No Description

poma e3d77b4e1d work in progress for gsn 5 years ago
circuits a77c04ea5a add refund mechanism for token withdrawal 5 years ago
contracts e3d77b4e1d work in progress for gsn 5 years ago
lib d0f8adf0fb add traceTransaction 5 years ago
migrations e3d77b4e1d work in progress for gsn 5 years ago
test e3d77b4e1d work in progress for gsn 5 years ago
.editorconfig b5b3474165 Move contracts to repository root 5 years ago
.env.example e75740becb Merge branch 'master' into erc20_support 5 years ago
.eslintrc.json b0c896c681 styling final 5 years ago
.gitattributes 641c76fa39 add dummy test 5 years ago
.gitignore e3d77b4e1d work in progress for gsn 5 years ago
.nvmrc e8fa073caf fix tests 5 years ago
.solhint.json d91435dd00 add pauseDeposits 5 years ago
.travis.yml c7f0ca9dfa add erc20 to integration test 5 years ago
LICENSE 21a9545b54 Create LICENSE 5 years ago
README.md c889a88b4d fix tests, reorder constructor parameters 5 years ago
cli.js e3d77b4e1d work in progress for gsn 5 years ago
index.html e3d77b4e1d work in progress for gsn 5 years ago
mixer.png 1e8a16f759 readme 5 years ago
package-lock.json e3d77b4e1d work in progress for gsn 5 years ago
package.json e3d77b4e1d work in progress for gsn 5 years ago
truffle-config.js d48f98407d rinkeby deployment 5 years ago

README.md

Tornado mixer Build Status

Tornado is a non-custodial Ethereum and ERC20 mixer based on zkSNARKs. It improves transaction privacy by breaking the on-chain link between recipient and destination addresses. It uses a smart contract that accepts ETH deposits that can be withdrawn by a different address. Whenever ETH is withdrawn by the new address, there is no way to link the withdrawal to the deposit, ensuring complete privacy.

To make a deposit user generates a secret and sends its hash (called a commitment) along with deposit amount to the Tornado smart contract. The contract accepts the deposit and adds the commitment to its list of deposits.

Later, the user decides to make a withdraw. In order to do that the user should provide a proof that he or she possesses a secret to an unspent commitment from the smart contract’s list of deposits. zkSnark technology allows to do that without revealing which exact deposit corresponds to this secret. The smart contract will check the proof, and transfer deposited funds to the address specified for withdrawal. An external observer will be unable to determine which deposit this withdrawal comes from.

You can read more about it in this medium article

Specs

  • Deposit gas const: 888054 (43381 + 50859 * tree_depth)
  • Withdraw gas cost: 692133
  • Circuit Constraints = 22617 (1869 + 1325 * tree_depth)
  • Circuit Proof time = 6116ms (1071 + 347 * tree_depth)
  • Serverless

mixer image

Security risks

  • Cryptographic tools used by mixer (zkSNARKS, Pedersen commitment, MiMC hash) are not yet extensively audited by cryptographic experts and may be vulnerable
    • Note: we use MiMC hash only for merkle tree, so even if a preimage attack on MiMC is discovered, it will not allow to deanonymize users. To drain funds attacker needs to be able to generate arbitrary hash collisions, which is a pretty strong assumption.
  • Bugs in contract. Even though we have an extensive experience in smart contract security audits, we can still make mistakes. An external audit is needed to reduce probablility of bugs. Our mixer is currently being audited, stay tuned.
  • Relayer is frontrunnable. When relayer submits a transaction someone can see it in tx pool and frontrun it with higher gas price to get the fee and drain relayer funds.
    • Workaround: we can set high gas price so that (almost) all fee is used on gas
    • Second workaround: allow only single hardcoded relayer, we use this approach for now
  • Nullifier griefing. when you submit a withdraw transaction you reveal the nullifier for your note. If someone manages to make a deposit with the same nullifier and withdraw it while your transaction is still in tx pool, your note will be considered spent since it has the same nullifier and it will prevent you from withdrawing your funds
    • Fixed by sending nullifier hash instead of plain nullifier

Requirements

  1. node v11.15.0
  2. npm install -g npx

Usage

You can see example usage in cli.js, it works both in console and in browser.

  1. npm install
  2. cp .env.example .env
  3. npm run build - this may take 10 minutes or more
  4. npx ganache-cli
  5. npm run test - optionally run tests. It may fail for the first time, just run one more time.

Use browser version on Kovan:

  1. vi .env - add your Kovan private key to deploy contracts
  2. npm run migrate
  3. npx http-server - serve current dir, you can use any other static http server
  4. Open localhost:8080

Use with command line version with Ganache:

ETHMixer

  1. npm run migrate:dev
  2. ./cli.js deposit
  3. ./cli.js withdraw <note from previous step> <destination eth address>
  4. ./cli.js balance <destination eth address>

ERC20Mixer

  1. npm run migrate:dev
  2. ./cli.js depositErc20
  3. ./cli.js withdrawErc20 <note from previous step> <destination eth address> <relayer eth address>
  4. ./cli.js balanceErc20 <destination eth address> <relayer eth address>

If you want, you can point the app to existing tornado contracts on Mainnet or Kovan, it should work without any changes

Deploy ETH Tornado Cash

  1. cp .env.example .env
  2. Tune all necessary params
  3. npx truffle migrate --network kovan --reset --f 2 --to 4

Deploy ERC20 Tornado Cash

  1. cp .env.example .env
  2. Tune all necessary params
  3. npx truffle migrate --network kovan --reset --f 2 --to 3
  4. npx truffle migrate --network kovan --reset --f 5

Note. If you want to reuse the same verifier for all the mixers, then after you deployed one of the mixers you should only run 4th or 5th migration for ETH or ERC20 mixers respectively (--f 4 --to 4 or --f 5).

Credits

Special thanks to @barryWhiteHat and @kobigurk for valuable input, and to @jbaylina for awesome Circom & Websnark framework