用蒲公英隐藏P2P节点
Obscuring P2P Nodes with Dandelion

原始链接: https://www.johndcook.com/blog/2025/12/08/dandelion/

虽然加密货币使用隐蔽地址等技术来保护交易隐私,但一个关键漏洞在于通过点对点(P2P)网络泄露元数据。攻击者运行多个节点,可以通过分析数据到达时间,将交易追溯到其来源。 Dandelion++协议目前已在门罗币和其他加密货币中实现,解决了这个问题。它引入了一个两阶段过程:一个交易在节点之间随机跳转的“茎”阶段,然后是一个最终节点广泛广播交易的“扩散”阶段。 这模仿了蒲公英种子的旅程——先沿着茎上升,然后在风中散开。Dandelion++使得追踪交易发起者更加困难,因为观察者可以识别扩散点,但不一定能识别最初的发送者。与在进入网络*之前*保护身份的Tor不同,Dandelion++专注于P2P网络*内部*的匿名性。

这个Hacker News讨论围绕一种名为Dandelion的新协议,旨在模糊点对点(P2P)网络中节点的身份。核心争论在于Dandelion是否在P2P网络*内部*提供独特的保护,或者这种功能已经由Tor提供。 一位评论员指出,Tor的“洋葱路由”本质上就保护了网络*内部*的身份,质疑作者关于Dandelion提供新功能的说法。其他人表示同意,认为作者可能误解了Tor的能力,并表现出“非我莫属”的综合症。 讨论强调了一种潜在的冗余,质疑在像Tor这样成熟且经过审计的协议已经解决了相同问题(网络内身份保护)的情况下,Dandelion的必要性。链接的研究论文本身也承认与Tor的相似之处。
相关文章

原文

The weakest link in the privacy of cryptocurrency transactions is often outside the blockchain. There are technologies such as stealth addresses and subaddresses to try to thwart attempts to link transactions to individuals. They do a good job of anonymizing transaction data, but the weak link may be metadata, as is often the case.

Cryptocurrency nodes circulate transaction data using a peer-to-peer network. An entity running multiple nodes can compare when data arrived at each of its nodes and triangulate to infer which node first sent a set of transactions. The Dandelion protocol, and its refinement Dandelion++, aims to mitigate this risk. Dandelion++ is currently used in Monero and a few other coins; other cryptocurrencies have considered or are considering using it.

Dandelion plant

The idea behind the Dandelion protocol is to have a “stalk” period and a “diffusion” period. Imagine data working up the stalk of a dandelion plant before diffusing like seeds in the wind. The usual P2P process is analogous to simply blowing on the seed head [1].

During the stalk period, information travels from one node to one node. Then after some number of hops, the diffusion process begins; the final node in the stalk period diffuses the information to all its peers. An observer with substantial but not complete visibility of the network may be able to determine which node initiated the diffusion, but maybe not the node at the other end of the stem.

A natural question is how this differs from something like Tor. In a nutshell, Tor offers identity protection before you enter a P2P network, and Dandelion offers identity protection inside the P2P network.

For more details, see the original paper on Dandelion [2].

[1] The original paper on Dandelion uses a dandelion seed as the metaphor for the protocol. “The name ‘dandelion spreading’ reflects the spreading pattern’s resemblance to a dandelion seed head and refers to the diagram below. However, other sources refer to the stalk and head of the dandelion plant, not just a single seed. Both mental images work since the plant has a slightly fractal structure with a single seed looking something like the plant.

Illustration from Dandelion protocol paper

[2] Shaileshh Bojja Venkatakrishnan, Giulia Fanti, Pramod Viswanath. Dandelion: Redesigning the Bitcoin Network for Anonymity. Proceedings of the ACM on Measurement and Analysis of Computing Systems, Volume 1, Issue 1 Article No.: 22, Pages 1–34. Available here: https://doi.org/10.1145/3084459.

联系我们 contact @ memedata.com