FINDING · DETECTION

Standard ECDSA signature schemes are vulnerable to public key recovery attacks that allow an adversary to recover the signer's public verification key from any signature, linking all pseudonymous messages authored under different one-time pseudonyms back to a single user identity. This attack succeeds without any side-channel — it operates solely on the message and its ECDSA signature.

From 2025-kamali-anixAnix: Anonymous Blackout-Resistant Microblogging with Message Endorsing · §4.2 · 2025 · Symposium on Security \& Privacy

Implications

Tags

censors
generic
defenses
meta-resistance

Extracted by claude-sonnet-4-6 — review before relying.