BTC_Truth (OP)
Newbie
Offline
Activity: 2
Merit: 0
|
|
May 10, 2014, 05:09:27 AM Last edit: May 13, 2014, 02:45:29 AM by BTC_Truth |
|
x
|
|
|
|
Elwar
Legendary
Offline
Activity: 3598
Merit: 2386
Viva Ut Vivas
|
|
May 10, 2014, 06:04:05 AM |
|
Yes, people can track your IP to a bitcoin transaction if you do not mask it.
|
First seastead company actually selling sea homes: Ocean Builders https://ocean.builders Of course we accept bitcoin.
|
|
|
Foxpup
Legendary
Offline
Activity: 4531
Merit: 3183
Vile Vixen and Miss Bitcointalk 2021-2023
|
|
May 10, 2014, 06:22:28 AM |
|
Anyone who can eavesdrop on your network connection (such as your ISP, the NSA, or your neighbour if you use open Wi-Fi) can see if you send a transaction that you didn't previously receive, which proves you created it, and are not merely relaying someone else's transaction. Also, an early version of Bitcoin had a bug which allowed an attacker with a direct connection to your node to determine your addresses. Although this bug has been fixed, the current version may yet have similar bugs.
For these reasons, it is recommended to run Bitcoin over Tor. However, note that doing so does not necessarily make you anonymous, as there are other methods of associating your identity with your Bitcoin transactions than your IP address.
None of this is secret or controversial. Bitcoin was never intended to be completely anonymous.
|
Will pretend to do unspeakable things (while actually eating a taco) for bitcoins: 1K6d1EviQKX3SVKjPYmJGyWBb1avbmCFM4I am not on the scammers' paradise known as Telegram! Do not believe anyone claiming to be me off-forum without a signed message from the above address! Accept no excuses and make no exceptions!
|
|
|
🏰 TradeFortress 🏰
Bitcoin Veteran
VIP
Legendary
Offline
Activity: 1316
Merit: 1043
👻
|
|
May 10, 2014, 07:52:00 AM |
|
One way to mitigate someone passively snooping on the network level, and finding out who is the originator of transactions would be to encrypt peer to peer communications.
Attackers who set up nodes will have to set up a sufficient amount in order to provide acceptable confidence that peer they got the transaction from is indeed the originator of the transaction.
|
|
|
|
ShakyhandsBTCer
Sr. Member
Offline
Activity: 448
Merit: 250
It's Money 2.0| It’s gold for nerds | It's Bitcoin
|
|
June 14, 2014, 07:53:49 PM |
|
There are a number of ways to mask where a TX originated from:
Tor Public WiFi Using blockchain to push a signed TX for you running a full node and having a light client only connect to that node
|
|
|
|
ajareselde
Legendary
Offline
Activity: 1722
Merit: 1000
Satoshi is rolling in his grave. #bitcoin
|
|
June 14, 2014, 08:22:02 PM |
|
Yes, people can track your IP to a bitcoin transaction if you do not mask it.
well, i for once didnt know this. i thought bitcoin was only seen by wallet address.. actualy, you can use online wallet, or a vpn for that matter.
|
|
|
|
justusranvier
Legendary
Offline
Activity: 1400
Merit: 1013
|
|
June 14, 2014, 09:03:38 PM |
|
One way to mitigate someone passively snooping on the network level, and finding out who is the originator of transactions would be to encrypt peer to peer communications.
Attackers who set up nodes will have to set up a sufficient amount in order to provide acceptable confidence that peer they got the transaction from is indeed the originator of the transaction.
Tor communications are encrypted peer-to-peer. Set up your node to accept connections via a hidden service, and use -onlynet=tor to make sure you only connect to other hidden services. Now 100% of your peer-to-peer connections are encrypted.
|
|
|
|
tins
|
|
June 14, 2014, 09:11:09 PM |
|
One way to mitigate someone passively snooping on the network level, and finding out who is the originator of transactions would be to encrypt peer to peer communications.
Attackers who set up nodes will have to set up a sufficient amount in order to provide acceptable confidence that peer they got the transaction from is indeed the originator of the transaction.
Tor communications are encrypted peer-to-peer. Set up your node to accept connections via a hidden service, and use -onlynet=tor to make sure you only connect to other hidden services. Now 100% of your peer-to-peer connections are encrypted. I am not tech literate. You can run your entire internet connection using tor? Or, are you saying use tor when using btc services or online wallet an such? (Please, no making fun of me, I admit to being mostly computer illiterate.)
|
|
|
|
justusranvier
Legendary
Offline
Activity: 1400
Merit: 1013
|
|
June 14, 2014, 09:18:06 PM |
|
I am not tech literate. You can run your entire internet connection using tor? Or, are you saying use tor when using btc services or online wallet an such?
(Please, no making fun of me, I admit to being mostly computer illiterate.) If you are running a Bitcoin node (this means Bitcoin-Qt, bitcoind, btcd, or I think Obelisk) on your own computer, and you are running a Tor client, then you can configure the Bitcoin node to only connect to the Bitcoin network via Tor. If you're using an online wallet, then you don't have any privacy anyway so it doesn't really matter if you use Tor to access it or not.
|
|
|
|
commandrix
|
|
June 14, 2014, 10:08:42 PM |
|
Exactly right. That's why I've always kinda yukked up my sleeve at the "anonymous" nature of Bitcoin. Somebody could sniff out the packets used to send the Bitcoin and use the information in those packets to know where you sent it from no matter whether you sent it from your house or from your local cafe with Wi-Fi. About the only way to get around it is to use some kind of proxy service and even that isn't infallible.
|
|
|
|
joshraban76
|
|
June 14, 2014, 10:14:16 PM |
|
This is not valid with Dynamic IP internet connections, like the connection I've right now.
|
|
|
|
freedomno1
Legendary
Offline
Activity: 1806
Merit: 1090
Learning the troll avoidance button :)
|
|
June 14, 2014, 10:19:57 PM |
|
This is not valid with Dynamic IP internet connections, like the connection I've right now.
That is good to know but an ISP provider retains address logs for 180 days to a year so it probably is still a valid concern http://lifehacker.com/5923017/how-can-i-prevent-my-isp-from-tracking-my-every-move/all
|
Believing in Bitcoins and it's ability to change the world
|
|
|
Meuh6879
Legendary
Offline
Activity: 1512
Merit: 1012
|
|
June 14, 2014, 10:39:05 PM |
|
|
|
|
|
bitsmichel
|
|
June 14, 2014, 10:41:09 PM |
|
By default data is associated with you, unless you take counter measures. Dragnet surveillance is very serious nowadays. IP address is one of the many things to track you.
|
|
|
|
tins
|
|
June 14, 2014, 10:44:35 PM |
|
Exactly right. That's why I've always kinda yukked up my sleeve at the "anonymous" nature of Bitcoin. Somebody could sniff out the packets used to send the Bitcoin and use the information in those packets to know where you sent it from no matter whether you sent it from your house or from your local cafe with Wi-Fi. About the only way to get around it is to use some kind of proxy service and even that isn't infallible.
What if you aren't sending from a personal wallet (Bitcoin-QT, etc), rather from an exchange (Cryptsy, mint, etc)? In that situation would it still be possible to trace where it was sent from? Or, since it is the exchange's server sending the transaction, would it be anonymous?
|
|
|
|
newIndia
Legendary
Offline
Activity: 2226
Merit: 1052
|
|
June 14, 2014, 10:47:39 PM |
|
Exactly right. That's why I've always kinda yukked up my sleeve at the "anonymous" nature of Bitcoin. Somebody could sniff out the packets used to send the Bitcoin and use the information in those packets to know where you sent it from no matter whether you sent it from your house or from your local cafe with Wi-Fi. About the only way to get around it is to use some kind of proxy service and even that isn't infallible.
What if you aren't sending from a personal wallet (Bitcoin-QT, etc), rather from an exchange (Cryptsy, mint, etc)? In that situation would it still be possible to trace where it was sent from? Or, since it is the exchange's server sending the transaction, would it be anonymous? It'll broadcast their IP if that is not masked.
|
|
|
|
justusranvier
Legendary
Offline
Activity: 1400
Merit: 1013
|
|
June 14, 2014, 10:56:36 PM |
|
What if you aren't sending from a personal wallet (Bitcoin-QT, etc), rather from an exchange (Cryptsy, mint, etc)? In that situation would it still be possible to trace where it was sent from? Or, since it is the exchange's server sending the transaction, would it be anonymous? Network snooping will show the transaction coming from the exchange. The exchange, of course, knows it was your transaction and they'll have records showing such. The same people who engage in widespread network snooping probably can just ask the exchange to give them those records (or they'll hack into the exchange and just extract the records themselves). That's why I said if you use a web wallet you don't have any privacy.
|
|
|
|
Magic8Ball
Legendary
Offline
Activity: 1050
Merit: 1000
|
|
June 14, 2014, 11:13:36 PM |
|
One way to mitigate someone passively snooping on the network level, and finding out who is the originator of transactions would be to encrypt peer to peer communications.
Attackers who set up nodes will have to set up a sufficient amount in order to provide acceptable confidence that peer they got the transaction from is indeed the originator of the transaction.
Tor communications are encrypted peer-to-peer. Set up your node to accept connections via a hidden service, and use -onlynet=tor to make sure you only connect to other hidden services. Now 100% of your peer-to-peer connections are encrypted. Tor and mixing, to mask the initial input should be enough. Anytime a transaction is done which can be traced back like some payment then mix again.
|
|
|
|
ShakyhandsBTCer
Sr. Member
Offline
Activity: 448
Merit: 250
It's Money 2.0| It’s gold for nerds | It's Bitcoin
|
|
June 15, 2014, 04:49:34 AM |
|
This is not valid with Dynamic IP internet connections, like the connection I've right now.
Even with a dynamic IP address your identity can still be found. Your ISP will keep logs of who is assigned what IP address at what times.
|
|
|
|
tvbcof
Legendary
Offline
Activity: 4746
Merit: 1277
|
|
June 15, 2014, 05:15:19 AM |
|
What if you aren't sending from a personal wallet (Bitcoin-QT, etc), rather from an exchange (Cryptsy, mint, etc)? In that situation would it still be possible to trace where it was sent from? Or, since it is the exchange's server sending the transaction, would it be anonymous? Network snooping will show the transaction coming from the exchange. The exchange, of course, knows it was your transaction and they'll have records showing such. The same people who engage in widespread network snooping probably can just ask the exchange to give them those records (or they'll hack into the exchange and just extract the records themselves). That's why I said if you use a web wallet you don't have any privacy. A full peer who is not masking their activity is susceptible to transaction counting. That is, detection of transactions which originated at the peer rather than those being relayed. Or at least that was supposed several years ago. Several years ago most people thought it impractical though I personally always considered it a potential threat. Now (post-Snowden) it seems likely that fine-grained packet are captured, retained, and analyzed. At least for anyone who is tagged for enhanced monitoring, and I think that there is a strong possibility that all Bitcoin users are. A non-compromised https connection to a non-compromised exchange or wallet service (if there is such a thing) would be theoretically more safe. It would require timing analysis to match user activity with transactions (if they even leave the service) and that would be very easily thwarted by introducing some random delays. This assumes that the service is somewhat popular (and thus, active) of course. Go ahead and say the magic words 'tor'. For my part I never trusted it. At least not for highly critical work. It being largely funded by the government to 'help Iranian dissidents' doesn't pass the smell test for me. But to each his own.
|
sig spam anywhere and self-moderated threads on the pol&soc board are for losers.
|
|
|
|