Delivery-Date: Thu, 27 Nov 2014 03:13:21 -0500
Return-Path: <tor-talk-bounces@lists.torproject.org>
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on moria.seul.org
X-Spam-Level: 
X-Spam-Status: No, score=-4.7 required=5.0 tests=BAYES_00,DKIM_ADSP_CUSTOM_MED,
	DKIM_SIGNED,FREEMAIL_FROM,RCVD_IN_DNSWL_MED,RP_MATCHES_RCVD,T_DKIM_INVALID
	autolearn=ham version=3.3.1
X-Original-To: archiver@seul.org
Delivered-To: archiver@seul.org
Received: from eugeni.torproject.org (eugeni.torproject.org [38.229.72.13])
	(using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits))
	(No client certificate requested)
	by khazad-dum.seul.org (Postfix) with ESMTPS id A96531E0E1B;
	Thu, 27 Nov 2014 03:13:19 -0500 (EST)
Received: from eugeni.torproject.org (localhost [127.0.0.1])
	by eugeni.torproject.org (Postfix) with ESMTP id A09BB31C15;
	Thu, 27 Nov 2014 08:13:15 +0000 (UTC)
Received: from localhost (localhost [127.0.0.1])
 by eugeni.torproject.org (Postfix) with ESMTP id 950EC31AB9
 for <tor-talk@lists.torproject.org>; Thu, 27 Nov 2014 08:13:12 +0000 (UTC)
X-Virus-Scanned: Debian amavisd-new at 
Received: from eugeni.torproject.org ([127.0.0.1])
 by localhost (eugeni.torproject.org [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id j9O6Inr3hQPE for <tor-talk@lists.torproject.org>;
 Thu, 27 Nov 2014 08:13:12 +0000 (UTC)
Received: from mail-wg0-x234.google.com (mail-wg0-x234.google.com
 [IPv6:2a00:1450:400c:c00::234])
 (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits))
 (Client CN "smtp.gmail.com",
 Issuer "Google Internet Authority G2" (not verified))
 by eugeni.torproject.org (Postfix) with ESMTPS id 4CEAF31AAF
 for <tor-talk@lists.torproject.org>; Thu, 27 Nov 2014 08:13:12 +0000 (UTC)
Received: by mail-wg0-f52.google.com with SMTP id a1so5746281wgh.25
 for <tor-talk@lists.torproject.org>; Thu, 27 Nov 2014 00:13:09 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;
 h=mime-version:date:message-id:subject:from:to:cc:content-type;
 bh=iaz9X/tcUdQuO1aG0aw3s0hoHYmnkSBVdXGIaUjgXdw=;
 b=U7v+PUg1ab2d44PlMDPwtPQn7y2ZQiDlqRNv1gvvRo6Tv1vAYXjvJsMiNuMlMaAepG
 mhMwKpSKMVl9JaktNEqQcYSCmawMdV9ktD+EnpzRgbOM0XtoYKq61ApOfDnYKZyXBXVa
 hkiuQ95FlQ0ymX9ZdLmwmWLJfsFuWj9tJcyQbvPWUAPoBITkql5cNL66NzKWjjqfiE6Y
 e1BgUBqQWU4hdVuSA8bH0TTWewnF9LRT/Fno6JjvlTpKNW/h9Jviu/bfdxPxM+PsDoE3
 jlzbJ6R0PM/gmZ54BVjY7/aZgjyBz8QtnBHygUsfaCppfPTQVhBz+IchjO1fPJiP74lP
 bA1w==
MIME-Version: 1.0
X-Received: by 10.194.62.76 with SMTP id w12mr38089480wjr.5.1417075989300;
 Thu, 27 Nov 2014 00:13:09 -0800 (PST)
Received: by 10.217.57.69 with HTTP; Thu, 27 Nov 2014 00:13:09 -0800 (PST)
Date: Thu, 27 Nov 2014 03:13:09 -0500
Message-ID: <CAD2Ti2-VLSMy5b+wXoaouZ_4r3ppX2Z4UYRiJ-ssQet1n9hidg@mail.gmail.com>
From: grarpamp <grarpamp@gmail.com>
To: cypherpunks@cpunks.org
Cc: tor-talk@lists.torproject.org
Subject: [tor-talk] Deanonymisation of clients in Bitcoin P2P network
X-BeenThere: tor-talk@lists.torproject.org
X-Mailman-Version: 2.1.15
Precedence: list
Reply-To: tor-talk@lists.torproject.org
List-Id: "all discussion about theory, design,
 and development of Onion Routing" <tor-talk.lists.torproject.org>
List-Unsubscribe: <https://lists.torproject.org/cgi-bin/mailman/options/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=unsubscribe>
List-Archive: <http://lists.torproject.org/pipermail/tor-talk/>
List-Post: <mailto:tor-talk@lists.torproject.org>
List-Help: <mailto:tor-talk-request@lists.torproject.org?subject=help>
List-Subscribe: <https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk>, 
 <mailto:tor-talk-request@lists.torproject.org?subject=subscribe>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: tor-talk-bounces@lists.torproject.org
Sender: "tor-talk" <tor-talk-bounces@lists.torproject.org>

http://orbilu.uni.lu/handle/10993/18679
Biryukov, Khovratovich, Pustogarov
Nov-2014

Bitcoin is a digital currency which relies on a distributed set of
miners to mint coins and on a peer-to-peer network to broadcast
transactions. The identities of Bitcoin users are hidden behind
pseudonyms (public keys) which are recommended to be changed
frequently in order to increase transaction unlinkability.
We present an efficient method to deanonymize Bitcoin users, which
allows to link user pseudonyms to the IP addresses where the
transactions are generated. Our techniques work for the most common
and the most challenging scenario when users are behind NATs or
firewalls of their ISPs. They allow to link transactions of a user
behind a NAT and to distinguish connections and transactions of
different users behind the same NAT. We also show that a natural
countermeasure of using Tor or other anonymity services can be cut-off
by abusing anti-DoS countermeasures of the bitcoin network. Our
attacks require only a few machines and have been experimentally
verified. We propose several countermeasures to mitigate these new
attacks.
-- 
tor-talk mailing list - tor-talk@lists.torproject.org
To unsubscribe or change other settings go to
https://lists.torproject.org/cgi-bin/mailman/listinfo/tor-talk

