This paper also inspired the recent academic paper "Attacking Zcash Protocol For Fun And Profit" available at <a href="https://attackingzcash.com" rel="nofollow">https://attackingzcash.com</a> and on IACR: <a href="https://eprint.iacr.org/2020/627" rel="nofollow">https://eprint.iacr.org/2020/627</a><p>It describes new kinds of metadata leakage attacks that can be launched against privacy coins, by adversaries with large budgets, such as professional criminal organizations, blockchain analysis companies and nation states. The privacy coin HUSH has developed this defensive technology and was first to implement it in September 2019.<p>There is a YouTube video where the author explains why he named the paper this way, this link has the timestamp where it's talked about: <a href="https://youtu.be/berM7Dnnoz4?t=405" rel="nofollow">https://youtu.be/berM7Dnnoz4?t=405</a><p>"This is a whole new research field I am creating, that is why I called it Attacking Zcash Protocol For Fun And Profit, just like Smashing The Stack for Fun And Profit, it created a whole new field"<p>Also, for the hardcore HN nerds: The paper focuses on Zcash Protocol, but the ideas apply to any cryptocoin with a transaction graph, so Monero is definitely vulnerable. Much more vulnerable that Zcash Protocol.