Anonymity Mining - Technical Details

I am trying to understand the technical details of how anonymity mining (AP/TORN) actually works, but I can not find any documentation for this. Specifically, I am trying to understand the technicalities of how privacy is preserved. The Tornado Cash whitepaper describes the basics of Tornado Cash but does not get into the system for anonymity mining and how it relates to the basic system. Is there a similar document for the anonymity mining side of the system? Or is reading the contract code the only way to learn?

I have read the technical overview posted here, and also the medium post but neither of these offer much technical detail.

1 Like