It’s pretty close. There was a Chainalysis slideshow presentation that was leaked a few years ago, where they are introducing to government employees their best available tools for tracking it (the video has since been largely scrubbed from much of the internet), where they walked through an example of how they deanonymized a drug cartel that was using Monero. This was portrayed as a rare and difficult feat; it was only possible because of a combination of the cartel using remote nodes operated as honeypots, their consistent use of centralized exchanges, and the large number of transactions Chainalysis had been able to separately confirm as being associated with them. The presentation otherwise emphasized how most of the time options are limited unless the person they’re targeting made mistakes unrelated to the theoretical security of Monero, like making transactions with timings and amounts that give them away or leaking their IP address.
Completely anonymous lol. I wish.
Eh the only people to claim to be able to de-anonymize transactions are three letter agencies that haven’t shown proof.
If they have it they’re saving it for state level actors.
It’s pretty close. There was a Chainalysis slideshow presentation that was leaked a few years ago, where they are introducing to government employees their best available tools for tracking it (the video has since been largely scrubbed from much of the internet), where they walked through an example of how they deanonymized a drug cartel that was using Monero. This was portrayed as a rare and difficult feat; it was only possible because of a combination of the cartel using remote nodes operated as honeypots, their consistent use of centralized exchanges, and the large number of transactions Chainalysis had been able to separately confirm as being associated with them. The presentation otherwise emphasized how most of the time options are limited unless the person they’re targeting made mistakes unrelated to the theoretical security of Monero, like making transactions with timings and amounts that give them away or leaking their IP address.