circuits | ||
contracts | ||
lib | ||
migrations | ||
test | ||
.editorconfig | ||
.env.example | ||
.eslintrc.json | ||
.gitattributes | ||
.gitignore | ||
.nvmrc | ||
.solhint.json | ||
.travis.yml | ||
cli.js | ||
index.html | ||
LICENSE | ||
mixer.png | ||
package-lock.json | ||
package.json | ||
README.md | ||
truffle-config.js |
Tornado mixer
Tornado is a non-custodial Ethereum and ERC20 mixer based on zkSNARKs. It improves transaction privacy by breaking the on-chain link between recipient and destination addresses. It uses a smart contract that accepts ETH deposits that can be withdrawn by a different address. Whenever ETH is withdrawn by the new address, there is no way to link the withdrawal to the deposit, ensuring complete privacy.
To make a deposit user generates a secret and sends its hash (called a commitment) along with deposit amount to the Tornado smart contract. The contract accepts the deposit and adds the commitment to its list of deposits.
Later, the user decides to make a withdraw. In order to do that the user should provide a proof that he or she possesses a secret to an unspent commitment from the smart contract’s list of deposits. zkSnark technology allows to do that without revealing which exact deposit corresponds to this secret. The smart contract will check the proof, and transfer deposited funds to the address specified for withdrawal. An external observer will be unable to determine which deposit this withdrawal comes from.
You can read more about it in this medium article
Specs
- Deposit gas const: 888054 (43381 + 50859 * tree_depth)
- Withdraw gas cost: 692133
- Circuit Constraints = 22617 (1869 + 1325 * tree_depth)
- Circuit Proof time = 6116ms (1071 + 347 * tree_depth)
- Serverless
Security risks
- Cryptographic tools used by mixer (zkSNARKS, Pedersen commitment, Poseidon hash) are not yet extensively audited by cryptographic experts and may be vulnerable
- Note: we use Poseidon hash only for merkle tree, so even if a preimage attack on Poseidon is discovered, it will not allow to deanonymize users. To drain funds attacker needs to be able to generate arbitrary hash collisions, which is a pretty strong assumption.
- Bugs in contract. Even though we have an extensive experience in smart contract security audits, we can still make mistakes. An external audit is needed to reduce probablility of bugs. Our mixer is currently being audited, stay tuned.
- Relayer is frontrunnable. When relayer submits a transaction someone can see it in tx pool and frontrun it with higher gas price to get the fee and drain relayer funds.
- Workaround: we can set high gas price so that (almost) all fee is used on gas
- Second workaround: allow only single hardcoded relayer, we use this approach for now
Nullifier griefing. when you submit a withdraw transaction you reveal the nullifier for your note. If someone manages to make a deposit with the same nullifier and withdraw it while your transaction is still in tx pool, your note will be considered spent since it has the same nullifier and it will prevent you from withdrawing your funds- Fixed by sending nullifier hash instead of plain nullifier
Requirements
node v11.15.0
npm install -g npx
Usage
You can see example usage in cli.js, it works both in console and in browser.
npm install
cp .env.example .env
npm run build:circuit
- this may take 10 minutes or morenpm run build:contract
npm run browserify
npx ganache-cli
npm run test
- optionally run tests. It may fail for the first time, just run one more time.
Use browser version on Kovan:
vi .env
- add your Kovan private key to deploy contractsnpm run migrate
npx http-server
- serve current dir, you can use any other static http server- Open
localhost:8080
Use with command line version with Ganache:
ETHMixer
npm run migrate:dev
./cli.js deposit
./cli.js withdraw <note from previous step> <destination eth address>
./cli.js balance <destination eth address>
ERC20Mixer
npm run migrate:dev
./cli.js depositErc20
./cli.js withdrawErc20 <note from previous step> <destination eth address> <relayer eth address>
./cli.js balanceErc20 <destination eth address> <relayer eth address>
If you want, you can point the app to existing tornado contracts on Mainnet or Kovan, it should work without any changes
Deploy ETH Tornado Cash
cp .env.example .env
- Tune all necessary params
npx truffle migrate --network kovan --reset --f 2 --to 4
Deploy ERC20 Tornado Cash
cp .env.example .env
- Tune all necessary params
npx truffle migrate --network kovan --reset --f 2 --to 3
npx truffle migrate --network kovan --reset --f 5
Note. If you want to reuse the same verifier for all the mixers, then after you deployed one of the mixers you should only run 4th or 5th migration for ETH or ERC20 mixers respectively (--f 4 --to 4
or --f 5
).
Credits
Special thanks to @barryWhiteHat and @kobigurk for valuable input, and to @jbaylina for awesome Circom & Websnark framework