0ac236d439
new circomlib update |
||
---|---|---|
circuits | ||
contracts | ||
lib | ||
migrations | ||
test | ||
.editorconfig | ||
.env.example | ||
.eslintrc.json | ||
.gitattributes | ||
.gitignore | ||
.nvmrc | ||
.solhint.json | ||
.travis.yml | ||
cli.js | ||
diagram.png | ||
index.html | ||
LICENSE | ||
migrationDeposits.js | ||
package-lock.json | ||
package.json | ||
README.md | ||
truffle-config.js |
Tornado Privacy Solution
Tornado is a non-custodial Ethereum and ERC20 privacy solution based on zkSNARKs. It improves transaction privacy by breaking the on-chain link between recipient and destination addresses. It uses a smart contract that accepts ETH deposits that can be withdrawn by a different address. Whenever ETH is withdrawn by the new address, there is no way to link the withdrawal to the deposit, ensuring complete privacy.
To make a deposit user generates a secret and sends its hash (called a commitment) along with the deposit amount to the Tornado smart contract. The contract accepts the deposit and adds the commitment to its list of deposits.
Later, the user decides to make a withdrawal. In order to do that, the user should provide a proof that he or she possesses a secret to an unspent commitment from the smart contract’s list of deposits. zkSnark technology allows that to happen without revealing which exact deposit corresponds to this secret. The smart contract will check the proof, and transfer deposited funds to the address specified for withdrawal. An external observer will be unable to determine which deposit this withdrawal came from.
You can read more about it in this medium article
Specs
- Deposit gas const: 888054 (43381 + 50859 * tree_depth)
- Withdraw gas cost: 692133
- Circuit Constraints = 22617 (1869 + 1325 * tree_depth)
- Circuit Proof time = 6116ms (1071 + 347 * tree_depth)
- Serverless
Security risks
- Cryptographic tools used by Tornado (zkSNARKS, Pedersen commitment, MiMC hash) are yet NOT extensively audited by cryptographic experts and may be vulnerable
- Note: we use MiMC hash only for merkle tree, so even if a preimage attack on MiMC is discovered, it will not allow to deanonymize users. To drain funds attacker needs to be able to generate arbitrary hash collisions, which is a pretty strong assumption.
- Bugs in contract. Even though we have an extensive experience in smart contract security audits, we can still make mistakes. An external audit is needed to reduce probablility of bugs. Our code is currently being audited, stay tuned.
- Relayer is frontrunnable. When relayer submits a transaction someone can see it in tx pool and frontrun it with higher gas price to get the fee and drain relayer funds.
- Workaround: we can set high gas price so that (almost) all fee is used on gas
- Second workaround: allow only single hardcoded relayer, we use this approach for now
Nullifier griefing. when you submit a withdraw transaction you reveal the nullifier for your note. If someone manages to make a deposit with the same nullifier and withdraw it while your transaction is still in tx pool, your note will be considered spent since it has the same nullifier and it will prevent you from withdrawing your funds- Fixed by sending nullifier hash instead of plain nullifier
Requirements
node v11.15.0
npm install -g npx
Usage
You can see example usage in cli.js, it works both in console and in browser.
npm install
cp .env.example .env
npm run build
- this may take 10 minutes or morenpx ganache-cli
npm run test
- optionally runs tests. It may fail on the first try, just run it again.
Use browser version on Kovan:
vi .env
- add your Kovan private key to deploy contractsnpm run migrate
npx http-server
- serve current dir, you can use any other static http server- Open
localhost:8080
Use with command line version with Ganache:
ETHTornado
npm run migrate:dev
./cli.js deposit
./cli.js withdraw <note from previous step> <destination eth address>
./cli.js balance <destination eth address>
ERC20Tornado
npm run migrate:dev
./cli.js depositErc20
./cli.js withdrawErc20 <note from previous step> <destination eth address> <relayer eth address>
./cli.js balanceErc20 <destination eth address> <relayer eth address>
If you want, you can point the app to existing tornado contracts on Mainnet or Kovan. It should work without any problems
Deploy ETH Tornado Cash
cp .env.example .env
- Tune all necessary params
npx truffle migrate --network kovan --reset --f 2 --to 4
Deploy ERC20 Tornado Cash
cp .env.example .env
- Tune all necessary params
npx truffle migrate --network kovan --reset --f 2 --to 3
npx truffle migrate --network kovan --reset --f 5
Note. If you want to reuse the same verifier for all the instances, then after you deployed one of the instances you should only run 4th or 5th migration for ETH or ERC20 contracts respectively (--f 4 --to 4
or --f 5
).
Credits
Special thanks to @barryWhiteHat and @kobigurk for valuable input, and to @jbaylina for awesome Circom & Websnark framework