Bitcoin Forum
April 25, 2024, 02:23:39 AM *
News: Latest Bitcoin Core release: 27.0 [Torrent]
 
   Home   Help Search Login Register More  
Pages: [1] 2 3 4 »  All
  Print  
Author Topic: "You should assume your IP address can be associated with you.." -Gavin Anderson  (Read 4872 times)
BTC_Truth (OP)
Newbie
*
Offline Offline

Activity: 2
Merit: 0


View Profile
May 10, 2014, 05:09:27 AM
Last edit: May 13, 2014, 02:45:29 AM by BTC_Truth
 #1

  x
1714011819
Hero Member
*
Offline Offline

Posts: 1714011819

View Profile Personal Message (Offline)

Ignore
1714011819
Reply with quote  #2

1714011819
Report to moderator
1714011819
Hero Member
*
Offline Offline

Posts: 1714011819

View Profile Personal Message (Offline)

Ignore
1714011819
Reply with quote  #2

1714011819
Report to moderator
In order to achieve higher forum ranks, you need both activity points and merit points.
Advertised sites are not endorsed by the Bitcoin Forum. They may be unsafe, untrustworthy, or illegal in your jurisdiction.
1714011819
Hero Member
*
Offline Offline

Posts: 1714011819

View Profile Personal Message (Offline)

Ignore
1714011819
Reply with quote  #2

1714011819
Report to moderator
Elwar
Legendary
*
Offline Offline

Activity: 3598
Merit: 2384


Viva Ut Vivas


View Profile WWW
May 10, 2014, 06:04:05 AM
 #2

Yes, people can track your IP to a bitcoin transaction if you do not mask it.

First seastead company actually selling sea homes: Ocean Builders https://ocean.builders  Of course we accept bitcoin.
Foxpup
Legendary
*
Offline Offline

Activity: 4340
Merit: 3042


Vile Vixen and Miss Bitcointalk 2021-2023


View Profile
May 10, 2014, 06:22:28 AM
 #3

Anyone who can eavesdrop on your network connection (such as your ISP, the NSA, or your neighbour if you use open Wi-Fi) can see if you send a transaction that you didn't previously receive, which proves you created it, and are not merely relaying someone else's transaction. Also, an early version of Bitcoin had a bug which allowed an attacker with a direct connection to your node to determine your addresses. Although this bug has been fixed, the current version may yet have similar bugs.

For these reasons, it is recommended to run Bitcoin over Tor. However, note that doing so does not necessarily make you anonymous, as there are other methods of associating your identity with your Bitcoin transactions than your IP address.

None of this is secret or controversial. Bitcoin was never intended to be completely anonymous.

Will pretend to do unspeakable things (while actually eating a taco) for bitcoins: 1K6d1EviQKX3SVKjPYmJGyWBb1avbmCFM4
I am not on the scammers' paradise known as Telegram! Do not believe anyone claiming to be me off-forum without a signed message from the above address! Accept no excuses and make no exceptions!
🏰 TradeFortress 🏰
Bitcoin Veteran
VIP
Legendary
*
Offline Offline

Activity: 1316
Merit: 1043

👻


View Profile
May 10, 2014, 07:52:00 AM
 #4

One way to mitigate someone passively snooping on the network level, and finding out who is the originator of transactions would be to encrypt peer to peer communications.

Attackers who set up nodes will have to set up a sufficient amount in order to provide acceptable confidence that peer they got the transaction from is indeed the originator of the transaction.
ShakyhandsBTCer
Sr. Member
****
Offline Offline

Activity: 448
Merit: 250


It's Money 2.0| It’s gold for nerds | It's Bitcoin


View Profile
June 14, 2014, 07:53:49 PM
 #5

There are a number of ways to mask where a TX originated from:

Tor
Public WiFi
Using blockchain to push a signed TX for you
running a full node and having a light client only connect to that node
ajareselde
Legendary
*
Offline Offline

Activity: 1722
Merit: 1000

Satoshi is rolling in his grave. #bitcoin


View Profile
June 14, 2014, 08:22:02 PM
 #6

Yes, people can track your IP to a bitcoin transaction if you do not mask it.

well, i for once didnt know this.
i thought bitcoin was only seen by wallet address..

actualy, you can use online wallet, or a vpn for that matter.
justusranvier
Legendary
*
Offline Offline

Activity: 1400
Merit: 1009



View Profile
June 14, 2014, 09:03:38 PM
 #7

One way to mitigate someone passively snooping on the network level, and finding out who is the originator of transactions would be to encrypt peer to peer communications.

Attackers who set up nodes will have to set up a sufficient amount in order to provide acceptable confidence that peer they got the transaction from is indeed the originator of the transaction.
Tor communications are encrypted peer-to-peer.

Set up your node to accept connections via a hidden service, and use -onlynet=tor to make sure you only connect to other hidden services.

Now 100% of your peer-to-peer connections are encrypted.
tins
Hero Member
*****
Offline Offline

Activity: 882
Merit: 500


View Profile
June 14, 2014, 09:11:09 PM
 #8

One way to mitigate someone passively snooping on the network level, and finding out who is the originator of transactions would be to encrypt peer to peer communications.

Attackers who set up nodes will have to set up a sufficient amount in order to provide acceptable confidence that peer they got the transaction from is indeed the originator of the transaction.
Tor communications are encrypted peer-to-peer.

Set up your node to accept connections via a hidden service, and use -onlynet=tor to make sure you only connect to other hidden services.

Now 100% of your peer-to-peer connections are encrypted.

I am not tech literate. You can run your entire internet connection using tor? Or, are you saying use tor when using btc services or online wallet an such?

(Please, no making fun of me, I admit to being mostly computer illiterate.)
justusranvier
Legendary
*
Offline Offline

Activity: 1400
Merit: 1009



View Profile
June 14, 2014, 09:18:06 PM
 #9

I am not tech literate. You can run your entire internet connection using tor? Or, are you saying use tor when using btc services or online wallet an such?

(Please, no making fun of me, I admit to being mostly computer illiterate.)
If you are running a Bitcoin node (this means Bitcoin-Qt, bitcoind, btcd, or I think Obelisk) on your own computer, and you are running a Tor client, then you can configure the Bitcoin node to only connect to the Bitcoin network via Tor.

If you're using an online wallet, then you don't have any privacy anyway so it doesn't really matter if you use Tor to access it or not.
commandrix
Hero Member
*****
Offline Offline

Activity: 798
Merit: 1000


View Profile
June 14, 2014, 10:08:42 PM
 #10

Exactly right. That's why I've always kinda yukked up my sleeve at the "anonymous" nature of Bitcoin. Somebody could sniff out the packets used to send the Bitcoin and use the information in those packets to know where you sent it from no matter whether you sent it from your house or from your local cafe with Wi-Fi. About the only way to get around it is to use some kind of proxy service and even that isn't infallible.
joshraban76
Sr. Member
****
Offline Offline

Activity: 252
Merit: 250



View Profile
June 14, 2014, 10:14:16 PM
 #11

This is not valid with Dynamic IP internet connections, like the connection I've right now.

\   \  \ \\\\\\\\\\\\\\\\◥◣◢◤//////////////// /  /   /
Win88.me ❖ Fair, Trusted Online BTC Gambling ❖
/   /  / ////////////////◢◤◥◣\\\\\\\\\\\\\\\\ \  \   \
freedomno1
Legendary
*
Offline Offline

Activity: 1806
Merit: 1090


Learning the troll avoidance button :)


View Profile
June 14, 2014, 10:19:57 PM
 #12

This is not valid with Dynamic IP internet connections, like the connection I've right now.

That is good to know but an ISP provider retains address logs for 180 days to a year so it probably is still a valid concern
http://lifehacker.com/5923017/how-can-i-prevent-my-isp-from-tracking-my-every-move/all

Believing in Bitcoins and it's ability to change the world
Meuh6879
Legendary
*
Offline Offline

Activity: 1512
Merit: 1011



View Profile
June 14, 2014, 10:39:05 PM
 #13

bitsmichel
Sr. Member
****
Offline Offline

Activity: 518
Merit: 250



View Profile
June 14, 2014, 10:41:09 PM
 #14

By default data is associated with you, unless you take counter measures.
Dragnet surveillance is very serious nowadays. IP address is one of the many things to track you.


tins
Hero Member
*****
Offline Offline

Activity: 882
Merit: 500


View Profile
June 14, 2014, 10:44:35 PM
 #15

Exactly right. That's why I've always kinda yukked up my sleeve at the "anonymous" nature of Bitcoin. Somebody could sniff out the packets used to send the Bitcoin and use the information in those packets to know where you sent it from no matter whether you sent it from your house or from your local cafe with Wi-Fi. About the only way to get around it is to use some kind of proxy service and even that isn't infallible.

What if you aren't sending from a personal wallet (Bitcoin-QT, etc), rather from an exchange (Cryptsy, mint, etc)? In that situation would it still be possible to trace where it was sent from? Or, since it is the exchange's server sending the transaction, would it be anonymous?
newIndia
Legendary
*
Offline Offline

Activity: 2198
Merit: 1049


View Profile
June 14, 2014, 10:47:39 PM
 #16

Exactly right. That's why I've always kinda yukked up my sleeve at the "anonymous" nature of Bitcoin. Somebody could sniff out the packets used to send the Bitcoin and use the information in those packets to know where you sent it from no matter whether you sent it from your house or from your local cafe with Wi-Fi. About the only way to get around it is to use some kind of proxy service and even that isn't infallible.

What if you aren't sending from a personal wallet (Bitcoin-QT, etc), rather from an exchange (Cryptsy, mint, etc)? In that situation would it still be possible to trace where it was sent from? Or, since it is the exchange's server sending the transaction, would it be anonymous?

It'll broadcast their IP if that is not masked.

justusranvier
Legendary
*
Offline Offline

Activity: 1400
Merit: 1009



View Profile
June 14, 2014, 10:56:36 PM
 #17

What if you aren't sending from a personal wallet (Bitcoin-QT, etc), rather from an exchange (Cryptsy, mint, etc)? In that situation would it still be possible to trace where it was sent from? Or, since it is the exchange's server sending the transaction, would it be anonymous?
Network snooping will show the transaction coming from the exchange.

The exchange, of course, knows it was your transaction and they'll have records showing such.

The same people who engage in widespread network snooping probably can just ask the exchange to give them those records (or they'll hack into the exchange and just extract the records themselves).

That's why I said if you use a web wallet you don't have any privacy.
Magic8Ball
Legendary
*
Offline Offline

Activity: 1050
Merit: 1000


View Profile
June 14, 2014, 11:13:36 PM
 #18

One way to mitigate someone passively snooping on the network level, and finding out who is the originator of transactions would be to encrypt peer to peer communications.

Attackers who set up nodes will have to set up a sufficient amount in order to provide acceptable confidence that peer they got the transaction from is indeed the originator of the transaction.
Tor communications are encrypted peer-to-peer.

Set up your node to accept connections via a hidden service, and use -onlynet=tor to make sure you only connect to other hidden services.

Now 100% of your peer-to-peer connections are encrypted.

Tor and mixing, to mask the initial input should be enough.

Anytime a transaction is done which can be traced back like some payment then mix again.
ShakyhandsBTCer
Sr. Member
****
Offline Offline

Activity: 448
Merit: 250


It's Money 2.0| It’s gold for nerds | It's Bitcoin


View Profile
June 15, 2014, 04:49:34 AM
 #19

This is not valid with Dynamic IP internet connections, like the connection I've right now.

Even with a dynamic IP address your identity can still be found.

Your ISP will keep logs of who is assigned what IP address at what times.
tvbcof
Legendary
*
Offline Offline

Activity: 4592
Merit: 1276


View Profile
June 15, 2014, 05:15:19 AM
 #20

What if you aren't sending from a personal wallet (Bitcoin-QT, etc), rather from an exchange (Cryptsy, mint, etc)? In that situation would it still be possible to trace where it was sent from? Or, since it is the exchange's server sending the transaction, would it be anonymous?
Network snooping will show the transaction coming from the exchange.

The exchange, of course, knows it was your transaction and they'll have records showing such.

The same people who engage in widespread network snooping probably can just ask the exchange to give them those records (or they'll hack into the exchange and just extract the records themselves).

That's why I said if you use a web wallet you don't have any privacy.

A full peer who is not masking their activity is susceptible to transaction counting.  That is, detection of transactions which originated at the peer rather than those being relayed.  Or at least that was supposed several years ago.  Several years ago most people thought it impractical though I personally always considered it a potential threat.  Now (post-Snowden) it seems likely that fine-grained packet are captured, retained, and analyzed.  At least for anyone who is tagged for enhanced monitoring, and I think that there is a strong possibility that all Bitcoin users are.

A non-compromised https connection to a non-compromised exchange or wallet service (if there is such a thing) would be theoretically more safe.  It would require timing analysis to match user activity with transactions (if they even leave the service) and that would be very easily thwarted by introducing some random delays.  This assumes that the service is somewhat popular (and thus, active) of course.

Go ahead and say the magic words 'tor'.  For my part I never trusted it.  At least not for highly critical work.  It being largely funded by the government to 'help Iranian dissidents' doesn't pass the smell test for me.  But to each his own.


sig spam anywhere and self-moderated threads on the pol&soc board are for losers.
Pages: [1] 2 3 4 »  All
  Print  
 
Jump to:  

Powered by MySQL Powered by PHP Powered by SMF 1.1.19 | SMF © 2006-2009, Simple Machines Valid XHTML 1.0! Valid CSS!