Not So Anonymous - Deanonymization of Blockchain Users

J
Johannes AhlmannCTO at Claru.io
Not so Anonymous -
Deanonymization of
Blockchain Users
Johannes Ahlmann
Cork Blockchain Meetup
2018-11-13
https://www.dailydot.com/news/anonymous-opfullerton-kelly-thomas/
Lightning Talk - Agenda
• Is Bitcoin anonymous?
• What is Deanonymization?
• Why should I care?
• What can I do about it?
• Where to get cryptos?
• Alternatives
Anonymity & Privacy
Anonymity
"They" can see what you do,
but not who you are
Privacy
Controlling who sees what
activities you engage in
https://d262ilb51hltx0.cloudfront.net/max/1610/1*d0KdwdeKDi5m8n-sZdr-_A.png
Anonymity 1/2
• Pseudonymity - People are aware of one or
multiple pseudonyms of yours, but not your
true identity
• Anonymity = Pseudonymity + Unlinkability
• Unlinkability
• Different actions of the same user should
not be linkable to each other
• Linking of addresses to users
• Linking of transactions to users
• Linking of senders to recipients
source: Prof. Murtuza Jadliwala
Anonymity 2/2
• Privacy vs. Decentralization
• Public Ledger is core component in
consensus and sharing state of the world
• Bitcoin is pseudonymous, not anonymous
• public addresses = pseudonyms
• much less anonymous, private than cash
• Many Bitcoins are acquired through
Exchanges or Mining Pools
• Relatively few merchants/ market
participants to trade with
What is Deanonymization
• Linking you to your addresses
• Linking you to your transactions
• Tagging, clustering of totality of
addresses, transactions
• Approaches
• Transaction Graph Analysis
• Realtime Network Analysis of P2P
network
Transaction Graph Analysis 1/2
Change Address Combined Addresses
Transaction Graph Analysis 2/2
• Bitcoin transactions are public
• Active collecting
• Mining pools
• Online wallets
• Exchanges
• Merchants
• Gambling
• Tagging clusters
• One tagged address in cluster tags all
cluster
• Bitcoin address should only be used once
An Analysis of Anonymity in the Bitcoin System
F. Reid and M. Harrigan, PASSAT 2011
Realtime Network Analysis
• "Attack" on the P2P Network
• Peers distinguished over set of its (8)
entry nodes
• Linking inputs
• Tagging clusters
Learning Entry Nodes
Realtime Network Analysis
• Linking of different transactions to same user
• Each peer is trying to connect to 8 entry nodes
• Network discovery
• Servers
• Receive incoming connections
• Max. 117 incoming connections
• Clients
• 8 outgoing connections
• Peers are distinguished over set of it’s entry
nodes!
Remediation
• Hierarchical Deterministic Wallets
• Random Address Pool Wallets
• Tor
• Mixers
• Who can we trust?
• Coinjoin
• How to find Peers?
• Anonymous cryptocurrencies
Anonymous Currencies
Monero - Ring signatures
Dash - Fork of bitcoin, coin-mixing service
Zcash - zk-SNARK, zero knowledge proofs
Verge - Tor and I2P network for privacy
Komodo - Fork of Zcash, zk-SNARK
Pivx - Fork of Dash, Zerocoin protocol
(Legitimate goods vs. legitimate worries;
how can this be used for good or bad?)
Thank You!
Resources
• https://coincenter.org/entry/how-anonymous-is-bitcoin
• https://bitcoinmagazine.com/articles/is-bitcoin-anonymous-a-complete-beginner-s-guide-1447875283/
• https://www.coursera.org/lecture/cryptocurrency/how-to-de-anonymize-bitcoin-qnS76
• https://www.slideshare.net/bhaslhofer/bitcoin-deanonymization-and-money-laundering-detection-strategies
• https://pwlconf.org/2018/giulia-fanti/
• https://www.technologyreview.com/s/608716/bitcoin-transactions-arent-as-anonymous-as-everyone-hoped/
• https://decentralize.today/a-new-attack-vector-to-deanonymize-bitcoin-users-9c6dc433d4b6
• https://www.deepdotweb.com/2017/04/20/how-companies-are-deanonymizing-bitcoin/
• https://www.slideshare.net/bhaslhofer/bitcoin-deanonymization-and-money-laundering-detection-strategies
• https://bitcoinsandblockchains.blogspot.com/2016/05/bitcoin-deanonymization.html
• https://btcmanager.com/u-s-department-of-homeland-security-create-bitcoin-deanonymization-tool/
• https://www.deepdotweb.com/2018/01/02/using-bitcoin-transaction-analysis-deanonymizing-users-tor-hidden-services/
1 of 15

Recommended

Not So Anonymous - Deanonymization of Blockchain Users by
Not So Anonymous - Deanonymization of Blockchain UsersNot So Anonymous - Deanonymization of Blockchain Users
Not So Anonymous - Deanonymization of Blockchain UsersJohannes Ahlmann
517 views20 slides
Understanding private blockchains by
Understanding private blockchainsUnderstanding private blockchains
Understanding private blockchainsCoin Sciences Ltd
20.7K views41 slides
Crypto for the Rest of Us by
Crypto for the Rest of UsCrypto for the Rest of Us
Crypto for the Rest of UsPankaj Jain
315 views19 slides
Information security in private blockchains by
Information security in private blockchainsInformation security in private blockchains
Information security in private blockchainsCoin Sciences Ltd
6.2K views16 slides
Microservices architecture by
Microservices architectureMicroservices architecture
Microservices architectureTomasz Tomczyk
69 views18 slides
Bitcoin by
BitcoinBitcoin
BitcoinBamdad Dashtban
4.2K views27 slides

More Related Content

What's hot

Blockchain technology by
Blockchain technologyBlockchain technology
Blockchain technologyAayt Bahaa
355 views13 slides
Blockchain Investing, January 2018 by
Blockchain Investing, January 2018Blockchain Investing, January 2018
Blockchain Investing, January 2018Christian Kameir
295 views24 slides
Testing in the blockchain by
Testing in the blockchainTesting in the blockchain
Testing in the blockchainCraig Risi
190 views20 slides
Metadata in the Blockchain: The OP_RETURN Explosion by
Metadata in the Blockchain: The OP_RETURN ExplosionMetadata in the Blockchain: The OP_RETURN Explosion
Metadata in the Blockchain: The OP_RETURN ExplosionCoin Sciences Ltd
21.8K views62 slides
Blockchain Technology by
Blockchain TechnologyBlockchain Technology
Blockchain TechnologyGiuseppe Andreetti
264 views31 slides
Altcoins by
AltcoinsAltcoins
Altcoinssameezahur
16.7K views32 slides

What's hot(20)

Blockchain technology by Aayt Bahaa
Blockchain technologyBlockchain technology
Blockchain technology
Aayt Bahaa355 views
Testing in the blockchain by Craig Risi
Testing in the blockchainTesting in the blockchain
Testing in the blockchain
Craig Risi190 views
Metadata in the Blockchain: The OP_RETURN Explosion by Coin Sciences Ltd
Metadata in the Blockchain: The OP_RETURN ExplosionMetadata in the Blockchain: The OP_RETURN Explosion
Metadata in the Blockchain: The OP_RETURN Explosion
Coin Sciences Ltd21.8K views
Altcoins by sameezahur
AltcoinsAltcoins
Altcoins
sameezahur16.7K views
Доклад Владимира Бичева на третьем митапе сообщества блокчейн-разработчиков С... by Дмитрий Плахов
Доклад Владимира Бичева на третьем митапе сообщества блокчейн-разработчиков С...Доклад Владимира Бичева на третьем митапе сообщества блокчейн-разработчиков С...
Доклад Владимира Бичева на третьем митапе сообщества блокчейн-разработчиков С...
CryptocurrencyProject by Tim Tosi
CryptocurrencyProjectCryptocurrencyProject
CryptocurrencyProject
Tim Tosi230 views
The Future of Blockchain by JakeSmothers
The Future of Blockchain The Future of Blockchain
The Future of Blockchain
JakeSmothers23 views
Bitcoin and Ransomware Analysis by inder_barara
Bitcoin and Ransomware AnalysisBitcoin and Ransomware Analysis
Bitcoin and Ransomware Analysis
inder_barara2.8K views
Introduction to blockchain 2018 by Christian Kameir
Introduction to blockchain 2018Introduction to blockchain 2018
Introduction to blockchain 2018
Christian Kameir18.1K views
Blockchain Essentials for Enterprise Architects by Gokul Alex
Blockchain Essentials for Enterprise ArchitectsBlockchain Essentials for Enterprise Architects
Blockchain Essentials for Enterprise Architects
Gokul Alex586 views
Hyperledger Sawtooth Lake Intel's OSS Contribution to Enterprise Blockchain by Altoros
Hyperledger Sawtooth Lake Intel's OSS Contribution to Enterprise BlockchainHyperledger Sawtooth Lake Intel's OSS Contribution to Enterprise Blockchain
Hyperledger Sawtooth Lake Intel's OSS Contribution to Enterprise Blockchain
Altoros8.5K views

Similar to Not So Anonymous - Deanonymization of Blockchain Users

Blockchain meetup by
Blockchain meetupBlockchain meetup
Blockchain meetupQuantUniversity
783 views52 slides
Cryptocurrency and Bitcoin by
Cryptocurrency and BitcoinCryptocurrency and Bitcoin
Cryptocurrency and BitcoinUtkarsh Singh
291 views15 slides
Blockchain and Bitcoin by
Blockchain and BitcoinBlockchain and Bitcoin
Blockchain and BitcoinHugo Rodrigues
3.4K views39 slides
Blockchain tutorial for MBA by
Blockchain tutorial for MBABlockchain tutorial for MBA
Blockchain tutorial for MBABlokcert
537 views45 slides
FreeGeek -Cryptocurrency and Blockchain by
FreeGeek -Cryptocurrency and BlockchainFreeGeek -Cryptocurrency and Blockchain
FreeGeek -Cryptocurrency and BlockchainJoshua Johnston
967 views27 slides
Bit.ppt by
Bit.pptBit.ppt
Bit.pptfaisalkaifee1
71 views20 slides

Similar to Not So Anonymous - Deanonymization of Blockchain Users(20)

Cryptocurrency and Bitcoin by Utkarsh Singh
Cryptocurrency and BitcoinCryptocurrency and Bitcoin
Cryptocurrency and Bitcoin
Utkarsh Singh291 views
Blockchain tutorial for MBA by Blokcert
Blockchain tutorial for MBABlockchain tutorial for MBA
Blockchain tutorial for MBA
Blokcert537 views
FreeGeek -Cryptocurrency and Blockchain by Joshua Johnston
FreeGeek -Cryptocurrency and BlockchainFreeGeek -Cryptocurrency and Blockchain
FreeGeek -Cryptocurrency and Blockchain
Joshua Johnston967 views
C-Suite Snacks Webinar Series: How Companies are Making Money in Bitcoin and ... by Citrin Cooperman
C-Suite Snacks Webinar Series: How Companies are Making Money in Bitcoin and ...C-Suite Snacks Webinar Series: How Companies are Making Money in Bitcoin and ...
C-Suite Snacks Webinar Series: How Companies are Making Money in Bitcoin and ...
Citrin Cooperman610 views
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems by Beau Bullock
A Look Into Emerging Security Issues Within Cryptocurrency EcosystemsA Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
Beau Bullock255 views
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems by Beau Bullock
A Look Into Emerging Security Issues Within Cryptocurrency EcosystemsA Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
A Look Into Emerging Security Issues Within Cryptocurrency Ecosystems
Beau Bullock377 views
Bitcoin Blockchain and more; From Digital Trust Protocols to Smart Contract b... by Ismail Hakki Polat
Bitcoin Blockchain and more; From Digital Trust Protocols to Smart Contract b...Bitcoin Blockchain and more; From Digital Trust Protocols to Smart Contract b...
Bitcoin Blockchain and more; From Digital Trust Protocols to Smart Contract b...
Ismail Hakki Polat288 views
Blockchain and Crypto 101 - October 2017 by 🔗Audrey Chaing
Blockchain and Crypto 101 - October 2017Blockchain and Crypto 101 - October 2017
Blockchain and Crypto 101 - October 2017
🔗Audrey Chaing1.1K views
Introduction to Blockchain and Cryptocurrencies by Nikhil D Prince
Introduction to Blockchain  and CryptocurrenciesIntroduction to Blockchain  and Cryptocurrencies
Introduction to Blockchain and Cryptocurrencies
Nikhil D Prince223 views
Is Blockchain Right for You? The Million Dollar Question by Security Innovation
Is Blockchain Right for You? The Million Dollar QuestionIs Blockchain Right for You? The Million Dollar Question
Is Blockchain Right for You? The Million Dollar Question
A technical Introduction to Blockchain. by Dev
A technical Introduction to Blockchain.A technical Introduction to Blockchain.
A technical Introduction to Blockchain.
Dev 280 views
How Blockchain and Cryptocurrency works. by Waleed Ahmed
How Blockchain and Cryptocurrency works.How Blockchain and Cryptocurrency works.
How Blockchain and Cryptocurrency works.
Waleed Ahmed145 views
What is Blockchain - TIEKE by Juha Viitala
What is Blockchain - TIEKE What is Blockchain - TIEKE
What is Blockchain - TIEKE
Juha Viitala443 views

Recently uploaded

Info Session November 2023.pdf by
Info Session November 2023.pdfInfo Session November 2023.pdf
Info Session November 2023.pdfAleksandraKoprivica4
11 views15 slides
Igniting Next Level Productivity with AI-Infused Data Integration Workflows by
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Safe Software
257 views86 slides
Special_edition_innovator_2023.pdf by
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdfWillDavies22
17 views6 slides
Top 10 Strategic Technologies in 2024: AI and Automation by
Top 10 Strategic Technologies in 2024: AI and AutomationTop 10 Strategic Technologies in 2024: AI and Automation
Top 10 Strategic Technologies in 2024: AI and AutomationAutomationEdge Technologies
18 views14 slides
Data-centric AI and the convergence of data and model engineering: opportunit... by
Data-centric AI and the convergence of data and model engineering:opportunit...Data-centric AI and the convergence of data and model engineering:opportunit...
Data-centric AI and the convergence of data and model engineering: opportunit...Paolo Missier
39 views40 slides

Recently uploaded(20)

Igniting Next Level Productivity with AI-Infused Data Integration Workflows by Safe Software
Igniting Next Level Productivity with AI-Infused Data Integration Workflows Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Igniting Next Level Productivity with AI-Infused Data Integration Workflows
Safe Software257 views
Special_edition_innovator_2023.pdf by WillDavies22
Special_edition_innovator_2023.pdfSpecial_edition_innovator_2023.pdf
Special_edition_innovator_2023.pdf
WillDavies2217 views
Data-centric AI and the convergence of data and model engineering: opportunit... by Paolo Missier
Data-centric AI and the convergence of data and model engineering:opportunit...Data-centric AI and the convergence of data and model engineering:opportunit...
Data-centric AI and the convergence of data and model engineering: opportunit...
Paolo Missier39 views
handbook for web 3 adoption.pdf by Liveplex
handbook for web 3 adoption.pdfhandbook for web 3 adoption.pdf
handbook for web 3 adoption.pdf
Liveplex22 views
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors by sugiuralab
TouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective SensorsTouchLog: Finger Micro Gesture Recognition  Using Photo-Reflective Sensors
TouchLog: Finger Micro Gesture Recognition Using Photo-Reflective Sensors
sugiuralab19 views
Transcript: The Details of Description Techniques tips and tangents on altern... by BookNet Canada
Transcript: The Details of Description Techniques tips and tangents on altern...Transcript: The Details of Description Techniques tips and tangents on altern...
Transcript: The Details of Description Techniques tips and tangents on altern...
BookNet Canada135 views
Attacking IoT Devices from a Web Perspective - Linux Day by Simone Onofri
Attacking IoT Devices from a Web Perspective - Linux Day Attacking IoT Devices from a Web Perspective - Linux Day
Attacking IoT Devices from a Web Perspective - Linux Day
Simone Onofri15 views
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive by Network Automation Forum
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLiveAutomating a World-Class Technology Conference; Behind the Scenes of CiscoLive
Automating a World-Class Technology Conference; Behind the Scenes of CiscoLive
AMAZON PRODUCT RESEARCH.pdf by JerikkLaureta
AMAZON PRODUCT RESEARCH.pdfAMAZON PRODUCT RESEARCH.pdf
AMAZON PRODUCT RESEARCH.pdf
JerikkLaureta19 views
Unit 1_Lecture 2_Physical Design of IoT.pdf by StephenTec
Unit 1_Lecture 2_Physical Design of IoT.pdfUnit 1_Lecture 2_Physical Design of IoT.pdf
Unit 1_Lecture 2_Physical Design of IoT.pdf
StephenTec12 views
Voice Logger - Telephony Integration Solution at Aegis by Nirmal Sharma
Voice Logger - Telephony Integration Solution at AegisVoice Logger - Telephony Integration Solution at Aegis
Voice Logger - Telephony Integration Solution at Aegis
Nirmal Sharma31 views
Empathic Computing: Delivering the Potential of the Metaverse by Mark Billinghurst
Empathic Computing: Delivering  the Potential of the MetaverseEmpathic Computing: Delivering  the Potential of the Metaverse
Empathic Computing: Delivering the Potential of the Metaverse
Mark Billinghurst476 views
Spesifikasi Lengkap ASUS Vivobook Go 14 by Dot Semarang
Spesifikasi Lengkap ASUS Vivobook Go 14Spesifikasi Lengkap ASUS Vivobook Go 14
Spesifikasi Lengkap ASUS Vivobook Go 14
Dot Semarang37 views
STPI OctaNE CoE Brochure.pdf by madhurjyapb
STPI OctaNE CoE Brochure.pdfSTPI OctaNE CoE Brochure.pdf
STPI OctaNE CoE Brochure.pdf
madhurjyapb13 views

Not So Anonymous - Deanonymization of Blockchain Users

  • 1. Not so Anonymous - Deanonymization of Blockchain Users Johannes Ahlmann Cork Blockchain Meetup 2018-11-13 https://www.dailydot.com/news/anonymous-opfullerton-kelly-thomas/
  • 2. Lightning Talk - Agenda • Is Bitcoin anonymous? • What is Deanonymization? • Why should I care? • What can I do about it? • Where to get cryptos? • Alternatives
  • 3. Anonymity & Privacy Anonymity "They" can see what you do, but not who you are Privacy Controlling who sees what activities you engage in https://d262ilb51hltx0.cloudfront.net/max/1610/1*d0KdwdeKDi5m8n-sZdr-_A.png
  • 4. Anonymity 1/2 • Pseudonymity - People are aware of one or multiple pseudonyms of yours, but not your true identity • Anonymity = Pseudonymity + Unlinkability • Unlinkability • Different actions of the same user should not be linkable to each other • Linking of addresses to users • Linking of transactions to users • Linking of senders to recipients source: Prof. Murtuza Jadliwala
  • 5. Anonymity 2/2 • Privacy vs. Decentralization • Public Ledger is core component in consensus and sharing state of the world • Bitcoin is pseudonymous, not anonymous • public addresses = pseudonyms • much less anonymous, private than cash • Many Bitcoins are acquired through Exchanges or Mining Pools • Relatively few merchants/ market participants to trade with
  • 6. What is Deanonymization • Linking you to your addresses • Linking you to your transactions • Tagging, clustering of totality of addresses, transactions • Approaches • Transaction Graph Analysis • Realtime Network Analysis of P2P network
  • 7. Transaction Graph Analysis 1/2 Change Address Combined Addresses
  • 8. Transaction Graph Analysis 2/2 • Bitcoin transactions are public • Active collecting • Mining pools • Online wallets • Exchanges • Merchants • Gambling • Tagging clusters • One tagged address in cluster tags all cluster • Bitcoin address should only be used once An Analysis of Anonymity in the Bitcoin System F. Reid and M. Harrigan, PASSAT 2011
  • 9. Realtime Network Analysis • "Attack" on the P2P Network • Peers distinguished over set of its (8) entry nodes • Linking inputs • Tagging clusters
  • 11. Realtime Network Analysis • Linking of different transactions to same user • Each peer is trying to connect to 8 entry nodes • Network discovery • Servers • Receive incoming connections • Max. 117 incoming connections • Clients • 8 outgoing connections • Peers are distinguished over set of it’s entry nodes!
  • 12. Remediation • Hierarchical Deterministic Wallets • Random Address Pool Wallets • Tor • Mixers • Who can we trust? • Coinjoin • How to find Peers? • Anonymous cryptocurrencies
  • 13. Anonymous Currencies Monero - Ring signatures Dash - Fork of bitcoin, coin-mixing service Zcash - zk-SNARK, zero knowledge proofs Verge - Tor and I2P network for privacy Komodo - Fork of Zcash, zk-SNARK Pivx - Fork of Dash, Zerocoin protocol (Legitimate goods vs. legitimate worries; how can this be used for good or bad?)
  • 15. Resources • https://coincenter.org/entry/how-anonymous-is-bitcoin • https://bitcoinmagazine.com/articles/is-bitcoin-anonymous-a-complete-beginner-s-guide-1447875283/ • https://www.coursera.org/lecture/cryptocurrency/how-to-de-anonymize-bitcoin-qnS76 • https://www.slideshare.net/bhaslhofer/bitcoin-deanonymization-and-money-laundering-detection-strategies • https://pwlconf.org/2018/giulia-fanti/ • https://www.technologyreview.com/s/608716/bitcoin-transactions-arent-as-anonymous-as-everyone-hoped/ • https://decentralize.today/a-new-attack-vector-to-deanonymize-bitcoin-users-9c6dc433d4b6 • https://www.deepdotweb.com/2017/04/20/how-companies-are-deanonymizing-bitcoin/ • https://www.slideshare.net/bhaslhofer/bitcoin-deanonymization-and-money-laundering-detection-strategies • https://bitcoinsandblockchains.blogspot.com/2016/05/bitcoin-deanonymization.html • https://btcmanager.com/u-s-department-of-homeland-security-create-bitcoin-deanonymization-tool/ • https://www.deepdotweb.com/2018/01/02/using-bitcoin-transaction-analysis-deanonymizing-users-tor-hidden-services/