http://walletdvl5avrmoxk2fwsf5b76zkmbkoo3r6kqeesq5hsgnq7xhbciad.onion/blockchain-attacks-on-privacy
As an example, consider five typical transactions that consume one input each and produce two outputs. A, B, C, D, E refer to transactions. A1, A2, etc refer to output addresses of those transactions --> C1
A1 --> B2 --> C2
--> B2 --> D1
--> D2 --> E1
--> E2 If wallet fingerprinting finds that transactions A, B, D and E are created by the same wallet software, and the other transactions are created by other software, then the change...