
ZKPs, Audits & Security with Benjamin Perez from Trail of Bits
Zero Knowledge
00:00
Zcash Vulnerability: Side Channel Attacks and De-anonymization
This chapter discusses the vulnerabilities in the Zcash protocol that allow for de-anonymization of users, including the ping attack and the reject attack. They explain the lifecycle of Zcash transactions and the weaknesses in the system.
Transcript
Play full episode