2 points
*
Yes we can, it’s not perfect.
Here is how:
https://moonstoneresearch.com/2023/11/03/Postmortem-of-Monero-CCS-Hack.html
2 points
*
2 points
This type of tracing is only possible because it appears the attacker was using a Monerujo wallet with the PocketChange feature enabled, and the input selection algorithm with PocketChange enabled is so horribly busted that at every single step of the withdraw/churn, each tx had at least half a dozen rings with input members from the same originating transaction. Most transactions on-chain do NOT look like this.