http://revuo75joezkbeitqmas4ab6spbrkr4vzbhjmeuv75ovrfqfp47mtjid.onion/periodicals/periodical-3-2019.html
While this might seem like a strange goal on the surface, it’s important to remember that only by highlighting and discussing these flaws can we hope to overcome them, both technologically and as a community. So far, the topics covered include: a ring signatures introduction, 0-decoy and chain reactions, chain splits (key image reuse attack), input selection algorithm, unusual ringsize, remote nodes, timing attacks, poisoned outputs (EAE attack), public mining pools, input/output metadata,...