BitDreams
|
|
July 18, 2014, 10:54:57 PM |
|
With the Bitcoin protocol, could I demand that all entities enquiring into my IP access that data only through my personal multi-signature (or authorized legal/agent) release? In other words, I get a 'you are being snooped message' - again, hidden only through legal means and well documented in the blockchain available for audit. An ultimate goal of mine would be to receive a micro-payment for something as common as a website tracking cookie and gain royalty upon its use. Doesn't matter if we think Google will do it or not, someone will and when they do... Another example, red-light cameras: Pictures go into a crypto/blockchain transaction, access is allowable for brief periods using location protected hardware (leaves the building and it automatically wipes/disables). So someone buys the right to visually inspect that picture and i am in it. I've got copyright and also protection, and if I wasn't part of the crime (no crime, no reason to be buying up my picture, right?), then i've earned a Satoshi and was informed of surveillance. For every invasion of privacy from bitcoin I could probably come up with 10 protections or ownerships of privacy. Cameras? You take a picture in public? My phone is informed as you've broadcast your actions to the local mesh. This can be done with hardware. Off the grid and on a murky network? Ok, but you'll find your social passport shut down as you traffic in public places. Today I feel if I met a Sci-Fi B grade movie producer I would grab and shake them till they hear me, "Here's Bitcoin 2025, I've got the first 10 episodes" So much is on the table. I don't think that it can be controlled, I believe it will evolve.
|
|
|
|
BitchicksHusband
|
|
July 18, 2014, 10:57:42 PM |
|
Bitcoin is anonymous because of the sheer number of transactions that take too long to figure out. If you get on somebody's list, they can figure you out.
|
1BitcHiCK1iRa6YVY6qDqC6M594RBYLNPo
|
|
|
LiteCoinGuy
Legendary
Offline
Activity: 1148
Merit: 1014
In Satoshi I Trust
|
|
July 18, 2014, 11:04:27 PM |
|
There are a number of ways to mask where a TX originated from:
Tor Public WiFi Using blockchain to push a signed TX for you running a full node and having a light client only connect to that node
Zerocoin.
|
|
|
|
Xch4ng3
|
|
July 18, 2014, 11:39:27 PM |
|
This is not valid with Dynamic IP internet connections, like the connection I've right now.
Even with a dynamic IP address your identity can still be found. Your ISP will keep logs of who is assigned what IP address at what times. Any more information on this? My only sources come from talking to ISP support reps but they've always told me "due to the dynamic nature of allocating IPs" they can't confirm who the owner is, which to me sounds like BS because I'm sure all ISPs have to have rules in place so they can identify customers in the case of abuse.
|
|
|
|
BitDreams
|
|
July 19, 2014, 12:02:09 AM |
|
This is not valid with Dynamic IP internet connections, like the connection I've right now.
Even with a dynamic IP address your identity can still be found. Your ISP will keep logs of who is assigned what IP address at what times. Any more information on this? My only sources come from talking to ISP support reps but they've always told me "due to the dynamic nature of allocating IPs" they can't confirm who the owner is, which to me sounds like BS because I'm sure all ISPs have to have rules in place so they can identify customers in the case of abuse. The root of that crime is stealing anothers connection. That's the best spoof. Now if every packet were ever only shipped only with a sotoshi...
|
|
|
|
|
peeveepee
|
|
July 19, 2014, 01:14:42 AM |
|
The issue here is the ISP has log which can point it to you if someone want to spy on you. Changing IP doesn't solve the problem.
|
|
|
|
juju
|
|
July 19, 2014, 01:18:37 AM |
|
The issue here is the ISP has log which can point it to you if someone want to spy on you. Changing IP doesn't solve the problem. Good point, I actually did not even think about that. I was just thinking about the scenario if someone wanted to target valuable wallets, you would be able to change IP's so they could not target you.
|
|
|
|
Kayex
Member
Offline
Activity: 84
Merit: 10
|
|
July 19, 2014, 02:56:58 AM |
|
Well if you're not doing anything shady or anything dirty you shouldn't have anything to worry about.
That's if you're on a private network like a locked wi-fi....
|
|
|
|
ANTIcentralized
|
|
July 19, 2014, 04:11:27 AM |
|
The issue here is the ISP has log which can point it to you if someone want to spy on you. Changing IP doesn't solve the problem. If you are using a VPN that you are certain does not keep logs then a transaction that you broadcast would be associated with the VPN's IP address and the absence of logs would make it difficult/impossible to link the VPN back to you. Another solution would be to use TOR, as the transaction would be associated with the TOR exit node and I don't think there are any attacks on TOR that can be done to find someone's identity via TOR that can be done retroactively.
|
|
|
|
CryptoDomains
|
|
July 19, 2014, 04:48:57 AM |
|
Why not just go to the library lol
|
|
|
|
Cicero2.0
Member
Offline
Activity: 98
Merit: 10
★☆★Bitin.io★☆★
|
|
July 19, 2014, 04:55:44 AM |
|
Why not just go to the library lol
I don't want to go to the library every time I buy or send bitcoins. A VPN that doesn't keep logs is a much simpler solution.
|
|
|
|
BIGbangTheory
Member
Offline
Activity: 83
Merit: 10
|
|
July 19, 2014, 03:06:04 PM |
|
Why not just go to the library lol
I don't want to go to the library every time I buy or send bitcoins. A VPN that doesn't keep logs is a much simpler solution. You could really just use TOR to use bitcoin. As long as an adversary doesn't previously suspect that you are using bitcoin then you have basically 0 chance of any kind of timing attack
|
|
|
|
Ron~Popeil
|
|
July 19, 2014, 03:20:19 PM |
|
Why not just go to the library lol
I don't want to go to the library every time I buy or send bitcoins. A VPN that doesn't keep logs is a much simpler solution. You could really just use TOR to use bitcoin. As long as an adversary doesn't previously suspect that you are using bitcoin then you have basically 0 chance of any kind of timing attack That is probably the simplest solution. I must admit I don't know how to connect my wallet to TOR but this discussion has inspired me to find out.
|
|
|
|
Xch4ng3
|
|
July 19, 2014, 07:51:36 PM |
|
Why not just go to the library lol
I don't want to go to the library every time I buy or send bitcoins. A VPN that doesn't keep logs is a much simpler solution. You could really just use TOR to use bitcoin. As long as an adversary doesn't previously suspect that you are using bitcoin then you have basically 0 chance of any kind of timing attack That is probably the simplest solution. I must admit I don't know how to connect my wallet to TOR but this discussion has inspired me to find out. From the TOR WikiRun bitcoind with -proxy=127.0.0.1:9050 (or whatever your SocksPort is). bitcoind will detect that you are using a proxy on 9050 and will force the "nolisten" flag. If you are not running tor on 9050, you need to set "nolisten" manually otherwise you will listen on your public IP and possibly reveal that you are running a node.
|
|
|
|
jjc326
|
|
July 19, 2014, 08:08:09 PM |
|
Still this is the type of thing that totally hurts the idea that bitcoin is really anonymous which is a big selling point on bitcoin. Well better to know than not know I guess. But still I wasn't aware of this.
|
|
|
|
rackcityb1
Newbie
Offline
Activity: 45
Merit: 0
|
|
July 19, 2014, 09:26:50 PM |
|
Why not just go to the library lol
I don't want to go to the library every time I buy or send bitcoins. A VPN that doesn't keep logs is a much simpler solution. You could really just use TOR to use bitcoin. As long as an adversary doesn't previously suspect that you are using bitcoin then you have basically 0 chance of any kind of timing attack That is probably the simplest solution. I must admit I don't know how to connect my wallet to TOR but this discussion has inspired me to find out. You need to have your wallet program connect to the Vidalia proxy via localhost (in proxy settings) Or you could use blockchain.info and use TOR to connect to blockchain.info
|
|
|
|
moriartybitcoin
|
|
July 19, 2014, 10:26:37 PM |
|
I wonder if this is true for electrum wallets?
Definitely NOT if you're running electrum with a VPN connected.
Also, IP addresses are NOT stored in the blockchain.
|
|
|
|
Kayex
Member
Offline
Activity: 84
Merit: 10
|
|
July 19, 2014, 10:32:37 PM |
|
Why not just go to the library lol
I don't want to go to the library every time I buy or send bitcoins. A VPN that doesn't keep logs is a much simpler solution. A) I don't want to go to the library every time I use bitcoins. Also, they can track wallets. (I believe) So you'd have to generate a new wallet AND use a crappy library internet connection. :I
|
|
|
|
Realpra
|
|
July 19, 2014, 10:45:24 PM |
|
Well an IP is simply a number associated with a certain cable output. If said cable goes to your house.. well of course that IP can be tied to you, its basically an electronic address!
Add to that google, facebook and NSA datamining and I hope its not a surprise to anyone ever.
|
|
|
|
|