Bitcoin Forum
May 06, 2024, 09:08:01 PM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1] 2 3 »  All
  Print  
Author Topic: Bitcoin IS anonymous  (Read 4643 times)
cypherdoc (OP)
Legendary
*
Offline Offline

Activity: 1764
Merit: 1002



View Profile
August 03, 2011, 10:46:47 PM
Last edit: August 03, 2011, 11:48:09 PM by cypherdoc
 #1

if it wasn't, why hasn't anyone identified the stealer of the bitcoins of Allinvain, MyBitcoin and various other hacks?
1715029681
Hero Member
*
Offline Offline

Posts: 1715029681

View Profile Personal Message (Offline)

Ignore
1715029681
Reply with quote  #2

1715029681
Report to moderator
"This isn't the kind of software where we can leave so many unresolved bugs that we need a tracker for them." -- Satoshi
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
evolve
Hero Member
*****
Offline Offline

Activity: 700
Merit: 500


daytrader/superhero


View Profile
August 03, 2011, 11:16:25 PM
 #2

because traffic analysis is time consuming and isnt free
marcus_of_augustus
Legendary
*
Offline Offline

Activity: 3920
Merit: 2348


Eadem mutata resurgo


View Profile
August 03, 2011, 11:18:41 PM
 #3


Pseudo-anonymous ...

... bitcoin's biggest deficiency as money, imo.

cypherdoc (OP)
Legendary
*
Offline Offline

Activity: 1764
Merit: 1002



View Profile
August 03, 2011, 11:49:53 PM
 #4

i'm not so sure how effective traffic analysis is with a determined thief.  multiple moves and splits significantly complicate identification IMO.  yes, i've read that article from those 2 researchers.
evolve
Hero Member
*****
Offline Offline

Activity: 700
Merit: 500


daytrader/superhero


View Profile
August 03, 2011, 11:54:56 PM
 #5

multiple addresses don't matter, it only temporarily obscures things.

the principle works the same as it does with captured military communications (SIGINT/COMINT). with enough raw traffic, you can make communication maps that will reveal who is who, even if you are up against dynamic (constantly changing) callsigns.
cypherdoc (OP)
Legendary
*
Offline Offline

Activity: 1764
Merit: 1002



View Profile
August 04, 2011, 12:08:41 AM
 #6

multiple addresses don't matter, it only temporarily obscures things.

the principle works the same as it does with captured military communications (SIGINT/COMINT). with enough raw traffic, you can make communication maps that will reveal who is who, even if you are up against dynamic (constantly changing) callsigns.

wouldn't you have to have revealed your identity in relation to one of the addresses?
Big Time Coin
Sr. Member
****
Offline Offline

Activity: 332
Merit: 250



View Profile
August 04, 2011, 12:17:15 AM
 #7

Yeah I was going to work on a program/script to figure out where all the mybitcoin coins went to track them.  Also to make a program to hook into the bitcoin p2p network and pull the IPS of the addresses they ended up at. 

Problem #1: How the hell am I supposed to know what addresses were Mybitcoin receiving addresses to begin with?  I can start a thread, but only a tiny fraction of people are going to see it or post their receiving addresses in there. 

Problem #2: The math isn't trivial, not immediately obvious to me that the algorithm will run in O(n) time.

Problem #3: those are just the first two, they seem unsolvable without many hours of time invested, and will only lead to the discovery of problem #4-?

When jgarzik talks about bitcoin not being anonymous, he is actually talking about "in theory" they are not anonymous.  In theory someone could create a companion program to track bitcoins.

In practice, I agree that they are anonymous, for now.

Big time, I'm on my way I'm making it, big time, oh yes
- Peter Gabriel
evolve
Hero Member
*****
Offline Offline

Activity: 700
Merit: 500


daytrader/superhero


View Profile
August 04, 2011, 12:23:24 AM
Last edit: August 04, 2011, 12:45:51 AM by evolve
 #8

no, not neccessarily. traffic analysis is about looking for patterns in the communications.     

for instance (and this is a extremely basic example using callsigns)

if you were to see traffic containing the following  ( > is the direction of communication):

ABC>DEF
DEF>GHI

JKL>DEF
DEF>MNO

and later you see

ABC>XQZ
XQZ>GHI

JKL>XQZ
XQZ>MNO


you can then infer that DEF is likely XQZ


of course the real world application of this gets MUCH more complex and has many more variables, this is just a very basic example. after mapping very large amounts of traffic, you can build a map of who talks to who, and when ; communication hierarchies become apparent. identities can be  revealed in relation to the known identities of others in the communication structure.

elggawf
Sr. Member
****
Offline Offline

Activity: 308
Merit: 250


View Profile
August 04, 2011, 12:55:45 AM
 #9

Problem #2: The math isn't trivial, not immediately obvious to me that the algorithm will run in O(n) time.

You could crowdsource that for cheaper and less effort than writing an algorithm. Make a website that lets people share links to block explorer transactions that are related, and I'm sure anyone who hasn't run screaming away from Bitcoin after the issues would be glad to help out (after all, they just got fucked hard).

In fact, I bet that's probably the more likely culprit for the price tanking rather than the coins being unloaded - lots of people got fucked hard and are exiting the market. We gotta stop pretending people's coins disappearing is good for the market, or that Bitcoin is useful solely as a store of wealth.  History has shown these two statements to be bullshit.

^_^
Maged
Legendary
*
Offline Offline

Activity: 1204
Merit: 1015


View Profile
August 04, 2011, 01:05:41 AM
 #10

Problem #1: How the hell am I supposed to know what addresses were Mybitcoin receiving addresses to begin with?  I can start a thread, but only a tiny fraction of people are going to see it or post their receiving addresses in there. 
Quite easily. Using the blockchain, you can narrow down which transactions were from an ewallet by looking for transactions with almost no change. From there, some additional analysis can tell you with near certainty which addresses belonged to Mybitcoin.

ctoon6
Sr. Member
****
Offline Offline

Activity: 350
Merit: 251



View Profile
August 04, 2011, 02:11:31 AM
 #11

if they used a good laundering service, you would never know for sure.

cypherdoc (OP)
Legendary
*
Offline Offline

Activity: 1764
Merit: 1002



View Profile
August 04, 2011, 02:32:43 AM
 #12

no, not neccessarily. traffic analysis is about looking for patterns in the communications.     

for instance (and this is a extremely basic example using callsigns)

if you were to see traffic containing the following  ( > is the direction of communication):

ABC>DEF
DEF>GHI

JKL>DEF
DEF>MNO

and later you see

ABC>XQZ
XQZ>GHI

JKL>XQZ
XQZ>MNO


you can then infer that DEF is likely XQZ


of course the real world application of this gets MUCH more complex and has many more variables, this is just a very basic example. after mapping very large amounts of traffic, you can build a map of who talks to who, and when ; communication hierarchies become apparent. identities can be  revealed in relation to the known identities of others in the communication structure.



you're right.  thats an extremely simple and highly unlikely address scenario.  even for me, someone who isn't trying to hide anything, ABC & MNO would never be used twice since a new receiving address is automatically inserted in the clipboard after every receive and any change returned from a sending address gets automatically assigned to new address.
wumpus
Hero Member
*****
Offline Offline

Activity: 812
Merit: 1022

No Maps for These Territories


View Profile
August 04, 2011, 02:44:59 AM
 #13


Pseudo-anonymous ...

... bitcoin's biggest deficiency as money, imo.
What? that it's too anonymous or to little anonymous?

Seems that this is a good compromise between fully transparent and fully anonymous. It's traceable but only if you're prepared to do a shitload of work. Which means that people won't bother for anything but very serious cases.

Bitcoin Core developer [PGP] Warning: For most, coin loss is a larger risk than coin theft. A disk can die any time. Regularly back up your wallet through FileBackup Wallet to an external storage or the (encrypted!) cloud. Use a separate offline wallet for storing larger amounts.
k9quaint
Legendary
*
Offline Offline

Activity: 1190
Merit: 1000



View Profile
August 04, 2011, 02:49:38 AM
 #14

if it wasn't, why hasn't anyone identified the stealer of the bitcoins of Allinvain, MyBitcoin and various other hacks?

When the coins at mybitcoin are exchanged for dollars or euros, the identity of whoever converted those coins will be known to the exchange. Until that time, the coins from mybitcoin are exactly where they have always been. There is simply no way (at the moment) for their rightful owners to access them.

Bitcoin is backed by the full faith and credit of YouTube comments.
ctoon6
Sr. Member
****
Offline Offline

Activity: 350
Merit: 251



View Profile
August 04, 2011, 02:58:05 AM
 #15

if it wasn't, why hasn't anyone identified the stealer of the bitcoins of Allinvain, MyBitcoin and various other hacks?

When the coins at mybitcoin are exchanged for dollars or euros, the identity of whoever converted those coins will be known to the exchange. Until that time, the coins from mybitcoin are exactly where they have always been. There is simply no way (at the moment) for their rightful owners to access them.

not really, they could always dead drop it.

jgarzik
Legendary
*
Offline Offline

Activity: 1596
Merit: 1091


View Profile
August 04, 2011, 03:05:24 AM
 #16

No, it's not "just theory".

By observing timing and size of network traffic bursts, one may deduce who is the sender of a bitcoin transaction, even if the network connection is encrypted.  And by default, the connection is not encrypted.

This is obviously predicated on someone already observing you, as well as actively sampling the P2P network.  If you find out about a crime after the fact, it is a lot more difficult to associate a transaction with a network address.

Other spends from the same wallet may compromise your identity, if you have ever posted a public bitcoin address somewhere.

In a closed ecosystem without ISP wiretaps and social engineering, bitcoin is highly private.  Use of dead drops, transaction delaying, mixing services and other means help increase anonymity, but are too difficult / time consuming for most people to want to use.  So we must live in the real world, where methods of discovering who is using bitcoin are already well known and used in the field today (keylogging, data sniffing and snarfing, network timing analysis, ...)


Jeff Garzik, Bloq CEO, former bitcoin core dev team; opinions are my own.
Visit bloq.com / metronome.io
Donations / tip jar: 1BrufViLKnSWtuWGkryPsKsxonV2NQ7Tcj
wumpus
Hero Member
*****
Offline Offline

Activity: 812
Merit: 1022

No Maps for These Territories


View Profile
August 04, 2011, 03:17:08 AM
 #17

By observing timing and size of network traffic bursts, one may deduce who is the sender of a bitcoin transaction, even if the network connection is encrypted.  And by default, the connection is not encrypted.
This is why it would make no sense to just encrypt bitcoin traffic as a separate overlay network.

Making use of an existing onion net such as I2P/Tor allows hiding the bitcoin traffic between other traffic. Still not 100% fool proof, as you could always do some kind of statistic analysis, but it moves it a lot more toward the tinfoil hat domain.

Anyway, the most effective way to trace people is indeed to have inside info at the exchanges. At the point where bitcoins are exchanged for bank money it's easy to ID who is behind it. From there, the network can be followed. This will become infeasible when there are people that are only paid in bitcoin and spend bitcoin and never trade, but my gut feeling is that those are really rare at this moment.

Bitcoin Core developer [PGP] Warning: For most, coin loss is a larger risk than coin theft. A disk can die any time. Regularly back up your wallet through FileBackup Wallet to an external storage or the (encrypted!) cloud. Use a separate offline wallet for storing larger amounts.
cypherdoc (OP)
Legendary
*
Offline Offline

Activity: 1764
Merit: 1002



View Profile
August 04, 2011, 03:45:17 AM
 #18


Pseudo-anonymous ...

... bitcoin's biggest deficiency as money, imo.
What? that it's too anonymous or to little anonymous?

Seems that this is a good compromise between fully transparent and fully anonymous. It's traceable but only if you're prepared to do a shitload of work. Which means that people won't bother for anything but very serious cases.


i'd consider MyBitcoin to be a very serious case.  so lets see if anyone in the near future can identify the thief.  i highly doubt it. 

this will be an excellent real world test case.
cypherdoc (OP)
Legendary
*
Offline Offline

Activity: 1764
Merit: 1002



View Profile
August 04, 2011, 03:46:12 AM
 #19

if it wasn't, why hasn't anyone identified the stealer of the bitcoins of Allinvain, MyBitcoin and various other hacks?

When the coins at mybitcoin are exchanged for dollars or euros, the identity of whoever converted those coins will be known to the exchange. Until that time, the coins from mybitcoin are exactly where they have always been. There is simply no way (at the moment) for their rightful owners to access them.

how do you know this?  do you have access to the public addresses at which the coins are stored?  if so, please provide.
cypherdoc (OP)
Legendary
*
Offline Offline

Activity: 1764
Merit: 1002



View Profile
August 04, 2011, 03:50:44 AM
 #20

Use of dead drops, transaction delaying, mixing services and other means help increase anonymity, but are too difficult / time consuming for most people to want to use. 

i know of no one more motivated than MyBitcoin.

what is a dead drop?
Pages: [1] 2 3 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!