Bitcoin Forum
May 25, 2024, 05:17:26 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: Bitcoin-Over-Tor Anonymity 'Can Be Busted for $2,500 a Month'  (Read 1098 times)
CryptoCurrencyInc.com (OP)
Sr. Member
****
Offline Offline

Activity: 476
Merit: 250



View Profile
October 29, 2014, 08:46:19 PM
 #1

Bitcoin-Over-Tor Anonymity 'Can Be Busted for $2,500 a Month'
http://www.coindesk.com/bitcoin-tor-anonymity-can-busted-2500-month/

                                                                               
                 
                                                       ╓▄▌██P                   
                                                 ╔▄▌███▀███▌                   
                                           ▄▄▌██▀▀╚  ╓██╩██                     
                                     ▄▄███▀▀╙      ▄██  ▓█                     
                               ▄▌███▀▀+          ▄█▀   ▐█                       
                        ,▄▌███▀▀¬              ▓█▀     █▄                       
                  ,▄▌███▀▀                  ,██▀      █▌                       
               '█████▌▄▄,                 ╓██╩       ██                         
                  ▀██▌▐▀▀▀█████▌▌▄▄╓    ▄██¬        ▄█                         
                     ▀██▄        ╚▀▀▀████          ▐█═                         
                        ▀██▄        ▓█▀██          █▀                           
                           ▀██▄  ,██▀   █µ        ██                           
                              ▀███Z     ██       ██                             
                                ▐██     ▐█      ▄█                             
                              ,,╓╓█▓▄▌   █▌    ▐█U                             
                        º▄▓▓▓▓▓▓▓▓▓███   ▀█    █▌                               
                          ▀█▓▓▓▓▓████▀█▌  █▌  ██                               
                            ▀███████▌  ▀█µ▀█ ██                                 
                              ▀█████     ███▓█                                 
                                ▐███      ▀██Ñ                                 
                                            ▀                             

Walter Rothbard
Sr. Member
****
Offline Offline

Activity: 476
Merit: 250


Bytecoin: 8VofSsbQvTd8YwAcxiCcxrqZ9MnGPjaAQm


View Profile WWW
October 29, 2014, 09:25:50 PM
 #2

Basically they detail a denial of service attack to Bitcoin nodes running behind tor, by sending transactions from all known tor exit nodes until all those nodes are banned for 24 hours.

It seems to me the solution to that is to run your own Bitcoin node outside of tor and whitelist the IP address you want to connect from, or a modification to the protocol that allows transactions to be specially signed and let through even from blocked nodes.

madmadmax
Hero Member
*****
Offline Offline

Activity: 740
Merit: 501



View Profile
October 29, 2014, 11:29:21 PM
 #3

You could compile Bitcoin from source removing its DDoS protection (since it is useless behind Tor anyway) viola, problem solved.








       ▄▄▄▄▄               ▄▄▄▄▄
   ▄▄█▀▀▀▀▀▀██▄        ▄▄█▀▀▀▀▀▀▀█▄
 ▄██▀        ▀██▄    ▄██▀         ▀█▄
██▀            ▀██▄  ▀▀             ██
██               ▀██        ▄▄▄▄▄▄▄▄██
██                ▀██▄      ▀▀▀▀▀▀▀▀▀▀
 ██▄          ▄██   ▀██▄          ▄▄▄
  ▀██▄      ▄██▀      ▀██▄▄     ▄██▀
    ▀▀██████▀▀          ▀▀██████▀▀


Unchained Smart Contracts
Decentralized Oracle
Infinitly Scalable
Blockchain Technology
Turing-Complete
State-Channels



                 ▄████▄▄    ▄
██             ████████████▀
████▄         █████████████▀
▀████████▄▄   █████████████
▄▄█████████████████████████
██████████████████████████
  ▀██████████████████████
   █████████████████████
    ▀█████████████████▀
      ▄█████████████▀
▄▄███████████████▀
   ▀▀▀▀▀▀▀▀▀▀▀

             ▄██▄
     ▄      ▐████   ▄▄
   █████     ██████████
    █████████████████▀
 ▄████████████▀████▌
██████████     ▀████    
 ▀▀   █████     ██████████
      ▀████▌▄████████████▀
    ▄▄▄███████████████▌
   ██████████▀    ▐████
    ▀▀▀  ████▌     ▀▀▀
         ▀███▀
f


Ricke
Full Member
***
Offline Offline

Activity: 164
Merit: 100


View Profile
October 29, 2014, 11:49:54 PM
 #4

If I'm correct, this method "clues" a torrified bitcoin client to an attacker's static IP by banning all other nodes.

Quick solution: Avoid using a single (bitcoind) setup for two identities which shouldn't get singled out as just one. Same applies to clients like Electrum.

Other solution: Signing a transaction by the client while broadcasting it through tor over pushtx. Example URL: https://blockchain.info/pushtx

Verkaufe Bitcoin gegen Bargeld (Wuppertal und Düsseldorf, Handel im öffenlichen Raum, z.B. bei McDonalds), privat zu privat und völlig anonym. Konditionen im Thread; Individualabsprachen möglich
(Ich mache mit Erstkontakten nur kleinere Handel, weiteres ja nach Kurs, Vertrauen, mein Bedarf, Ermessen und Situation)
scarsbergholden
Hero Member
*****
Offline Offline

Activity: 686
Merit: 500



View Profile
October 30, 2014, 12:11:30 AM
 #5

Basically they detail a denial of service attack to Bitcoin nodes running behind tor, by sending transactions from all known tor exit nodes until all those nodes are banned for 24 hours.

It seems to me the solution to that is to run your own Bitcoin node outside of tor and whitelist the IP address you want to connect from, or a modification to the protocol that allows transactions to be specially signed and let through even from blocked nodes.
Another solution would be to not rely a transaction via tor with a full node, but rather use either blockchain.info/pushtx or a light client like multibit.

There is no real reason to need to use a full node to push a tx. You could sufficiently protect yourself by using a full node to monitor for you receiving a TX or to use a trusted block explorer that you can access via a tor hidden service

ANTIcentralized
Full Member
***
Offline Offline

Activity: 210
Merit: 100


View Profile
October 31, 2014, 06:17:02 AM
 #6

You could compile Bitcoin from source removing its DDoS protection (since it is useless behind Tor anyway) viola, problem solved.
You would need to get the nodes that are operating outside of tor to remove the feature that "bans" a bitcoin node after x number of invalid transactions, this feature is necessary as a node will quickly get overwhelmed with invalid transactions
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!