Bitcoin Forum
April 19, 2024, 12:37:09 AM *
News: Latest Bitcoin Core release: 26.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: « 1 [2]  All
  Print  
Author Topic: [Discussion] Dandelion - A protocol to hide transaction origin  (Read 921 times)
Carlton Banks
Legendary
*
Offline Offline

Activity: 3430
Merit: 3071



View Profile
October 03, 2018, 06:16:44 PM
Last edit: October 03, 2018, 06:27:44 PM by Carlton Banks
 #21

Tor masks your real IP. But if you send 2 or more transactions from a Tor node, your peers know that they received them first from you.
I am not an expert on tor network, but I don't think it is that easy.

if you're not careful the broadcasting server might know that both the transactions came from the same source.
But it won't know your IP.

Also not a Tor expert, but the Bitcoin client implies that the tor exit node is the IP your Bitcoin peer communicates with. A Bitcoin peer who receives your relayed transactions presumably receives them from the exit node's IP, which it necessarily knows. The exit node knows the contents of the transaction you relay, but it shouldn't know your real IP, assuming Tor is perfect. Which is obviously not the case.

So your peer does know that the transactions came from the same IP, but maybe other Bitcoin nodes could be using the same exit node simultaneously. For that reason, using Tor is more anonymous than I implied.


Just restart your tor node/browser between sending different transactions and you should be fine.
Dark markets have been using Tor since the beginning of bitcoin and nobody ever find them by looking at the tx origin Smiley

Right. Dandelion should give you better transaction anonymity than that without having to restart your Bitcoin node between sending each transaction.

Vires in numeris
1713487029
Hero Member
*
Offline Offline

Posts: 1713487029

View Profile Personal Message (Offline)

Ignore
1713487029
Reply with quote  #2

1713487029
Report to moderator
1713487029
Hero Member
*
Offline Offline

Posts: 1713487029

View Profile Personal Message (Offline)

Ignore
1713487029
Reply with quote  #2

1713487029
Report to moderator
1713487029
Hero Member
*
Offline Offline

Posts: 1713487029

View Profile Personal Message (Offline)

Ignore
1713487029
Reply with quote  #2

1713487029
Report to moderator
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1713487029
Hero Member
*
Offline Offline

Posts: 1713487029

View Profile Personal Message (Offline)

Ignore
1713487029
Reply with quote  #2

1713487029
Report to moderator
1713487029
Hero Member
*
Offline Offline

Posts: 1713487029

View Profile Personal Message (Offline)

Ignore
1713487029
Reply with quote  #2

1713487029
Report to moderator
1713487029
Hero Member
*
Offline Offline

Posts: 1713487029

View Profile Personal Message (Offline)

Ignore
1713487029
Reply with quote  #2

1713487029
Report to moderator
piotr_n
Legendary
*
Offline Offline

Activity: 2053
Merit: 1354


aka tonikt


View Profile WWW
October 03, 2018, 06:43:44 PM
 #22

I just use any of the send transaction web pages:
https://en.bitcoin.it/wiki/Transaction_broadcasting

some of them don't work through tor, but others do.

I can however understand that someone might have a need to anonymously broadcast new txs in a more systemic way, in which case my method will not be very good for him.
but then, as I say, there are safety concerns of people who'd have to participate in this kind of open source system.

Check out gocoin - my original project of full bitcoin node & cold wallet written in Go.
PGP fingerprint: AB9E A551 E262 A87A 13BB  9059 1BE7 B545 CDF3 FD0E
DooMAD
Legendary
*
Offline Offline

Activity: 3766
Merit: 3099


Leave no FUD unchallenged


View Profile
October 03, 2018, 06:53:23 PM
 #23

but as the reality shows the devs are rather reluctant to introduce "privacy" features into bitcoin software.

I wouldn't say that's fair.  They're introducing this feature for starters, but then Schnorr will bring some more privacy benefits once that's good to go.  It sounds like testing is ongoing with Bulletproofs and Confidential transactions. 


Although it is brilliant idea and seems to be helpful for users who run a full node, I afraid it is hardly enough for average users. Typically, they use either online wallets and are totally compromised or spv wallets which disclose the addresses they are interested in, to their (potentially spy) peers  anyway.

We can only provide people with the tools.  We can't force people to use them.  It's up to them how much privacy they want to maintain.

.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
piotr_n
Legendary
*
Offline Offline

Activity: 2053
Merit: 1354


aka tonikt


View Profile WWW
October 03, 2018, 06:58:58 PM
 #24

but as the reality shows the devs are rather reluctant to introduce "privacy" features into bitcoin software.

I wouldn't say that's fair.  They're introducing this feature for starters, but then Schnorr will bring some more privacy benefits once that's good to go.  It sounds like testing is ongoing with Bulletproofs and Confidential transactions. 

OK then, bring it on.
I'll be happy to see it.

Check out gocoin - my original project of full bitcoin node & cold wallet written in Go.
PGP fingerprint: AB9E A551 E262 A87A 13BB  9059 1BE7 B545 CDF3 FD0E
Carlton Banks
Legendary
*
Offline Offline

Activity: 3430
Merit: 3071



View Profile
October 03, 2018, 07:52:07 PM
Merited by Welsh (4), Foxpup (3)
 #25

I wouldn't say that's fair.  They're introducing this feature for starters, but then Schnorr will bring some more privacy benefits once that's good to go.  It sounds like testing is ongoing with Bulletproofs and Confidential transactions.

Schnorr sigs don't add privacy, they just makes it more attractive (because a coinjoin with schnorr aggregated signatures will have effectively cheaper fees than a typical 1 input 2 output transaction). It'd be nice if the Schnorr scheme could allow miners to create blocks that aggregate all separate signatures into one, but I don't know if that's possible/practical.

There are separate proposals to make coinjoins more practical, one of which is particularly attractive (Bustapay). The receiving party in a transaction adds an input to the transaction, which breaks the assumption that inputs are always controlled by the sender. This is actually a really useful way to consolidate your outputs, although this possibly invites a new assumption ("dustiest" input belongs to the receiver). Not as strong an assumption as the status quo, though

Vires in numeris
DooMAD
Legendary
*
Offline Offline

Activity: 3766
Merit: 3099


Leave no FUD unchallenged


View Profile
October 03, 2018, 08:51:56 PM
 #26

Schnorr sigs don't add privacy, they just makes it more attractive (because a coinjoin with schnorr aggregated signatures will have effectively cheaper fees than a typical 1 input 2 output transaction). It'd be nice if the Schnorr scheme could allow miners to create blocks that aggregate all separate signatures into one, but I don't know if that's possible/practical.

Oh, I thought aggregating signatures helped with privacy.  Or is that only really effective for multisig transactions?


.
.HUGE.
▄██████████▄▄
▄█████████████████▄
▄█████████████████████▄
▄███████████████████████▄
▄█████████████████████████▄
███████▌██▌▐██▐██▐████▄███
████▐██▐████▌██▌██▌██▌██
█████▀███▀███▀▐██▐██▐█████

▀█████████████████████████▀

▀███████████████████████▀

▀█████████████████████▀

▀█████████████████▀

▀██████████▀▀
█▀▀▀▀











█▄▄▄▄
▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀
.
CASINSPORTSBOOK
▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
▀▀▀▀█











▄▄▄▄█
achow101
Moderator
Legendary
*
expert
Offline Offline

Activity: 3374
Merit: 6505


Just writing some code


View Profile WWW
October 03, 2018, 09:10:31 PM
Merited by Welsh (5), Foxpup (2)
 #27

For instance, look at the "coin join" idea - it is at least 6 years old.
But still today the best and only reliable way to anonymize your coins is to push them through a tor mixer service.
Because nobody wants to put his head on providing such services. Or even developing the technology.
CoinJoins and Tor achieve two completely different kinds of anonymity. They are orthogonal to each other. You cannot compare them.

The point of Dandelion is to have privacy by default. It is built into the P2P protocol. Users get privacy without having to think about privacy. OTOH, both Tor and CoinJoins require the user to actively think about and care about their own privacy. That means that most users aren't going to do those things because they don't think about or care about their privacy.

I just use any of the send transaction web pages:
https://en.bitcoin.it/wiki/Transaction_broadcasting
Good for you. The vast majority of users aren't going to do that because they aren't aware of the privacy implications as you are. The whole reason something like Dandelion is being proposed is to get Privacy into the network protocol itself so that users who don't care about privacy still get privacy anyways.

Oh, I thought aggregating signatures helped with privacy.  Or is that only really effective for multisig transactions?
Schnorr signatures by themselves do not do anything for privacy. But they do allow for things like Taproot and some kinds of multisigs which are better for privacy. But it also depends on what kind of privacy you are talking about because even with those things, people can still know which outputs are yours and how much you are receiving. Furthermore, it does nothing to help with anonymizing the IP address source of a transaction (which is what Dandelion does).

r1s2g3
Sr. Member
****
Offline Offline

Activity: 742
Merit: 395


I am alive but in hibernation.


View Profile
October 04, 2018, 07:44:02 AM
 #28


1. Make a privacy graph (few people refers it to hamiltonian circuit or "anonymity set") which contain random peer.

Does it means if more Nodes are participating (More decentralized we become) , protocol will take more time?
As numbers of Node increase,more time will be required to create the  hamiltonian circuit.

I am alive
piotr_n
Legendary
*
Offline Offline

Activity: 2053
Merit: 1354


aka tonikt


View Profile WWW
October 04, 2018, 10:09:18 AM
 #29

CoinJoins and Tor achieve two completely different kinds of anonymity. They are orthogonal to each other. You cannot compare them.
My point was that CoinJoin hasn't really been used in real life, while tor based centralized mixers have. And most likely will be in a future...
If you need to anonymize coins today, you'd rather choose a tor mixed over coin join.


The point of Dandelion is to have privacy by default. It is built into the P2P protocol. Users get privacy without having to think about privacy. OTOH, both Tor and CoinJoins require the user to actively think about and care about their own privacy. That means that most users aren't going to do those things because they don't think about or care about their privacy.

I'm just saying that the coin join idea, despite being very old (and having quite an advanced design by now) has not been delivered to a widely used bitcoin software.
And I'm just worried that Dandelion (or any other privacy enhancing feature) will end up the same way.

Both CoinJoin and Dandelion, in order to actually be practical, should be enabled in a widely used bitcoin software.
Exactly as you say: having it "built into the P2P protocol", so users can get "privacy without having to think about it".



I just use any of the send transaction web pages:
https://en.bitcoin.it/wiki/Transaction_broadcasting
Good for you. The vast majority of users aren't going to do that because they aren't aware of the privacy implications as you are. The whole reason something like Dandelion is being proposed is to get Privacy into the network protocol itself so that users who don't care about privacy still get privacy anyways.

Yes. However, before Dandelion gets delivers (if ever), it does not hurt to tell people that they already have options to hide transaction origin, had they cared to become aware of the privacy implications.

Check out gocoin - my original project of full bitcoin node & cold wallet written in Go.
PGP fingerprint: AB9E A551 E262 A87A 13BB  9059 1BE7 B545 CDF3 FD0E
aliashraf
Legendary
*
Offline Offline

Activity: 1456
Merit: 1174

Always remember the cause!


View Profile WWW
October 04, 2018, 11:41:07 AM
 #30

Although it is brilliant idea and seems to be helpful for users who run a full node, I afraid it is hardly enough for average users. Typically, they use either online wallets and are totally compromised or spv wallets which disclose the addresses they are interested in, to their (potentially spy) peers  anyway.

I agree, however SPV wallet users can use Tor (or other secure connection) to prevent tracking / reduce information that could be tracked.
Besides AFAIK it's possible to implement Dandelion on SPV wallet since all Dandelion do are make privacy graph and broadcast transaction to other peers in graph or selected nodes which SPV wallet connects to.
SPV wallets set a Bloom filter with full nodes they connect, this way they expose enough information to every single peer and if one of them happens to be a spy node no matter others have implemented Dandelion or not, user ip is compromised. SPVs can't implement Dandelion as they do not validate/relay transactions.

I think someone should do something about SPVs, they constitute the weakest part of bitcoin, I suppose.
r1s2g3
Sr. Member
****
Offline Offline

Activity: 742
Merit: 395


I am alive but in hibernation.


View Profile
October 05, 2018, 04:37:33 AM
 #31


1. Make a privacy graph (few people refers it to hamiltonian circuit or "anonymity set") which contain random peer.

Does it means if more Nodes are participating (More decentralized we become) , protocol will take more time?
As numbers of Node increase,more time will be required to create the  hamiltonian circuit.

AFAIK, there's upper limit of participating node and the time to make privacy graph/hamiltonian circuit shouldn't take long time since AFAIK nodes simply select other known Nodes.
If more nodes support Dandelion, creating privacy graph should be easier/faster.

P.S. To be frank, 1st step is most confusing for me.

Thanks for your candid reply, I think I figure it out by combining the below two paragraph from github.
Actually Hamiltonian circuit is not feasible so 2 random Dandelion destinations are taken. More the Dandelion nodes, I guess you get more option to select the 2 random destination or path.


Quote
In an ideal setting, we have found that a Hamiltonian circuit provides near-optimal privacy guarantees. However, constructing a Hamiltonian circuit through the Bitcoin P2P network in a decentralized, trustless manner is not feasible. Thus, we recommend that each node select two Dandelion destinations uniformly at random without replacement from its list of outbound peers. Our tests have shown that this method provides comparable privacy with increased robustness.


Quote
Dandelion does not conflict with existing versions of Bitcoin. A Bitcoin node that supports Dandelion appears no differently to Bitcoin nodes running older software versions. Bitcoin nodes that support Dandelion can identify feature support through a probe message. Obviously, older nodes are not capable of Dandelion routing. If a Bitcoin node supporting Dandelion has no peers that also support Dandelion, then its behavior naturally decays to that of a Bitcoin node without Dandelion support due to the Dandelion transaction embargoes.




source: https://github.com/dandelion-org/bips/blob/master/bip-dandelion.mediawiki

I am alive
bobthegrownup
Member
**
Offline Offline

Activity: 194
Merit: 29


View Profile
October 17, 2018, 12:24:37 PM
 #32

There have been a few mentions of using TOR in this thread and I thought it would be worthwhile to share this whitepaper on why using Bitcoin on TOR is a bad idea

https://arxiv.org/pdf/1410.6079.pdf

Dandelion++ is a fantastic step in the right direction because its lightweight and simple to implement
gmaxwell
Moderator
Legendary
*
expert
Offline Offline

Activity: 4158
Merit: 8382



View Profile WWW
October 19, 2018, 05:05:07 AM
Merited by Foxpup (2), ABCbits (1)
 #33

There have been a few mentions of using TOR in this thread and I thought it would be worthwhile to share this whitepaper on why using Bitcoin on TOR is a bad idea
That paper is very bad advice.  It's just wrong. It complains that regular bitcoin nodes can be triggered to ban tor exits, sure, but tor HS bitcoin nodes do not.  The "bad" outcome they are concerned about is that if you use tor you might find it doesn't work and you need to turn off tor to connect: even if that were a real risk it isn't worse than not using tor at all!
bobthegrownup
Member
**
Offline Offline

Activity: 194
Merit: 29


View Profile
October 19, 2018, 09:43:37 AM
 #34

The research on the paper happens somewhere in 2014, where BIP 151 about E2EE (end to end encryption) protocol hasn't used by Bitcoin Core or other client, so some attack/de-anonymization attempt without running full-nodes won't work today.
Besides i think using Tor is still better than connect to bitcoin network directly, especially if government actively monitor/analyze internet traffic or forbid Bitcoin.

This is great feedback. I am writing on article on Dandelion++ and the whitepaper I shared had shown up in some source material as an argument against TOR.

I'll revise to reflect that this whitepaper is no longer relevant. Thanks again
Carlton Banks
Legendary
*
Offline Offline

Activity: 3430
Merit: 3071



View Profile
October 19, 2018, 09:58:18 AM
Last edit: October 19, 2018, 01:05:20 PM by Carlton Banks
 #35

The research on the paper happens somewhere in 2014, where BIP 151 about E2EE (end to end encryption) protocol hasn't used by Bitcoin Core or other client

BIP 151/end-to-end encryption aren't used in Bitcoin yet, and they also don't provide anonymity to Bitcoin nodes anyway, so there would be no difference in Bitcoin's anonymity even if they were in use.

Vires in numeris
Carlton Banks
Legendary
*
Offline Offline

Activity: 3430
Merit: 3071



View Profile
October 19, 2018, 11:37:07 AM
Merited by ABCbits (1)
 #36

But, can you explain why BIP 151 don't provide anonymity to nodes? Excluding de-anonymization method which require full nodes, AFAIK ISP/government/spy at most only can know that it's Bitcoin full nodes traffic without knowing which transaction/block is being transferred.

Traffic encryption (as used in BIP151) only makes your Bitcoin use private, not anonymous. Encryption makes what you send private, not who you are (your identity).

Your IP is the most significant identity information that exists on the Bitcoin network. Tor masks your IP from other Bitcoin nodes, dandelion masks which IP a transaction was sent from first.

Vires in numeris
bobthegrownup
Member
**
Offline Offline

Activity: 194
Merit: 29


View Profile
October 19, 2018, 02:31:26 PM
 #37

Traffic encryption (as used in BIP151) only makes your Bitcoin use private, not anonymous. Encryption makes what you send private, not who you are (your identity).

Your IP is the most significant identity information that exists on the Bitcoin network. Tor masks your IP from other Bitcoin nodes, dandelion masks which IP a transaction was sent from first.

Thank you for clearing that up -- I didn't take the time to fully understand that BIP151 is about anonymizing at the transaction layer, not at the network layer -- which is the relevant part of this thread

bobthegrownup
Member
**
Offline Offline

Activity: 194
Merit: 29


View Profile
October 23, 2018, 11:26:51 PM
Merited by ABCbits (1)
 #38

Finally finished that article about Dandelion. Would love to have your feedback and please share.

https://hackernoon.com/bitcoin-upgrades-with-dandelion-the-transaction-privacy-protocol-ae9647bfbcb2

Thanks again for the correction on the "Bitcoin on Tor isnt a good idea" whitepaper being incorrect!

bobthegrownup
Member
**
Offline Offline

Activity: 194
Merit: 29


View Profile
October 24, 2018, 06:42:58 AM
 #39

Do you mind if i adding your article link to "Some informations" section on this thread?

Yes, that would be an honor!
Pages: « 1 [2]  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!