tornado-core/README.md

36 lines
1.5 KiB
Markdown
Raw Normal View History

2019-07-12 23:56:17 +02:00
## Testing truffle
2019-07-12 11:53:44 +02:00
1. `npm i`
2019-07-12 23:56:17 +02:00
2. `npm run build:circuit`
2019-07-12 11:53:44 +02:00
2. `npx truffle compile`
3. `npx truffle test` - it may fail for the first time, just run one more time.
2019-07-12 23:56:17 +02:00
## Testing js
1. `npm i`
2. `npm run build:circuit`
3. `cd scripts`
4. `node test_snark.js`
2019-07-12 17:04:45 +02:00
## Deploy
1. `npx truffle migrate --network kovan --reset`
2019-07-12 11:53:44 +02:00
2019-07-12 21:11:37 +02:00
## Requirements
1. `node v11.15.0`
2019-07-12 23:56:17 +02:00
2. `npm install -g npx`
2019-07-12 21:11:37 +02:00
2019-07-13 00:38:25 +02:00
# Specs:
- Deposit gas cost: deposit 903472
- Withdraw gas cost: 727821
- Circuit constraints: 22617
- Circuit proving time: 8965ms
- Serverless, executed entirely in the browser
# Security risks:
* Cryptographic tools used by mixer (zkSNARKS, Pedersen commitment, MiMC hash) are not yet extensively audited by cryptographic experts and may be vulnerable
* Note: we use MiMC hash only for merkle tree, so even if a preimage attack on MiMC is discovered, it will not allow to deanonymize users or drain mixer funds
* Relayer is frontrunnable. When relayer submits a transaction someone can see it in tx pool and frontrun it with higher gas price to get the fee and drain relayer funds.
* Workaround: we can set high gas price so that (almost) all fee is used on gas. The relayer will not receive profit this way, but this approach is acceptable until we develop more sophisticated system that prevents frontrunning
* Bugs in contract. Even though we have an extensive experience in smart contract security audits, we can still make mistakes. An external audit is needed to reduce probablility of bugs
2019-07-13 00:40:08 +02:00
* Nullifier griefing - ...TODO...
2019-07-12 11:53:44 +02:00