• Corpus ID: 14471821

Join Me on a Market for Anonymity

@inproceedings{Mser2016JoinMO,
  title={Join Me on a Market for Anonymity},
  author={Malte M{\"o}ser and Rainer B{\"o}hme},
  year={2016}
}
We present the first measurement study of JoinMarket, a growing marketplace for more anonymous transfers in the Bitcoin ecosystem. Our study reveals that this market is funded with multiple thousand bitcoins and generated a turnover of almost 8 million USD over the course of eight months. Assessing the resilience of the market against a wellfunded attacker, we discover that in a typical scenario, a selective attack with 90 % success rate requires an investment of 32,000 USD (which is… 

Figures and Tables from this paper

Anonymous Alone ? Measuring Bitcoin ’ s Second-Generation Anonymization Techniques

There is a tradeoff between the choice of users’ preferred protection mechanisms and the risk that pertaining transactions can be singled out, which hurts privacy unless a critical mass adopts the mechanism.

Anonymous Alone? Measuring Bitcoin’s Second-Generation Anonymization Techniques

There is a tradeoff between the choice of users' preferred protection mechanisms and the risk that pertaining transactions can be singled out, which hurts privacy unless a critical mass adopts the mechanism.

An Empirical Analysis of Anonymity in Zcash

This paper investigates all facets of anonymity in Zcash's transactions, ranging from its transparent transactions to the interactions with and within its main privacy feature, a shielded pool that acts as the anonymity set for users wishing to spend coins privately.

Pricing Anonymity

Using the Shapley value for nontransferable utility cooperative games, the formation of the anonymity set and the fee for any arbitrary number of makers selected by the taker are characterized.

The Potential Profitability of Spams Traditional spamming is a lucrative business : in 2008 , Kanich

It is concluded that sextortion spamming is a lucrative business and spammers will likely continue to send bulk emails that try to extort money through cryptocurrencies.

Mixing Coins of Different Quality: A Game-Theoretic Approach

This work presents two stylized models of mixing with perfect and imperfect information and analyzes them for three distinct quality propagation policies: poison, haircut, and seniority.

Stake Shift in Major Cryptocurrencies: An Empirical Study

This paper surveys existing provably secure PoS proposals to observe that the above time gap between the two stake distributions, which is called stake distribution lag, amounts to several days for each of these protocols, and empirically quantify its effects.

Spams meet Cryptocurrencies: Sextortion in the Bitcoin Ecosystem

It is concluded that sextortion spamming is a lucrative business and spammers will likely continue to send bulk emails that try to extort money through cryptocurrencies.

Ransomware Payments in the Bitcoin Ecosystem

A data-driven method for identifying and gathering information on Bitcoin transactions related to illicit activity based on footprints left on the public Bitcoin blockchain is presented and found that the market is highly skewed with only a few number of players responsible for the majority of the payments.

Usability of Cryptocurrency Wallets Providing CoinJoin Transactions

A comprehensive usability study of three main Bitcoin wallets that integrate the CoinJoin technique, i.e., Joinmarket, Wasabi, and Samourai is provided in order to evaluate the ease of use of these wallets using usability and fundamental design criteria.

References

SHOWING 1-10 OF 46 REFERENCES

On the Economics of Anonymity

Some reasons why anonymity systems are particularly hard to deploy are explored, the incentives to participate either as senders or also as nodes are enumerated, and a general model is built to describe the effects of these incentives.

Traveling the silk road: a measurement analysis of a large anonymous online marketplace

It is shown that Silk Road is overwhelmingly used as a market for controlled substances and narcotics, and that most items sold are available for less than three weeks.

Mixcoin: Anonymity for Bitcoin with Accountable Mixes

It is demonstrated that incentives of mixes and clients can be aligned to ensure that rational mixes will not steal, and the scheme offers similar anonymity to traditional communication mixes against active attackers.

An Analysis of Anonymity in the Bitcoin System

  • F. ReidMartin Harrigan
  • Computer Science, Mathematics
    2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing
  • 2011
It is shown that the two networks derived from Bitcoin's public transaction history have a non-trivial topological structure, provide complementary views of the Bit coin system and have implications for anonymity.

Trends, Tips, Tolls: A Longitudinal Study of Bitcoin Transaction Fees

Empirical evidence from a historical analysis of agents’ revealed behavior concerning their payment of transaction fees identifies several regime shifts, which can be largely explained by changes in the default client software or actions of big intermediaries in the ecosystem.

An inquiry into money laundering tools in the Bitcoin ecosystem

A first systematic account of opportunities and limitations of anti-money laundering (AML) in Bitcoin, a decentralized cryptographic currency proliferating on the Internet, is provided and it appears unlikely that a Know-Your-Customer principle can be enforced in the Bitcoin system.

Quantitative Analysis of the Full Bitcoin Transaction Graph

This paper answers for the first time a variety of interesting questions about the typical behavior of users, how they acquire and how they spend their bitcoins, the balance of bitcoins they keep in their accounts, andHow they move bitcoins between their various accounts in order to better protect their privacy.

CoinParty: Secure Multi-Party Mixing of Bitcoins

By the application of threshold signatures to Bitcoin mixing, CoinParty achieves anonymity by orders of magnitude higher than related work as it is quantified by analyzing transactions in the actual Bitcoin blockchain and is first among related approaches to provide plausible deniability.

Sybil-Resistant Mixing for Bitcoin

Xim is proposed, a two-party mixing protocol that is compatible with Bitcoin and related virtual currencies, and is the first decentralized protocol to simultaneously address Sybil attackers, denial-of-service attacks, and timing-based inference attacks.

Beware the Middleman: Empirical Analysis of Bitcoin-Exchange Risk

Using a proportional hazards model, it is found that an exchange’s transaction volume indicates whether or not it is likely to close, and that less popular exchanges are more likely to be shut than popular ones.