app

Unlock the knowledge in podcasts with the podcast player of the future.
App store bannerPlay store banner

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode

Save any
moment

Hear something you like? Tap your headphones to save it with AI-generated key takeaways

Share
& Export

Send highlights to Twitter, WhatsApp or export them to Notion, Readwise & more

AI-powered
podcast player

Listen to all your favourite podcasts with AI-powered features

Discover
highlights

Listen to the best highlights from the podcasts you love and dive into the full episode