The normalization of credentials in the Wabisabi protocol failed to implement adequate cross-verification methods, opening avenues for a malicious coordinator to deanonymize users.
Once a user registers their inputs, they receive a unique maxAmountCredentialValue. This tagging system allows a malicious coordinator to track ownership of outputs, fully eroding privacy.
Collection
[
|
...
]