Thanks for raising your points @SaltyYogurtt - appreciated! Just to help clarify a few things from my side:
As for DAITA, as I mentioned in my previous post, we looked at it when it was first announced. And yes, you’re absolutely right – it’s based on the Maybenot paper, which I personally think is a great piece of work. Our analysis was simply based on their open-source codebase. It’s all publicly available, and anyone can inspect it. That’s how we saw which state machines were used and how they were implemented, here for reference:
It was clear from that inspection that the cover traffic patterns at the time were quite regular, making them distinguishable with relatively simple traffic analysis techniques. Of course, it’s entirely possible that things have improved since then – as I also mentioned, we haven’t evaluated recent versions.
To be crystal clear, there is no intent to discredit anyone’s work. In fact, it’s great to see more VPNs taking traffic analysis seriously – this is a crucial area where more research and more diverse approaches are badly needed and collectively looking at how the problem is addressed in various systems will only contributing to strengthening the countermeasures even more.
Regarding the Dandelion++ paper:
Neither Dandelion nor the Lightning Network are in any way competitors to Nym, so there’s definitely no conflict of interest Academic research on their anonymity properties also predates the NymVPN effort and is not commercially motivated. The paper you mentioned was published at NDSS - which is one of the top conferences in network and security research - hence, it went through a very thorough peer-review process by experts in the field. And I think it is important to keep in mind that research analysis (even if critical) is not discrediting, it’s a natural part of the research ecosystem. Take Tor as an example - researchers and academics (including our Chief Scientist) have spent years working on analysis and improvements to systems like Tor – which actively collaborates with academia and encourages critical studies. These efforts don’t weaken Tor, they help make it stronger.
I think it’s also worth noting that the authors of the Dandelion++ paper also interacted extensively with the Monero community – including presenting the work in person at Monero events (e.g., https://www.youtube.com/watch?v=kfyhb-GCPEE). I think it’s fair to say this was not some hit piece, but a legitimate peer-reviewed research contribution aiming to further our understanding of privacy in decentralized systems.
I would encourage you to reach out to the authors directly, as they’re happy to answer any questions. That might be a better setting to clarify your concerns, especially since more details on your actual concerns would be helpful.
Finally, regarding the notion that mentioning a past limitation in a public forum constitutes “irresponsible disclosure” – the DAITA code was (and is) open source. Everything discussed was visible and already public. It’s important to talk openly about both strengths and limitations of privacy tools if we want to push the field forward.
Again – thanks for raising these points! It’s good to keep discussions grounded and constructive, and I’m glad to see we both care about advancing real privacy for users.