Compartilhe este artigo

Privacy Coin Firo Re-Launches Lelantus Protocol After February Suspension

The protocol was disabled while the Firo team investigated a number of suspicious transactions .

Atualizado 14 de set. de 2021, 12:46 p.m. Publicado 23 de abr. de 2021, 7:23 p.m. Traduzido por IA
viktor-forgacs-LNwIJHUtED4-unsplash

The Firo privacy coin’s Lelantus protocol has been reactivated following a hard fork on April 22. The hard fork took place on block 365544.

STORY CONTINUES BELOW
Não perca outra história.Inscreva-se na Newsletter The Protocol hoje. Ver Todas as Newsletters

The protocol was disabled due to a number of suspicious transactions while the Firo team investigated. This was the second recent obstacle for the protocol, which also underwent a 51% attack earlier this year.

“In February, an unknown attacker utilized Firo’s Lelantus privacy protocol to forge fake proofs in an attempt to generate new coins, which led to abnormalities in the system,” said project steward Reuben Yap in an email. “The Firo team swiftly noticed this and used the emergency switch functionality to temporarily disable Lelantus until the situation could be resolved.”

Read more: Privacy Coin Firo Temporarily Disables Protocol to Investigate ‘Suspicious Transactions’

According to Yap, Lelantus was audited before its deployment on the mainnet. However, while translating the math to code not everything was caught – even in the audited cryptographic library.

Firo has since incorporated a variety of optimizations to harden the protocol.

How the attack occurred

In this case, the attacker forged a spend, but in order to make the transaction seem legit the person “time traveled” back a bit to set up the necessary events. Specifically, the attacker started constructing the first proof. Halfway through, the person stopped and made a different proof.

Upon completing the second proof, the attacker went back and edited the first proof, doing the necessary back-calculation to ensure the math would check out (balancing the serial numbers to fool the verifier) and both proofs would work together.

When executed properly, this sort of double-spend attack allows the nefarious actor to “duplicate” funds.

“If the audience sees you shuffle the deck first, it’s easier to think you did something wild and magical,” said Dr. Aaron Feickert, a former Monero Research Lab researcher, describing the attack. “This attack is like being allowed to examine the deck and order it in front of the audience. The trick doesn’t seem so magical anymore.”

Earlier this month, Feickert joined the Firo team under a full-time contract through Cypher Stack, a blockchain consultancy and digital utilities provider. In this role, he has helped Firo analyze the suspicious activity attack and implement fixes alongside Firo’s Aram Jivanyan, Levon Petrosyan, Peter Shugalev and PinkPanther. He also recommended several of the optimizations Firo added, helped harden the protocol and provided design feedback for Lelantus version 2.

Read more: Privacy Coin Firo in Midst of ‘Hash War’ With 51% Attacker

The Lelantus protocol was originally launched in mid-January. It introduced “on-by-default” privacy and prompts users to anonymize their funds with the goal of ensuring transactions sent by official Firo wallets stay private. Transparent transactions have to be explicitly selected. It also allows for partial redemptions of its native FIRO coin through its burn-and-redeem model.

Mais para você

State of the Blockchain 2025

State of the Blockchain 16:9

L1 tokens broadly underperformed in 2025 despite a backdrop of regulatory and institutional wins. Explore the key trends defining ten major blockchains below.

O que saber:

2025 was defined by a stark divergence: structural progress collided with stagnant price action. Institutional milestones were reached and TVL increased across most major ecosystems, yet the majority of large-cap Layer-1 tokens finished the year with negative or flat returns.

This report analyzes the structural decoupling between network usage and token performance. We examine 10 major blockchain ecosystems, exploring protocol versus application revenues, key ecosystem narratives, mechanics driving institutional adoption, and the trends to watch as we head into 2026.

Mais para você

‘Most important tokenholder rights debate’: Aave faces identity crisis

person casting votes

The Aave community has become sharply divided over control of the protocol’s brand and related assets, intensifying an ongoing dispute over the relationship between the DAO and Aave Labs.

O que saber:

  • Aave's community members and participants have become sharply divided in a debate over control of the protocol’s brand and related assets, intensifying an ongoing dispute over the relationship between the DAO and Aave Labs.
  • The debate has drawn outsized attention because it cuts to a central question facing many of crypto’s largest protocols: the tension between decentralized governance and the centralized teams that often drive execution.