Monerolink only applies to very old transactions that intentionally turned off privacy by setting mixin to zero.
Liar. Readers click the monerolink and you can see for yourselves.
The "vulnerabilities" that blowhard detailed exist only in his head. For his vulnerabilities to work, an attacker would have to own over 80% of all outputs on the blockchain
Liar. That has already been refuted in the comment section where the MNL-001 research report was discussed and refuted by him.
Lying will not help you.
I'm a liar? Ok, I have great news for you then. Why not use your fake news Monerolink tool to win the bounty in this challenge:
www.monerotrackingchallenge.com/Please claim the prize.
It seems you're the only liar here. Most likely a shill hired by Zooko to promote his honeypot coin.
As to your comment about snobbishness, sorry, but the guy has no credentials, little or no relevant work in the field of cryptography, zero published papers, where's his credibility? Then he has the audacity to make grandiose claims on subjects which he does not fully comprehend. Thanks, but I'll take the word of the PhDs over some internet rando.
P.S. If you need confirmation of that guy's separation from reality, read about the latest imaginary attack he came up with. Apparently, he thinks that miners would nuke the value of their own hardware to steal coins from Segwit transactions. Coins which would immediately drop in value to zero. So is the attack theoretically possible? Yeah, on a testnet you can simulate it. But in the real world, the one that has rational actors and economic incentives, the attack will never transpire.