The Myth of Untraceable Transactions Shattered: Bitcoin's Anonymity Revealed in Recent Paper
The Myth of Untraceable Transactions Shattered: Bitcoin’s Anonymity Revealed in Recent Paper
By Jiap – Shutterstock
It has been a totem of the cryptocurrency community that the numeric addresses of Bitcoin and other wallets will protect the identity of those using them to buy and sell.
A new paper, released this week by researchers at Baylor College of Medicine and Rice University, has shattered that presumed anonymity. Titled “Cooperation among an anonymous group, protected Bitcoin during failures of decentralization,” the paper is now posted on the researchers’ server .
ZDNET Recommends
Lead researcher Alyssa Blackburn of Baylor and Rice, along with team-mates Christoph Huber, Yossi Eliaz, Muhammad S. Shamim, David Weisz, Goutham Seshadri, Kevin Kim, Shengqi Hang, and Erez Lieberman Aiden, used a technique called “address linking” to study the Bitcoin transactions in the first two years of its existence: January of 2009 to February of 2011.
Their key discovery is that, in those first two years, “most Bitcoin was mined by only sixty-four agents […] collectively accounting for ₿2,676,800 (PV: $84 billion).” They are referring to the process of minting new coins by solving computer challenges.
That number – 64 people in total – “is 1000-fold smaller than prior estimates of the size of the early Bitcoin community (75,000),” they observe.
Those 64 people include some notable figures that have already become legends, such as Ross Ulbricht, known by the handle Dread Pirate Roberts. Ulbricht is the founder of Silk Road, a black-market operation that used Bitcoin for illicit means – until it was shut down by the FBI.
“Fig 1. Sixty-four agents mined most of the bitcoin between bitcoin’s launch and when it achieved price parity with the US dollar. We exploited data leakage to construct a map of the blockchain in early 2011, in which bitcoin are arranged according to the agent that mined them.”
Blackburn et al.
For Blackburn and team, the point was to study the effects of people participating in game-theoretic situations as anonymous parties. Surprisingly, they found early insiders like Ulbricht could have exploited the relative paucity of participants by undermining Bitcoin to double-spend coins, but they did not. They acted “altruistically” to maintain the integrity of the system.
That’s intriguing, but a more pressing discovery is that addresses can be traced and identities can be revealed.
ZDNET Recommends
To find out who was doing those early transactions, Blackburn and team had to reverse-engineer the entire premise of Bitcoin and of all crypto: anonymity.
As outlined in the original Bitcoin white paper by Satoshi Nakamoto, privacy was to be preserved by two means: anonymous public key use and creating new key pairs for every transaction:
The traditional banking model achieves a level of privacy by limiting access to information to the parties involved and the trusted third party. The necessity to announce all transactions publicly precludes this method, but privacy can still be maintained by breaking the flow of information in another place: by keeping public keys anonymous. The public can see that someone is sending an amount to someone else, but without information linking the transaction to anyone. This is similar to the level of information released by stock exchanges, where the time and size of individual trades, the “tape”, is made public, but without telling who the parties were.
As an additional firewall, a new key pair should be used for each transaction to keep them from being linked to a common owner. Some linking is still unavoidable with multi-input transactions, which necessarily reveal that their inputs were owned by the same owner. The risk is that if the owner of a key is revealed, linking could reveal other transactions that belonged to the same owner.
Blackburn and team had to trace those key pairs to reveal early Bitcoin’s transacting parties. To do so, they developed what they called a novel address-linking scheme.
More Crypto Coach
- How do I buy Bitcoin? Here’s how it works
- How to protect your seed phrase
- How to stay warm during a crypto winter
- How to set up a cold storage wallet
- How to purchase crypto coins using Robinhood
The scheme finds two patterns that point to users: one is the presence of recurring bits of code, and one is duplicate addresses for certain transactions.
As the authors write,
Two of these techniques exploit how the bitcoin mining software generated apparently-meaningless strings, which were used as part of bitcoin’s cryptographic protections against forgery. In fact, there are extensive correlations between the apparently-meaningless strings associated with a single user. The other two techniques exploit insecure user behaviors, such as the use of multiple addresses to pay for a single transaction, that make it possible to link addresses based on transaction activity.
The consequence of that, they write, is that it is possible to “follow the money” to expose any identity by following a chain of relatedness in a graph of addresses, starting from a known identity:
These network properties have unintended privacy consequences, because they make the network much more vulnerable to deanonymization using a “follow-the-money” approach. In this approach, the identity of a target bitcoin address can be ascertained by identifying a short transaction path linking it to an address whose identity is known, and then using off-chain data sources (ranging from public data to subpoenas) to walk along the path, determining who-paid-whom to de-identify addresses until the target address is identified.
Further, they hypothesize that “many cryptocurrencies may be susceptible to follow-the-money attacks.”
Blackburn told The New York Times‘s Siobhan Roberts, “When you are encrypting private data and making it public, you cannot assume that it’ll be private forever.”
As the team concludes in the report, “Drip-by-drip, information leakage erodes the once-impenetrable blocks, carving out a new landscape of socioeconomic data.”
More Crypto
How do I buy Bitcoin? Here’s how it works
Top crypto exchanges: The ones you need to know
Must-have cryptocurrency hardware wallets: Keep your cryptocurrency safe
- How do I buy Bitcoin? Here’s how it works
- The best crypto credit cards
- Top crypto exchanges: The ones you need to know
- Must-have cryptocurrency hardware wallets: Keep your cryptocurrency safe
Also read:
- [Updated] 2024 Approved Deciding on a VR Setup Going Wireless (Mobile) or Connected (Tethered)
- AI Mastery Without Coding Knowledge - Tackling Intricate Systems Through Varied Education Strategies | ZDNet
- Boosting Business with ChatGPT: Top 8 Strategies
- Easy Steps: Install Official HP Printer Drivers – Beginner's Guide
- Exploring How Technological Advancements Contribute to Staff Burnout and Strategies for Improvement | ZDNet
- Exploring the Unexpected: How AI Is Shaping Unprecedented Job Roles and Their Mysterious Titles | ZDNET Analysis
- Fix Oppo A56s 5G Android System Webview Crash 2024 Issue | Dr.fone
- Is Artificial Intelligence a Threat to Cybersecurity Employment Prospects?
- Mastering Tech Team Leadership: Start with Core Business Insights
- Multi-File Converter: Merge Videos Into Single ISO Format
- Overcoming Modern Hurdles: Tackling Ambiguous Results and Uncertain Precision in AI | Expert Analysis by ZDNET
- Pattern Locks Are Unsafe Secure Your Samsung Galaxy S24+ Phone Now with These Tips
- Top 5 Vivo Y55s 5G (2023) Bypass FRP Tools for PC That Actually Work
- Unlocking Artificial Intelligence: Data as the Key Element - Strategies to Complete the AI Jigsaw
- Yosemite Video Editing Mastery Advanced Techniques for Mac Users
- Title: The Myth of Untraceable Transactions Shattered: Bitcoin's Anonymity Revealed in Recent Paper
- Author: Matthew
- Created at : 2024-11-09 01:52:14
- Updated at : 2024-11-13 21:40:11
- Link: https://app-tips.techidaily.com/the-myth-of-untraceable-transactions-shattered-bitcoins-anonymity-revealed-in-recent-paper/
- License: This work is licensed under CC BY-NC-SA 4.0.