Deanonymisation of Clients in Bitcoin P2P Network
5 stars based on
37 reviews
Will attack find my wallet if I run multiple nodes, and the one node that talks to the outside world would have an empty wallet? The attack will determine the public IP address of the node which talks to the outside world. Since an octet of entry nodes can serve as your personal identifier if you make several transactions during one session all these transactions from all your wallets can be linked, even if they use different deanonymization of clients in bitcoin p2p networking public keys.
The same thing holds if a user is behind multiple VPNs and even if the user goes through the Tor network. Dan Kaminsky demonstrated that it is relatively easy to tie bitcoin addresses to IP addresses by watching the network, so what's new here? This analysis will work only for peers who are not behind NATs we call them servers or users who were unlucky to connect to one of the attacker's nodes note that most of the peers about vs are behind NATs and cannot not be connected to.
Our analysis handles users behind NATs. Our attack has a very low false positive rate. Is it possible for someone to mount a long-term anti-TOR attack that would permanently stop people using TOR from accessing the Bitcoin network? Moreover Tor would protect anonymity of this person, so it would be very hard to stop. Even if Tor Exit servers are banned by the attacker, Tor hidden services should still work?
Individual hidden services can be black-holedthis requires only a bit of sophistication on the deanonymization of clients in bitcoin p2p networking of the attacker and is very cheap to mount. Moreover It might be possible to ban guard nodes and thus make Bitcoin hidden services unusable.
How noticeable is this attack and what kind of resources it requires? The Tor disconnection part is easy to mount from a single computer but is fairly noticeable, since all bitcoin transactions made via Tor would deanonymization of clients in bitcoin p2p networking.
The octet identifier sniffing requires to make connections to each bitcoin "server" peer to be more reliable. This would be less noticeable if done from a distributed set of IP addresses in a gradual manner. It requires some dedication and patience from the deanonymization of clients in bitcoin p2p networking, but it is deanonymization of clients in bitcoin p2p networking cheap about 50 IP addresses would be enough. Are altcoins affected as well? We did not check it on other alt-currencies, but those that share Bitcoin's P2P network code should have similar problems.
What could be the countermeasures? Refreshing the entry nodes after every transaction assuming that a new connections are chosen at random should prevent the attack. The attack would also not work if many users share a proxy.
However if such proxy is publicly known the attacker can force Bitcoin servers to ban its address. Are mobile clients affected? Yes, this is similar to the clients of an ISP case. Is this attack related to the de-anonymization attacks by Shamir et al.
No, what we do is complementary to the Bitcoin transaction graph analysis. Those attacks analyze the transaction graph in the offline mode and try to correlate the Bitcoin pseudonym s and glue pseudonyms together.
Our attack works on the network level and can link transactions in real time even if the pseudonyms are new or totally unrelated in the transaction graph. Retrieved from " https: Navigation menu Personal tools Log in. Views Read View source View history. This page was last edited on 17 Juneat