Zero Knowledge cover image

ZKPs, Audits & Security with Benjamin Perez from Trail of Bits

Zero Knowledge

00:00

Zcash Vulnerability: Side Channel Attacks and De-anonymization

This chapter discusses the vulnerabilities in the Zcash protocol that allow for de-anonymization of users, including the ping attack and the reject attack. They explain the lifecycle of Zcash transactions and the weaknesses in the system.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app