Deutsch   English   Français   Italiano  
<20250527.183225.1b44c8cf@msgid.frell.theremailer.net>

View for Bookmarking (what is this?)
Look up another Usenet article

Date: Tue, 27 May 2025 18:32:25 +0200
From: D <J@M>
Subject: Deanonymizing Pseudonymity
Content-Transfer-Encoding: 8bit
Message-Id: <20250527.183225.1b44c8cf@msgid.frell.theremailer.net>
Newsgroups: misc.phone.mobile.iphone
Path: news.eternal-september.org!eternal-september.org!feeder3.eternal-september.org!news.szaf.org!3.eu.feeder.erje.net!feeder.erje.net!news2.arglkargh.de!sewer!news.dizum.net!not-for-mail
Organization: dizum.com - The Internet Problem Provider
X-Abuse: abuse@dizum.com
Injection-Info: sewer.dizum.com - 2001::1/128


(quoting links recently posted in <news:20250527.095215.9aa06e66@yamn.paranoici.org>)  
 
(using Tor Browser 14.5.2) 
https://dl.acm.org/doi/10.1016/j.cose.2019.101684 
>Deanonymizing Tor hidden service users through Bitcoin transactions analysis   
>Authors: Husam Al Jawaheri, Mashael Al Sabah, Yazan Boshmaf, Aiman Erbad Authors Info
>& Claims 
>Volume 89, Issue C
>https://doi.org/10.1016/j.cose.2019.101684 
>Published: 01 February 2020 Publication History   
>ACM Digital Library 
>Abstract 
>With the rapid increase of threats on the Internet, people are continuously seeking 
>privacy and anonymity. Services such as Bitcoin and Tor were introduced to provide  
>anonymity for online transactions and Web browsing. Due to its pseudonymity model,
>Bitcoin lacks retroactive operational security, which means historical pieces of 
>information could be used to identify a certain user. By exploiting publicly available
>information, we show how relying on Bitcoin for payments on Tor hidden services could   
>lead to deanonymization of these services¢ users. Such linking is possible by finding 
>at least one past transaction in the Blockchain that involves their publicly declared
>Bitcoin addresses.
>To demonstrate the consequences of this deanonymization approach, we carried out a   
>real-world experiment simulating a passive, limited adversary. We crawled 1.5K hidden 
>services and collected 88 unique and active Bitcoin addresses. We then crawled 5B 
>tweets and 1M BitcoinTalk forum pages and collected 4.2K and 41K unique Bitcoin
>addresses, respectively. Each user address was associated with an online identity along 
>with its public profile information. By analyzing the transactions in the Blockchain,
>we were able to link 125 unique users to 20 hidden services, including sensitive ones,  
>such as The Pirate Bay and Silk Road. We also analyzed two case studies in detail to
>demonstrate the implications of the information leakage on users anonymity. In 
>particular, we confirm that Bitcoin addresses should be considered exploitable, as they 
>can be used to deanonymize users retroactively. This is especially important for Tor 
>hidden service users who actively seek and expect privacy and anonymity.
>References   
>... 
[end quoted excerpt]  
 
(using Tor Browser 14.5.2) 
https://dl.acm.org/doi/abs/10.1145/3589335.3651487  
>Deanonymizing Transactions Originating from Monero Tor Hidden Service Nodes 
>Authors: Ruisheng Shi, Yulian Ge, Lina Lan, Zhiyuan Peng, Shenwen Lin, Lin Li Authors
>Info & Claims
>WWW '24: Companion Proceedings of the ACM Web Conference 2024  
>Pages 678 - 681  
>https://doi.org/10.1145/3589335.3651487
>Published: 13 May 2024 Publication History  
>Get Access 
>WWW '24: Companion Proceedings of the ACM Web Conference 2024 
>Deanonymizing Transactions Originating from Monero Tor Hidden Service Nodes
>Pages 678 - 681
>ACM Digital Library  
>Abstract 
>Monero is a privacy-focused cryptocurrency that incorporates anonymity networks (such 
>as Tor and I2P) and deploys the Dandelion++ protocol to prevent malicious attackers   
>from linking transactions with their source IPs. However, this paper highlights a
>vulnerability in Monero's integration of the Tor network, which allows an attacker to 
>successfully deanonymize transactions originating from Monero Tor hidden service nodes
>at the network-layer level.  
>Our approach involves injecting malicious Monero Tor hidden service nodes into the 
>Monero P2P network to correlate the onion addresses of incoming Monero Tor hidden  
>service peers with their originating transactions. And by sending a signal watermark 
>embedded with the onion address to the Tor circuit, we establish a correlation between
>the onion address and IP address of a Monero Tor hidden service node. Ultimately, we
>correlate transactions and IPs of Monero Tor hidden service nodes.   
>Through experimentation on the Monero testnet, we provide empirical evidence of the  
>effectiveness of our approach in successfully deanonymizing transactions originating 
>from Monero Tor hidden service nodes. 
>Supplemental Material
>MP4 File  
>Supplemental video 
> Download   7.23 MB
>  https://dl.acm.org/doi/suppl/10.1145/3589335.3651487/suppl_file/shp4046.mp4 
>References 
>...     
[end quoted excerpt]  
 
p.s.  the best advice i've ever read about big money is to "avoid not evade"