Tornado cash. Non-custodial private transactions on Ethereum.
Go to file
2019-08-04 20:57:01 +03:00
circuits split extra constraints back to 2 2019-08-02 12:24:50 +03:00
contracts fix bugs (public verifier) 2019-08-04 20:57:01 +03:00
lib fix a bug 2019-07-23 00:19:50 +03:00
migrations skip migrations 2019-08-01 17:19:52 -07:00
test operator role 2019-08-02 20:12:30 +03:00
.editorconfig
.env.example remove PAUSEACCOUNT from .env 2019-08-01 11:55:18 +03:00
.eslintrc.json styling final 2019-07-16 23:49:45 +03:00
.gitattributes
.gitignore add pauseDeposits 2019-08-01 01:41:22 -07:00
.nvmrc fix tests 2019-07-23 13:00:45 -07:00
.solhint.json add pauseDeposits 2019-08-01 01:41:22 -07:00
.travis.yml fix test, silence ganache in travis 2019-07-19 15:06:06 +03:00
cli.js reduce nullifier bits to 31 2019-08-01 17:49:34 +03:00
index.html readme 2019-07-17 14:12:57 +03:00
LICENSE Create LICENSE 2019-07-17 14:14:07 +03:00
mixer.png readme 2019-07-17 14:12:57 +03:00
package-lock.json update snarkjs version 2019-08-02 12:24:50 +03:00
package.json fix bugs (public verifier) 2019-08-04 20:57:01 +03:00
README.md Update README.md 2019-07-25 21:30:50 +03:00
truffle-config.js fix bugs (public verifier) 2019-08-04 20:57:01 +03:00

Tornado mixer Build Status

mixer image

Specs

  • Deposit gas cost: deposit 888054
  • Withdraw gas cost: 692133
  • Circuit constraints: 22617
  • Circuit proving time: 6116ms
  • Serverless

Security risks

  • Cryptographic tools used by mixer (zkSNARKS, Pedersen commitment, MiMC hash) are not yet extensively audited by cryptographic experts and may be vulnerable
    • Note: we use MiMC hash only for merkle tree, so even if a preimage attack on MiMC is discovered, it will not allow to deanonymize users. To drain funds attacker needs to be able to generate arbitrary hash collisions, which is a pretty strong assumption.
  • Relayer is frontrunnable. When relayer submits a transaction someone can see it in tx pool and frontrun it with higher gas price to get the fee and drain relayer funds.
    • Workaround: we can set high gas price so that (almost) all fee is used on gas. The relayer will not receive profit this way, but this approach is acceptable until we develop more sophisticated system that prevents frontrunning
  • Bugs in contract. Even though we have an extensive experience in smart contract security audits, we can still make mistakes. An external audit is needed to reduce probablility of bugs
  • Nullifier griefing. when you submit a withdraw transaction you reveal the nullifier for your note. If someone manages to make a deposit with the same nullifier and withdraw it while your transaction is still in tx pool, your note will be considered spent since it has the same nullifier and it will prevent you from withdrawing your funds
    • Fixed by sending nullifier hash instead of plain nullifier

Requirements

  1. node v11.15.0
  2. npm install -g npx

Usage

  1. npm i
  2. cp .env.example .env
  3. npm run build:circuit - may take 10 minutes or more
  4. npm run build:contract
  5. npm run browserify
  6. npx ganache-cli
  7. npm run test - optionally run tests. It may fail for the first time, just run one more time.
  8. npm run migrate:dev
  9. ./cli.js deposit
  10. ./cli.js withdraw <note from previous step> <destination eth address>
  11. ./cli.js balance <destination eth address>
  12. vi .env - add your Kovan private key to deploy contracts
  13. npm run migrate
  14. npx http-server - serve current dir, you can use any other http server
  15. Open localhost:8080

Credits

Special thanks to @barryWhiteHat and @kobigurk for valuable input, and to @jbaylina for awesome Circom & Websnark framework