Bitcoin Forum
November 17, 2024, 12:06:04 AM *
News: Latest Bitcoin Core release: 28.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1]
  Print  
Author Topic: [2019-06-11] 100 Bitcoin Users Perform The Largest "CoinJoin" Transaction  (Read 221 times)
D1v4c (OP)
Jr. Member
*
Offline Offline

Activity: 31
Merit: 3


View Profile
June 11, 2019, 06:25:55 AM
Last edit: October 21, 2022, 11:13:21 AM by D1v4c
 #1

https://www.coindesk.com/bitcoin-users-perform-what-might-be-the-largest-coinjoin-ever

The community behind the privacy-centric bitcoin app Wasabi Wallet recently brought together 100 people to collectively execute a "CoinJoin" transaction on bitcoin in what might be the biggest event of its kind.

Bitcoin itself is far from private, as users can, via the blockchain, see where coins are being transferred to and from. One effort to afford greater privacy to transactions is CoinJoin, a long-standing technology first proposed in 2013 by long-time bitcoin idea man and cryptographer Greg Maxwell.

The idea is that transactions can be made more private by jumbling a number of different transactions together and then redistributing them.


Kakmakr
Legendary
*
Offline Offline

Activity: 3542
Merit: 1965

Leading Crypto Sports Betting & Casino Platform


View Profile
June 11, 2019, 06:48:42 AM
 #2

I am curious to know if forensic analysis tools, used by Surveillance companies can put Humpty Dumpty together again, after it has exited a CoinJoin process like this? Blockchain analysis companies like "Chainalysis" might have the capability to dissect this transaction and to find the source of the input addresses.  Huh

Companies like Neutrino says it can even follow the flow of coins through some Mixer services, but I do not know if this is true or not. I think the first court case where data from these companies are used to trace the origin of illegal Bitcoin, would clear that up for us.  Tongue

..Stake.com..   ▄████████████████████████████████████▄
   ██ ▄▄▄▄▄▄▄▄▄▄            ▄▄▄▄▄▄▄▄▄▄ ██  ▄████▄
   ██ ▀▀▀▀▀▀▀▀▀▀ ██████████ ▀▀▀▀▀▀▀▀▀▀ ██  ██████
   ██ ██████████ ██      ██ ██████████ ██   ▀██▀
   ██ ██      ██ ██████  ██ ██      ██ ██    ██
   ██ ██████  ██ █████  ███ ██████  ██ ████▄ ██
   ██ █████  ███ ████  ████ █████  ███ ████████
   ██ ████  ████ ██████████ ████  ████ ████▀
   ██ ██████████ ▄▄▄▄▄▄▄▄▄▄ ██████████ ██
   ██            ▀▀▀▀▀▀▀▀▀▀            ██ 
   ▀█████████▀ ▄████████████▄ ▀█████████▀
  ▄▄▄▄▄▄▄▄▄▄▄▄███  ██  ██  ███▄▄▄▄▄▄▄▄▄▄▄▄
 ██████████████████████████████████████████
▄▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▄
█  ▄▀▄             █▀▀█▀▄▄
█  █▀█             █  ▐  ▐▌
█       ▄██▄       █  ▌  █
█     ▄██████▄     █  ▌ ▐▌
█    ██████████    █ ▐  █
█   ▐██████████▌   █ ▐ ▐▌
█    ▀▀██████▀▀    █ ▌ █
█     ▄▄▄██▄▄▄     █ ▌▐▌
█                  █▐ █
█                  █▐▐▌
█                  █▐█
▀▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▀█
▄▄█████████▄▄
▄██▀▀▀▀█████▀▀▀▀██▄
▄█▀       ▐█▌       ▀█▄
██         ▐█▌         ██
████▄     ▄█████▄     ▄████
████████▄███████████▄████████
███▀    █████████████    ▀███
██       ███████████       ██
▀█▄       █████████       ▄█▀
▀█▄    ▄██▀▀▀▀▀▀▀██▄  ▄▄▄█▀
▀███████         ███████▀
▀█████▄       ▄█████▀
▀▀▀███▄▄▄███▀▀▀
..PLAY NOW..
squatter
Legendary
*
Offline Offline

Activity: 1666
Merit: 1196


STOP SNITCHIN'


View Profile
June 11, 2019, 07:05:49 AM
 #3

I am curious to know if forensic analysis tools, used by Surveillance companies can put Humpty Dumpty together again, after it has exited a CoinJoin process like this? Blockchain analysis companies like "Chainalysis" might have the capability to dissect this transaction and to find the source of the input addresses.

I'm sure they are actively working on it. There are certainly no guarantees. We should probably assume that any obfuscation method -- if it can't be completely broken -- will leak extant data that can be used to de-anonymize you later. TOR has vulnerabilities and is always under active attack. There may be ways of analyzing Coinjoin transactions (or Wasabi's implementation of them) that haven't been discovered yet. And of course, we are limited by the anonymity set -- the number of parties in the transaction. How many Coinjoin transactions you cascade will affect how strong the privacy will be.

buwaytress
Legendary
*
Offline Offline

Activity: 2996
Merit: 3697


Join the world-leading crypto sportsbook NOW!


View Profile
June 11, 2019, 08:42:56 AM
 #4

Ah cool, I saw the last update a week ago when they tried and only 99 people could do it.

I am curious to know if forensic analysis tools, used by Surveillance companies can put Humpty Dumpty together again, after it has exited a CoinJoin process like this? Blockchain analysis companies like "Chainalysis" might have the capability to dissect this transaction and to find the source of the input addresses.

I'm sure they are actively working on it. There are certainly no guarantees. We should probably assume that any obfuscation method -- if it can't be completely broken -- will leak extant data that can be used to de-anonymize you later. TOR has vulnerabilities and is always under active attack. There may be ways of analyzing Coinjoin transactions (or Wasabi's implementation of them) that haven't been discovered yet. And of course, we are limited by the anonymity set -- the number of parties in the transaction. How many Coinjoin transactions you cascade will affect how strong the privacy will be.

Definitely trying. If not companies then at least individuals and researchers. It's almost like mini holy grails for them, and a branch of reverse engineering in crypto now it seems. And don't be surprised to learn later if state resources have been put into this. They've broken traditional mixing already, I don't see why more advanced manoeuvers shouldn't be next in their line of sight!

██
██
██
██
██
██
██
██
██
██
██
██
██
... LIVECASINO.io    Play Live Games with up to 20% cashback!...██
██
██
██
██
██
██
██
██
██
██
██
██
Carlton Banks
Legendary
*
Offline Offline

Activity: 3430
Merit: 3080



View Profile
June 11, 2019, 09:40:30 AM
 #5

And of course, we are limited by the anonymity set -- the number of parties in the transaction. How many Coinjoin transactions you cascade will affect how strong the privacy will be.

large numbers of people in a Coinjoin are actually also leaking information, as it's somewhat unlikely that a regular batched transaction would use dozens (or hundreds) of equal amounts in it's inputs. It's not impossible, but it's a massive arrow pointing at the transaction, saying "this is a probable coinjoin". Then you're in possession of 'coinjoin tainted' BTC, which brings attention in and of itself.

So it's actually much better to use small numbers of people, with input amounts that differ. These are indistinguishable from regular wallet transactions, as it's common to use 3 or 4 inputs of different amounts. This has the advantage of overt coinjoins that not only is the ownership blurred, but there is no obvious way of identifying that ownership was blurred in the first instance. It appears that one person made a transaction, so long as there's no extra information available other than what's on the blockchain.

The above technique has another big advantage: if you do this when you pay someone for something, they can use the transaction to consolidate their dusty inputs from other customer payments.

Vires in numeris
Vladdirescu87
Sr. Member
****
Offline Offline

Activity: 966
Merit: 264



View Profile
June 11, 2019, 10:06:58 AM
 #6

The community behind the privacy-centric bitcoin app Wasabi Wallet recently brought together 100 people to collectively execute a “CoinJoin” transaction on bitcoin in what might be the biggest event of its kind.

Some context: bitcoin itself is far from private, as users can, via the blockchain, see where coins are being transferred to and from. One effort to afford greater privacy to transactions is CoinJoin, a long-standing technology first proposed in 2013 by long-time bitcoin idea man and cryptographer Greg Maxwell. The idea is that transactions can be made more private by jumbling a number of different transactions together and then redistributing them.

At 100 transactions, Wasabi Wallet’s effort might be the biggest, but it’s certainly an advancement for the privacy tech as a whole.

Quote
"There wasn't any service created to do such large CoinJoins"
zkSNACKS CTO Adam Fiscor told CoinDesk, which launched Wasabi Wallet last year to make CoinJoin transactions easier to use. Fiscor did add one small caveat that it’s "possible" that Blockchain's SharedCoin has done one as large, "but I’m not sure if it’s relevant."

100 Bitcoin Users Perform What Might Be Largest ‘CoinJoin’ Transaction Ever


Your link doesn't work.
BitHodler
Legendary
*
Offline Offline

Activity: 1526
Merit: 1179


View Profile
June 11, 2019, 12:20:11 PM
 #7

They've broken traditional mixing already, I don't see why more advanced manoeuvers shouldn't be next in their line of sight!
I don't think they've broken traditional mixing yet, but exposed some weak points that will help existing mixers to improve their way of operating in order to reduce the odds of a shutdown similar to the one of BestMixer.

We only know how vulnerable mixers are to governments trying to shut them down when they're actively trying to do so. Result is that we get the more reliable mixers to become even better and outlast the weaker ones.

Overall you do have a point that the more advanced mixing methods logically will also be subjected to their tyranny. They'll keep trying as long as they consider it worthwhile and at this early stage it has been proven to be so in some cases.

BSV is not the real Bcash. Bcash is the real Bcash.
Kakmakr
Legendary
*
Offline Offline

Activity: 3542
Merit: 1965

Leading Crypto Sports Betting & Casino Platform


View Profile
June 12, 2019, 07:04:41 AM
 #8

Ah cool, I saw the last update a week ago when they tried and only 99 people could do it.

I am curious to know if forensic analysis tools, used by Surveillance companies can put Humpty Dumpty together again, after it has exited a CoinJoin process like this? Blockchain analysis companies like "Chainalysis" might have the capability to dissect this transaction and to find the source of the input addresses.

I'm sure they are actively working on it. There are certainly no guarantees. We should probably assume that any obfuscation method -- if it can't be completely broken -- will leak extant data that can be used to de-anonymize you later. TOR has vulnerabilities and is always under active attack. There may be ways of analyzing Coinjoin transactions (or Wasabi's implementation of them) that haven't been discovered yet. And of course, we are limited by the anonymity set -- the number of parties in the transaction. How many Coinjoin transactions you cascade will affect how strong the privacy will be.

Definitely trying. If not companies then at least individuals and researchers. It's almost like mini holy grails for them, and a branch of reverse engineering in crypto now it seems. And don't be surprised to learn later if state resources have been put into this. They've broken traditional mixing already, I don't see why more advanced manoeuvers shouldn't be next in their line of sight!

I am not sure if they actually broke the mixing process, they might have found mixer services with exploitable code or mixer services that did not implement mixing technology correctly.  Roll Eyes

I think the shift is more to finding where these services are hosted and stopping people from accessing these services on the hosting side.  Roll Eyes We desperately need other alternative ways in decentralising these services and running this on a Peer2Peer basis.  Huh Roll Eyes

..Stake.com..   ▄████████████████████████████████████▄
   ██ ▄▄▄▄▄▄▄▄▄▄            ▄▄▄▄▄▄▄▄▄▄ ██  ▄████▄
   ██ ▀▀▀▀▀▀▀▀▀▀ ██████████ ▀▀▀▀▀▀▀▀▀▀ ██  ██████
   ██ ██████████ ██      ██ ██████████ ██   ▀██▀
   ██ ██      ██ ██████  ██ ██      ██ ██    ██
   ██ ██████  ██ █████  ███ ██████  ██ ████▄ ██
   ██ █████  ███ ████  ████ █████  ███ ████████
   ██ ████  ████ ██████████ ████  ████ ████▀
   ██ ██████████ ▄▄▄▄▄▄▄▄▄▄ ██████████ ██
   ██            ▀▀▀▀▀▀▀▀▀▀            ██ 
   ▀█████████▀ ▄████████████▄ ▀█████████▀
  ▄▄▄▄▄▄▄▄▄▄▄▄███  ██  ██  ███▄▄▄▄▄▄▄▄▄▄▄▄
 ██████████████████████████████████████████
▄▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▀▄
█  ▄▀▄             █▀▀█▀▄▄
█  █▀█             █  ▐  ▐▌
█       ▄██▄       █  ▌  █
█     ▄██████▄     █  ▌ ▐▌
█    ██████████    █ ▐  █
█   ▐██████████▌   █ ▐ ▐▌
█    ▀▀██████▀▀    █ ▌ █
█     ▄▄▄██▄▄▄     █ ▌▐▌
█                  █▐ █
█                  █▐▐▌
█                  █▐█
▀▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▀█
▄▄█████████▄▄
▄██▀▀▀▀█████▀▀▀▀██▄
▄█▀       ▐█▌       ▀█▄
██         ▐█▌         ██
████▄     ▄█████▄     ▄████
████████▄███████████▄████████
███▀    █████████████    ▀███
██       ███████████       ██
▀█▄       █████████       ▄█▀
▀█▄    ▄██▀▀▀▀▀▀▀██▄  ▄▄▄█▀
▀███████         ███████▀
▀█████▄       ▄█████▀
▀▀▀███▄▄▄███▀▀▀
..PLAY NOW..
Carlton Banks
Legendary
*
Offline Offline

Activity: 3430
Merit: 3080



View Profile
June 12, 2019, 07:44:36 AM
 #9

We desperately need other alternative ways in decentralising these services and running this on a Peer2Peer basis.  Huh Roll Eyes

payjoin

Vires in numeris
Pages: [1]
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!