Bitcoin over Tor isn't a Good Idea
@article{Biryukov2014BitcoinOT, title={Bitcoin over Tor isn't a Good Idea}, author={Alex Biryukov and Ivan Pustogarov}, journal={2015 IEEE Symposium on Security and Privacy}, year={2014}, pages={122-134} }
Bit coin is a decentralized P2P digital currency in which coins are generated by a distributed set of miners and transactions are broadcasted via a peer-to-peer network. While Bit coin provides some level of anonymity (or rather pseudonymity) by encouraging the users to have any number of random-looking Bit coin addresses, recent research shows that this level of anonymity is rather low. This encourages users to connect to the Bit coin network through anonymizers like Tor and motivates…
167 Citations
Unlinkable Coin Mixing Scheme for Transaction Privacy Enhancement of Bitcoin
- Computer Science, MathematicsIEEE Access
- 2018
This work presents an unlinkable coin mixing scheme that allows users to mix their bitcoins without trusting a third party and security and privacy of the mixing scheme are ensured through the standard ring signature and ECDSA unforgeability.
When A Small Leak Sinks A Great Ship: Deanonymizing Tor Hidden Service Users Through Bitcoin Transactions Analysis
- Computer ScienceComput. Secur.
- 2020
Analysis of Man-In-The-Middle of Attack on Bitcoin Address
- Computer Science, MathematicsICETE
- 2018
The large-scale of Bitcoin addresses, including secured and unsecured merchants websites, exchange platforms, online chat forums, social channels and blogs are reported on, to determine how many addresses are subject to Man-in-the-middle of attack.
Secure and anonymous decentralized Bitcoin mixing
- Computer Science, MathematicsFuture Gener. Comput. Syst.
- 2018
Deanonymization and Linkability of Cryptocurrency Transactions Based on Network Analysis
- Computer Science, Mathematics2019 IEEE European Symposium on Security and Privacy (EuroS&P)
- 2019
It is argued that timings of transaction messages leak information about their origin, which can be exploited by a well connected adversarial node, and a novel technique for linking transactions based on transaction propagation analysis is proposed.
A Survey on Anonymity and Privacy in Bitcoin-Like Digital Cash Systems
- Computer ScienceIEEE Communications Surveys & Tutorials
- 2018
This survey presents guidelines for designing an anonymity/privacy improvement and discusses future research directions, and examines the studies in the literature/Web in two major categories: analyses of anonymity and privacy in Bitcoin and extensions and alternatives to Bitcoin, which improve anonymity and Privacy.
A Two-Stage Deanonymization Attack Towards Bitcoin Hidden Service Nodes
- Computer Science2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, Cloud & Big Data Systems & Application (HPCC/DSS/SmartCity/DependSys)
- 2021
This paper proves that the combining of Bitcoin and Tor is easier to be exploited to deanonymize Bitcoin users by proposing a two-stage deanonymization attack towards Bitcoin hidden service nodes.
Anonymity Properties of the Bitcoin P2P Network
- Computer Science, MathematicsArXiv
- 2017
It is theoretically prove that Bitcoin's networking protocols (both pre- and post-2015) offer poor anonymity properties on networks with a regular-tree topology, and validated in simulation on a 2015 snapshot of the real Bitcoin P2P network topology.
Perimeter: A Network-Layer Attack on the Anonymity of Cryptocurrencies
- Computer Science, MathematicsFinancial Cryptography
- 2021
This paper presents a stealthier and harder-to-mitigate attack exploiting the interactions between the networking and application layers and shows that this attack, namely PERIMETER, is practical in today's Internet, achieves high accuracy in Bitcoin, and generalizes to encrypted cryptocurrencies e.g., Ethereum.
Clover: An anonymous transaction relay protocol for the bitcoin P2P network
- Computer SciencePeer-to-Peer Netw. Appl.
- 2022
Clover is proposed, a novel transaction relay protocol that protects the source of transaction messages with a simple, yet effective, design, and reduces the ability of the adversary to gain precision by opening multiple connections towards the same node.
References
SHOWING 1-10 OF 25 REFERENCES
An Analysis of Anonymity in Bitcoin Using P2P Network Traffic
- Computer Science, BusinessFinancial Cryptography
- 2014
This work developed heuristics for identifying ownership relationships between Bitcoin addresses and IP addresses and demonstrates how nearly 1,000 Bitcoin addresses can be mapped to their likely owner IPs by leveraging anomalous relaying behavior.
Bitcoin: A Peer-to-Peer Electronic Cash System
- Computer Science
- 2008
This work proposes a solution to the double-spending problem using a peer-to-peer network, where the network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof- of-work.
Compromising Tor Anonymity Exploiting P2P Information Leakage
- Computer ScienceArXiv
- 2010
This paper presents two techniques targeting BitTorrent users on top of Tor that reveal their real IP addresses and depicts the risks induced by this de-anonymization and shows that users' privacy violation goes beyond BitTorrent traffic and contaminates other protocols such as HTTP.
Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization
- Computer Science2013 IEEE Symposium on Security and Privacy
- 2013
Flaws both in the design and implementation of Tor's hidden services are exposed that allow an attacker to measure the popularity of arbitrary hidden services, take down hidden services and deanonymize hidden services.
Quantitative Analysis of the Full Bitcoin Transaction Graph
- Computer ScienceFinancial Cryptography
- 2013
This paper answers for the first time a variety of interesting questions about the typical behavior of users, how they acquire and how they spend their bitcoins, the balance of bitcoins they keep in their accounts, andHow they move bitcoins between their various accounts in order to better protect their privacy.
A Fistful of Bitcoins Characterizing Payments Among Men with No Names
- Computer Science
- 2013
This research includes work on anonymous communication systems, cyber-physical security, e-crime, and wireless privacy, as well as computer systems, networking, and security.
Deanonymisation of Clients in Bitcoin P2P Network
- Computer ScienceCCS
- 2014
This work presents an efficient method to deanonymize Bitcoin users, which allows to link user pseudonyms to the IP addresses where the transactions are generated and shows that a natural countermeasure of using Tor or other anonymity services can be cut-off by abusing anti-DoS countermeasures of the Bitcoin network.
Black ops of TCP/IP
- Black Hat USA, 2011, http://www.slideshare.net/dakami/ black-ops-of-tcpip-2011-black-hat-usa-2011.
- 2011
Tor security advisory: " relay early " traffic confirmation attack
- Tor security advisory: " relay early " traffic confirmation attack
Tor security advisory: "relay early" traffic confirmation attack
- 2014