Tornado cash. Non-custodial private transactions on Ethereum.
Go to file
2019-09-16 14:14:49 +03:00
circuits custom relayer 2019-09-06 23:20:49 -04:00
contracts max leaves count fix 2019-09-16 13:07:14 +03:00
lib fix a bug 2019-07-23 00:19:50 +03:00
migrations test with real DAI and USDT 2019-08-30 13:06:17 +03:00
test max leaves count fix 2019-09-16 13:07:14 +03:00
.editorconfig Move contracts to repository root 2019-07-12 12:53:44 +03:00
.env.example Merge branch 'master' into erc20_support 2019-09-10 17:28:01 +03:00
.eslintrc.json styling final 2019-07-16 23:49:45 +03:00
.gitattributes add dummy test 2019-07-10 19:58:21 +03:00
.gitignore additional eth for the recipient 2019-08-27 23:42:24 +03:00
.nvmrc fix tests 2019-07-23 13:00:45 -07:00
.solhint.json add pauseDeposits 2019-08-01 01:41:22 -07:00
.travis.yml test cli in travis 2019-08-06 14:51:52 +03:00
cli.js merge and add cli.js erc20 commands 2019-09-14 11:21:53 -07:00
index.html readme 2019-07-17 14:12:57 +03:00
LICENSE Create LICENSE 2019-07-17 14:14:07 +03:00
mixer.png readme 2019-07-17 14:12:57 +03:00
package-lock.json eslint vuln fix 2019-08-28 11:15:49 +03:00
package.json eslint vuln fix 2019-08-28 11:15:49 +03:00
README.md readme bug 2019-09-16 14:14:49 +03:00
truffle-config.js gas tuning 2019-08-30 13:21:53 +03:00

Tornado mixer Build Status

Tornado is a non-custodial Ethereum and ERC20 mixer based on zkSNARKs. It improves transaction privacy by breaking the on-chain link between recipient and destination addresses. It uses a smart contract that accepts ETH deposits that can be withdrawn by a different address. Whenever ETH is withdrawn by the new address, there is no way to link the withdrawal to the deposit, ensuring complete privacy.

To make a deposit user generates a secret and sends its hash (called a commitment) along with deposit amount to the Tornado smart contract. The contract accepts the deposit and adds the commitment to its list of deposits.

Later, the user decides to make a withdraw. In order to do that the user should provide a proof that he or she possesses a secret to an unspent commitment from the smart contracts list of deposits. zkSnark technology allows to do that without revealing which exact deposit corresponds to this secret. The smart contract will check the proof, and transfer deposited funds to the address specified for withdrawal. An external observer will be unable to determine which deposit this withdrawal comes from.

You can read more about it in this medium article

Specs

  • Deposit gas const: 888054 (43381 + 50859 * tree_depth)
  • Withdraw gas cost: 692133
  • Circuit Constraints = 22617 (1869 + 1325 * tree_depth)
  • Circuit Proof time = 6116ms (1071 + 347 * tree_depth)
  • Serverless

mixer image

Security risks

  • Cryptographic tools used by mixer (zkSNARKS, Pedersen commitment, MiMC hash) are not yet extensively audited by cryptographic experts and may be vulnerable
    • Note: we use MiMC hash only for merkle tree, so even if a preimage attack on MiMC is discovered, it will not allow to deanonymize users. To drain funds attacker needs to be able to generate arbitrary hash collisions, which is a pretty strong assumption.
  • Bugs in contract. Even though we have an extensive experience in smart contract security audits, we can still make mistakes. An external audit is needed to reduce probablility of bugs. Our mixer is currently being audited, stay tuned.
  • Relayer is frontrunnable. When relayer submits a transaction someone can see it in tx pool and frontrun it with higher gas price to get the fee and drain relayer funds.
    • Workaround: we can set high gas price so that (almost) all fee is used on gas
    • Second workaround: allow only single hardcoded relayer, we use this approach for now
  • Nullifier griefing. when you submit a withdraw transaction you reveal the nullifier for your note. If someone manages to make a deposit with the same nullifier and withdraw it while your transaction is still in tx pool, your note will be considered spent since it has the same nullifier and it will prevent you from withdrawing your funds
    • Fixed by sending nullifier hash instead of plain nullifier

Requirements

  1. node v11.15.0
  2. npm install -g npx

Usage

You can see example usage in cli.js, it works both in console and in browser.

  1. npm install
  2. cp .env.example .env
  3. npm run build:circuit - this may take 10 minutes or more
  4. npm run build:contract
  5. npm run browserify
  6. npx ganache-cli
  7. npm run test - optionally run tests. It may fail for the first time, just run one more time.

Use browser version on Kovan:

  1. vi .env - add your Kovan private key to deploy contracts
  2. npm run migrate
  3. npx http-server - serve current dir, you can use any other static http server
  4. Open localhost:8080

Use with command line version with Ganache:

ETHMixer

  1. npm run migrate:dev
  2. ./cli.js deposit
  3. ./cli.js withdraw <note from previous step> <destination eth address>
  4. ./cli.js balance <destination eth address>

ERC20Mixer

  1. npm run migrate:dev
  2. ./cli.js depositErc20
  3. ./cli.js withdrawErc20 <note from previous step> <destination eth address> <relayer eth address>
  4. ./cli.js balanceErc20 <destination eth address> <relayer eth address>

If you want, you can point the app to existing tornado contracts on Mainnet or Kovan, it should work without any changes

Deploy ETH Tornado Cash

  1. cp .env.example .env
  2. Tune all necessary params
  3. npx truffle migrate --network kovan --reset --f 2 --to 4

Deploy ERC20 Tornado Cash

  1. cp .env.example .env
  2. Tune all necessary params
  3. npx truffle migrate --network kovan --reset --f 2 --to 3
  4. npx truffle migrate --network kovan --reset --f 5

Note. If you want to reuse the same verifier for all the mixers, then after you deployed one of the mixers you should only run 4th or 5th migration for ETH or ERC20 mixers respectively (--f 4 --to 4 or --f 5).

Credits

Special thanks to @barryWhiteHat and @kobigurk for valuable input, and to @jbaylina for awesome Circom & Websnark framework