Papers
Topics
Authors
Recent
Gemini 2.5 Flash
Gemini 2.5 Flash
175 tokens/sec
GPT-4o
7 tokens/sec
Gemini 2.5 Pro Pro
42 tokens/sec
o3 Pro
4 tokens/sec
GPT-4.1 Pro
38 tokens/sec
DeepSeek R1 via Azure Pro
28 tokens/sec
2000 character limit reached

Deanonymisation of clients in Bitcoin P2P network (1405.7418v3)

Published 28 May 2014 in cs.CR

Abstract: Bitcoin is a digital currency which relies on a distributed set of miners to mint coins and on a peer-to-peer network to broadcast transactions. The identities of Bitcoin users are hidden behind pseudonyms (public keys) which are recommended to be changed frequently in order to increase transaction unlinkability. We present an efficient method to deanonymize Bitcoin users, which allows to link user pseudonyms to the IP addresses where the transactions are generated. Our techniques work for the most common and the most challenging scenario when users are behind NATs or firewalls of their ISPs. They allow to link transactions of a user behind a NAT and to distinguish connections and transactions of different users behind the same NAT. We also show that a natural countermeasure of using Tor or other anonymity services can be cut-off by abusing anti-DoS countermeasures of the bitcoin network. Our attacks require only a few machines and have been experimentally verified. We propose several countermeasures to mitigate these new attacks.

Citations (508)

Summary

  • The paper demonstrates that deanonymisation is achievable by linking Bitcoin clients’ entry nodes to their IP addresses, affecting 11% of transactions.
  • It employs analysis of transaction propagation patterns and exploits anti-DoS mechanisms to bypass anonymity measures like Tor.
  • The findings highlight significant privacy risks in Bitcoin, urging protocol revisions such as dynamic entry node selection to bolster security.

Deanonymisation of Clients in Bitcoin P2P Network

This paper explores a critical security vulnerability within the Bitcoin peer-to-peer (P2P) network, presenting methods to deanonymize Bitcoin users by linking pseudonyms to IP addresses. The authors challenge the assumption of user anonymity in Bitcoin transactions, even when users are behind Network Address Translators (NATs) or firewalls.

Methodology

The researchers present a comprehensive strategy to deanonymize users, targeting particularly those behind NATs. The central technique revolves around identifying a user’s entry nodes—the set of nodes they connect to in the network. By observing the transaction propagation patterns, the method allows the correlation of Bitcoin addresses with the user’s IP address. A noteworthy aspect of this technique is its ability to work even when users attempt to mask their identities using anonymity services like Tor. The paper found that these services could be circumvented by exploiting Bitcoin's anti-Denial-of-Service (DoS) mechanisms.

Key Findings

The authors demonstrate that the attack is executable with limited resources, requiring only a few machines, and that it can successfully deanonymize 11% of transactions. This capability stems from the small number of entry nodes each Bitcoin client interacts with, allowing adversaries to capture these connections and identify users through their transactions. By conducting experiments in the Bitcoin test network, the authors confirmed the feasibility and efficiency of their attack methodologies and actions.

Implications

Practically, these findings indicate a significant threat to privacy within the Bitcoin network, suggesting that the anonymity protections provided by the current protocol are insufficient. The paper advocates for countermeasures, such as dynamically changing entry nodes, which would strengthen user anonymity.

Theoretically, the research sheds light on vulnerability patterns not only within Bitcoin but potentially within other cryptocurrencies using similar P2P architectures. It highlights the importance of reconsidering the security models that rely heavily on pseudonymity without robust network-level anonymity.

Speculation on Future Developments

Given this paper’s insights, future developments in cryptocurrency networks may focus on enhancing the robustness of their privacy mechanisms. Implementations may evolve to incorporate more sophisticated anonymization methods, such as integrating layers of obfuscation or adopting alternative network routing protocols. Additionally, there may be further exploration into dynamic network architectures that frequently alter connection pathways to thwart such deanonymization efforts.

Conclusion

The research presents a critical analysis of Bitcoin’s privacy assumptions and provides concrete evidence of vulnerabilities in user anonymity. It is an essential contribution to understanding the implications of network security within decentralized financial systems and poses a compelling argument for revisiting and enhancing existing protocols to safeguard user privacy against evolving adversarial strategies.

X Twitter Logo Streamline Icon: https://streamlinehq.com
Youtube Logo Streamline Icon: https://streamlinehq.com