Delivery-Date: Sun, 09 Nov 2014 17:49:31 -0500
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.7 required=5.0 tests=BAYES_00,DKIM_ADSP_CUSTOM_MED,
	DKIM_SIGNED,FREEMAIL_FROM,RCVD_IN_DNSWL_MED,RP_MATCHES_RCVD,T_DKIM_INVALID
	autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id DCB661E0AAC;
	Sun,  9 Nov 2014 17:49:29 -0500 (EST)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id E654330950;
	Sun,  9 Nov 2014 22:49:25 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 29EC830F1F
 for <tor-talk@lists.torproject.org>; Sun,  9 Nov 2014 22:49:23 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id NG12xY3CJUL4 for <tor-talk@lists.torproject.org>;
 Sun,  9 Nov 2014 22:49:23 +0000 (UTC)
Received: from mail-vc0-x236.google.com (mail-vc0-x236.google.com
 [IPv6:2607:f8b0:400c:c03::236])
 (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits))
 (Client CN "smtp.gmail.com",
 Issuer "Google Internet Authority G2" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id F333030950
 for <tor-talk@lists.torproject.org>; Sun,  9 Nov 2014 22:49:22 +0000 (UTC)
Received: by mail-vc0-f182.google.com with SMTP id im17so133213vcb.27
 for <tor-talk@lists.torproject.org>; Sun, 09 Nov 2014 14:49:20 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
 h=mime-version:in-reply-to:references:date:message-id:subject:from:to
 :content-type; bh=21Gg3amDfn8QM2y3WfrzLXg9VCphskNY4z+qy1c2LZ8=;
 b=Dj/NLX5sQHcdATkhbIMRmNh0TdgehhH3aJol7YMvps45WWLttjJXfXF0DBND89XOw3
 6M7c2rw9SIUrqV2OhqD9Jr51OBH3l8i0xAxEWeyQTdrPl2vuQYYMZ4cbM0PAZmzg6H/f
 OcwSb2crG78zJ7OwIgy5EEWmEKXcAaBrnFZAtf8g0QdCBjX8DuWV/viXb+cMQCNDQQ3F
 VNXlI39EtmUqWVP+U30CeX0OnRZEueV1OI8GrTQeOGFwPNFxLZsqfTd6RL/W8A6CKuO7
 W47DzqB7TvPMaQW6IrJZdKQtfwxnwMGINQOTawNeicS4lJi3R1IraGairXEdKlgSH3zk
 gmSw==
MIME-Version: 1.0
X-Received: by 10.220.136.17 with SMTP id p17mr18447249vct.3.1415573360029;
 Sun, 09 Nov 2014 14:49:20 -0800 (PST)
Received: by 10.221.64.74 with HTTP; Sun, 9 Nov 2014 14:49:19 -0800 (PST)
In-Reply-To: <CAJVRA1SiV81+=X6U21merRjxE58L4SxR-LOb=xjY-G0EFN5U2w@mail.gmail.com>
References: <CAJVRA1SiV81+=X6U21merRjxE58L4SxR-LOb=xjY-G0EFN5U2w@mail.gmail.com>
Date: Sun, 9 Nov 2014 17:49:19 -0500
Message-ID: <CAD2Ti2_qdkrCcx=URsPO0aZqTmr9p6MPuvEyG30PAtFJLPrUHw@mail.gmail.com>
From: grarpamp <grarpamp@gmail.com>
To: tor-talk@lists.torproject.org
Subject: Re: [tor-talk] Tor Blog: "Thoughts and Concerns about Operation
	Onymous"
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

On Sun, Nov 9, 2014 at 11:48 AM, coderman <coderman@gmail.com> wrote:
> Op:
> https://blog.torproject.org/blog/thoughts-and-concerns-about-operation-onymous

Bitcoin deanonymization
Ivan Pustogarov et al. have recently been conducting interesting
research on Bitcoin anonymity.
Apparently, there are ways to link transactions and deanonymize
Bitcoin clients even if they use Tor. Maybe the seized hidden services
were running Bitcoin clients themselves and were victims of similar
attacks.
https://crypto.stanford.edu/seclab/sem-14-15/pustogarov.html
Time and Place: Friday, November 7, 3:30pm. Gates 463A

Slides from the above presentation have been teased out and
are now available below.

https://crypto.stanford.edu/seclab/sem-14-15/stanford-2014.svg
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

