• Corpus ID: 246015479

Tutela: An Open-Source Tool for Assessing User-Privacy on Ethereum and Tornado Cash

  title={Tutela: An Open-Source Tool for Assessing User-Privacy on Ethereum and Tornado Cash},
  author={Mike Wu and Will McTighe and Kaili Wang and Istv{\'a}n Andr{\'a}s Seres and Nick Bax and Manuel Puebla and Mariano Mendez and Federico Carrone and Tom'as De Mattey and Herman O. Demaestri and Mariano Nicolini and Pedro Fontana},
A common misconception among blockchain users is that pseudonymity guarantees privacy. The reality is almost the opposite. Every transaction one makes is recorded on a public ledger and reveals information about one’s identity. Mixers, such as Tornado Cash, were developed to preserve privacy through “mixing” transactions with those of others in an anonymity pool, making it harder to link deposits and withdrawals from the pool. Unfortunately, it is still possible to reveal information about… 


Blockchain is Watching You: Profiling and Deanonymizing Ethereum Users
To the best of the knowledge, this work is the first to propose and implement Ethereum user profiling techniques based on quasi-identifiers and quantitatively compare algorithms in a recent branch of machine learning, the so-called graph representation learning, as well as time-of-day activity and transaction fee baseduser profiling techniques.
An inquiry into money laundering tools in the Bitcoin ecosystem
A first systematic account of opportunities and limitations of anti-money laundering (AML) in Bitcoin, a decentralized cryptographic currency proliferating on the Internet, is provided and it appears unlikely that a Know-Your-Customer principle can be enforced in the Bitcoin system.
Möbius: Trustless Tumbling for Transaction Privacy
Möbius achieves strong notions of anonymity, as even malicious senders cannot identify which pseudonyms belong to the recipients to whom they sent money, and is able to resist denial-of-service attacks.
Address Clustering Heuristics for Ethereum
This paper shows how addresses can be clustered in Ethereum, yielding entities that are likely in control of multiple addresses, and proposes heuristics that exploit patterns related to deposit addresses, multiple participation in airdrops and token authorization mechanisms.
MixEth: efficient, trustless coin mixing service for Ethereum
MixEth is presented, which is a trustless coin mixing service for Turing-complete blockchains, which achieves strong notions of anonymity and is able to resist denial-of-service attacks.
Bitcoin: A Peer-to-Peer Electronic Cash System
This work proposes a solution to the double-spending problem using a peer-to-peer network, where the network timestamps transactions by hashing them into an ongoing chain of hash-based proof-of-work, forming a record that cannot be changed without redoing the proof- of-work.
O Bitcoin Where Art Thou? Insight into Large-Scale Transaction Graphs
GraphSense is a solution that applies a graph-centric perspective on digital currency transactions that allows users to explore transactions and follow the money flow, facilitates analytics by semantically enriching the transaction graph, supports path and graph pattern search, and guides analysts to anomalous data points.
Towards Measuring Anonymity
An information theoretic model that allows to quantify the degree of anonymity provided by schemes for anonymous connections is introduced, which is based on the probabilities an attacker, after observing the system, assigns to the different users of the system as being the originators of a message.
Traveling the silk road: a measurement analysis of a large anonymous online marketplace
It is shown that Silk Road is overwhelmingly used as a market for controlled substances and narcotics, and that most items sold are available for less than three weeks.
Distributed Representations of Words and Phrases and their Compositionality
This paper presents a simple method for finding phrases in text, and shows that learning good vector representations for millions of phrases is possible and describes a simple alternative to the hierarchical softmax called negative sampling.