From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from sog-mx-4.v43.ch3.sourceforge.com ([172.29.43.194] helo=mx.sourceforge.net) by sfs-ml-1.v29.ch3.sourceforge.com with esmtp (Exim 4.76) (envelope-from ) id 1Xu37i-0003fl-HQ for bitcoin-development@lists.sourceforge.net; Thu, 27 Nov 2014 17:44:58 +0000 Received-SPF: pass (sog-mx-4.v43.ch3.sourceforge.com: domain of gmail.com designates 209.85.217.193 as permitted sender) client-ip=209.85.217.193; envelope-from=misterbg6@gmail.com; helo=mail-lb0-f193.google.com; Received: from mail-lb0-f193.google.com ([209.85.217.193]) by sog-mx-4.v43.ch3.sourceforge.com with esmtps (TLSv1:RC4-SHA:128) (Exim 4.76) id 1Xu37h-00042v-Ff for bitcoin-development@lists.sourceforge.net; Thu, 27 Nov 2014 17:44:58 +0000 Received: by mail-lb0-f193.google.com with SMTP id w7so720627lbi.0 for ; Thu, 27 Nov 2014 09:44:51 -0800 (PST) MIME-Version: 1.0 X-Received: by 10.152.27.73 with SMTP id r9mr37705004lag.33.1417110291121; Thu, 27 Nov 2014 09:44:51 -0800 (PST) Received: by 10.25.30.13 with HTTP; Thu, 27 Nov 2014 09:44:51 -0800 (PST) Date: Thu, 27 Nov 2014 18:44:51 +0100 Message-ID: From: Mistr Bigs To: Bitcoin Development Content-Type: multipart/alternative; boundary=089e0160c274828d0e0508dab327 X-Spam-Score: -0.3 (/) X-Spam-Report: Spam Filtering performed by mx.sourceforge.net. See http://spamassassin.org/tag/ for more details. -1.5 SPF_CHECK_PASS SPF reports sender host as permitted sender for sender-domain 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider (misterbg6[at]gmail.com) -0.0 SPF_PASS SPF: sender matches SPF record 0.2 FREEMAIL_ENVFROM_END_DIGIT Envelope-from freemail username ends in digit (misterbg6[at]gmail.com) 1.0 HTML_MESSAGE BODY: HTML included in message -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from author's domain 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature X-Headers-End: 1Xu37h-00042v-Ff Subject: Re: [Bitcoin-development] Deanonymisation of clients in Bitcoin P2P network paper X-BeenThere: bitcoin-development@lists.sourceforge.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 27 Nov 2014 17:44:58 -0000 --089e0160c274828d0e0508dab327 Content-Type: text/plain; charset=UTF-8 I might be mistaken, but it seems to me this paper discusses unintended ways of obtaining the IP addresses of clients involved in transactions on the core Bitcoin network. Tor was mentioned only insofar as it might be one's first thought of how to mitigate this risk, yet Bitcoin over Tor has its own problems that prevent this from being effective. But the primary "issues" mentioned in the paper are regarding a Bitcoin node in default operation, no? "In their new study, researchers at the Laboratory of Algorithmics, Cryptology and Security of the University of Luxembourg have shown that Bitcoin does not protect user's IP address and that it can be linked to the user's transactions in real-time." "The basic idea behind these findings is that Bitcoin entry nodes, to which the user's computer connects in order to make a transaction, form a unique identifier for the duration of user's session. This unique pattern can be linked to a user's IP address. Moreover, transactions made during one session, even those made via unrelated pseudonyms, can be linked together. With this method, hackers can reveal up to 60 percent of the IP addresses behind the transactions made over the Bitcoin network." "'This Bitcoin network analysis combined with previous research on transaction flows shows that the level of anonymity in the Bitcoin network is quite low,' explains Dr. Alex Biryukov." M --089e0160c274828d0e0508dab327 Content-Type: text/html; charset=UTF-8
I might be mistaken, but it seems to me this paper discusses unintended ways of obtaining the IP addresses of clients involved in transactions on the core Bitcoin network.
Tor was mentioned only insofar as it might be one's first thought of how to mitigate this risk, yet Bitcoin over Tor has its own problems that prevent this from being effective.
But the primary "issues" mentioned in the paper are regarding a Bitcoin node in default operation, no?

"In their new study, researchers at the Laboratory of Algorithmics, Cryptology and Security of the University of Luxembourg have shown that Bitcoin does not protect user's IP address and that it can be linked to the user's transactions in real-time."

"The basic idea behind these findings is that Bitcoin entry nodes, to which the user's computer connects in order to make a transaction, form a unique identifier for the duration of user's session. This unique pattern can be linked to a user's IP address. Moreover, transactions made during one session, even those made via unrelated pseudonyms, can be linked together. With this method, hackers can reveal up to 60 percent of the IP addresses behind the transactions made over the Bitcoin network."

"'This Bitcoin network analysis combined with previous research on transaction flows shows that the level of anonymity in the Bitcoin network is quite low,' explains Dr. Alex Biryukov."

M
--089e0160c274828d0e0508dab327--