Pages:
Author

Topic: [FORBES] How Private Are Bitcoin Transactions? (Read 3720 times)

sr. member
Activity: 350
Merit: 251
You could get a new "identity" by dumping all your coins in a laundering service...

That's not entirely true, right? If you have a large sum of money you could overwhelm the launderer and end up receiving some of your own coins back. Even ONE would be enough to trip you up.

http://xuie7qspblyer5ms.onion/
sr. member
Activity: 462
Merit: 250
You could get a new "identity" by dumping all your coins in a laundering service...

That's not entirely true, right? If you have a large sum of money you could overwhelm the launderer and end up receiving some of your own coins back. Even ONE would be enough to trip you up.
sr. member
Activity: 350
Merit: 251
I'm not sure I understand the article completely.

Dont people tend to use multiple addys? I know it seems to be a noob mistake to think that your old addys are no good as it changes right after you receive some coin.

and how can you link someones receive addresses with their send ones?

or is he just saying, if you collect your poker winnings with one address dont use that same address in your forum sigs?

if people only used one address for their questionable activity and then one for everything else, what else would the authories know besides money is traveling between a known illegal addy like silk road and and an address that a user only uses for that purpose? 

I guess their are links between addies and IPs?


You could get a new "identity" by dumping all your coins in a laundering service and killing all your old addresses. if you needed you could use tor for all BC related stuffs.
sr. member
Activity: 476
Merit: 250
moOo
I'm not sure I understand the article completely.

Dont people tend to use multiple addys? I know it seems to be a noob mistake to think that your old addys are no good as it changes right after you receive some coin.

and how can you link someones receive addresses with their send ones?

or is he just saying, if you collect your poker winnings with one address dont use that same address in your forum sigs?

if people only used one address for their questionable activity and then one for everything else, what else would the authories know besides money is traveling between a known illegal addy like silk road and and an address that a user only uses for that purpose? 

I guess their are links between addies and IPs?
sr. member
Activity: 350
Merit: 251
how can you be sure that your browser was not involved in a man in the middle attack and that its certs were not tampered with. the only way you can know 100% sure the person you talk with on the internet is if you exchange keys in person.
hero member
Activity: 588
Merit: 500
With unsigned certificates my question isn't concerning trust unless security is totally depend on 3rd party trusted authorities. So the question is: is unsigned certificate provides same level of security as a signed one?  Whether browser trusts it or not doesn't matter as long as unsigned cert provides same safe encrypted channel for transmitting data.

Yes, as long as you can be sure that the certificate actually belongs to the site that you think it does. But if the certificate is self-signed then you have to figure this out for yourself. Most people do not have the technical expertise (or the patience!) to do this.
legendary
Activity: 1050
Merit: 1000
I always thought that self-signed certs were as secure just could not be verified by trusted CAs which would trigger unsigned cert message in browsers other than that they should be functioning same as signed ones or am I misunderstanding?
The problem is that your browser trusts a lot of signing authorities. Many will let you a buy a certificate that in turn lets you sign your own certificates. That means if your attacker has money, they can easily impersonate any website they want by signing a certificate in their name. Source: Certificate Patrol Website

Edit: You also need to be a company with over 5 million in assets, 5 Million in insurance and has clear audited policies on how you use the certificates. For the GeoTrust root anyway.


With unsigned certificates my question isn't concerning trust unless security is totally depend on 3rd party trusted authorities. So the question is: is unsigned certificate provides same level of security as a signed one?  Whether browser trusts it or not doesn't matter as long as unsigned cert provides same safe encrypted channel for transmitting data.
sr. member
Activity: 350
Merit: 251
hero member
Activity: 588
Merit: 500
HTTPS includes authentication, because without it man-in-the-middle attacks are trivial.

Encryption isn't magic security pixie dust. Without authentication, the attacker can simply set up two encrypted sessions: one to the user, and one to the server being impersonated.

But.... but.... http://www.youtube.com/watch?v=3nbEeU2dRBg !!!
legendary
Activity: 1008
Merit: 1001
Let the chips fall where they may.
HTTPS includes authentication, because without it man-in-the-middle attacks are trivial.

Encryption isn't magic security pixie dust. Without authentication, the attacker can simply set up two encrypted sessions: one to the user, and one to the server being impersonated.
sr. member
Activity: 350
Merit: 251
the whole https thing seems silly to me. who thought it was a good idea to combine https with verifying who you are talking to is who you are talking to. it makes doing this more difficult for less technically inclined people to think that who they are talking to is automatically bad. I believe these 2 things should be completely separate so we don't have to buy certs from some moron who thinks they have more trust than someone else.
sr. member
Activity: 462
Merit: 250
When making an outgoing payment, pick a selection of addresses whose balances add up to only slightly more than the sum you wish to pay. Pool those into a new address (with a little left-over in one of the original accounts), and send the whole payment from that new address.

I don't fully understand what is being said here.  How did I end up with a selection of addresses whose balances add up to only slightly more than the sum I wish to pay?  Do I need to spend time sending and receiving to myself to have these?  Also, I thought the client chooses randomly across addresses which ones take the hit for an outgoing payment (true?).  If yes, how do I control which addresses take the hit?
legendary
Activity: 1008
Merit: 1001
Let the chips fall where they may.
I always thought that self-signed certs were as secure just could not be verified by trusted CAs which would trigger unsigned cert message in browsers other than that they should be functioning same as signed ones or am I misunderstanding?
The problem is that your browser trusts a lot of signing authorities. Many will let you a buy a certificate that in turn lets you sign your own certificates. That means if your attacker has money, they can easily impersonate any website they want by signing a certificate in their name. Source: Certificate Patrol Website

Edit: You also need to be a company with over 5 million in assets, 5 Million in insurance and has clear audited policies on how you use the certificates. For the GeoTrust root anyway.
Quote
I've heard that there was some sort of venerability with OpenSSL certs, but other than that are signed certs by well known organizations safe? I mean could a middle man such as an ISP intercept handshake and public keys and eavesdrop inside secure channel passing packets or is it impossible?

I only started caring about ubiquitous encryption over the past 3 months or so. I am dismayed how prudent sending everything is clear-text really appears to be: HTTPS can easily give a false sense of security. I have not had time to tease out a list of best practices. My own website does not support HTTPS at the moment.

Edit: I have an interest in the gopher protocol. I may investigate using IPSec for encryption or authentication. I currently care more about authentication. Authentication can never be automated and easy: That is the situation we have with Certificate authorities. Users need to exchange information out-of-band: over the phone, in person, or by letter mail.
legendary
Activity: 1050
Merit: 1000
Doesn't SSL protect you from that or it only provides false sense of security from ISPs?

SSL/TLS Vulnerability Widely Unpatched.

Add to that that most browsers treat Clear-text HTTP as more secure than self-signed certificates. That means most websites either use no authentication, or rely on a Certificate authority that may be malicious.

In an ideal world, organizations would post the "fingerprint" of their self-signed certificate on their premises. If you are using e-billing, the billing company would send you a copy of the certificate or fingerprint by mail.

In any case, your ISP knows which server you are connecting to when you use HTTPS, but not necessarily which pages you visit.


I always thought that self-signed certs were as secure just could not be verified by trusted CAs which would trigger unsigned cert message in browsers other than that they should be functioning same as signed ones or am I misunderstanding?

I've heard that there was some sort of venerability with OpenSSL certs, but other than that are signed certs by well known organizations safe? I mean could a middle man such as an ISP intercept handshake and public keys and eavesdrop inside secure channel passing packets or is it impossible?
member
Activity: 118
Merit: 10
The Forbes blogger posted a follow-up to the original:

http://blogs.forbes.com/timothylee/2011/07/14/advanced-bitcoin-anonymity/
hero member
Activity: 836
Merit: 1007
"How do you eat an elephant? One bit at a time..."
That's why the following project is so important:

Open Transactions + Bitcoin = Untraceable and Instant Transactions

This is a project worth supporting. Listen to the radio shows for more info:

Part 1:
http://agoristradio.com/?p=234

Part 2:
http://agoristradio.com/?p=246

Technical Links:

FellowTraveler / Open-Transactions Github and Info Site

https://github.com/FellowTraveler/Open-Transactions/

https://github.com/FellowTraveler/Moneychanger

Support this project! Donate here:

1NtTPVVjDsUfDWybS4BwvHpG2pdS9RnYyQ

See the latest update on Open Transactions developments:

http://forum.bitcoin.org/index.php?topic=28565.msg363945#msg363945
member
Activity: 70
Merit: 10
GNU is not UNIX
Someone needs to fire up Tor/I2P/etc and make a "Coin Wash" site.

There is a BitLaunder Tor hidden service (http://xuie7qspblyer5ms.onion/). It's listed on the wiki.
hero member
Activity: 742
Merit: 500
Someone needs to fire up Tor/I2P/etc and make a "Coin Wash" site.

Someone sends in an arbitrary amount of BTC along with multiple new addresses. The BTC that go in are broken into randomly-sized portions and sent to the new addresses at random intervals, interleaved with other transactions (minus a fee of course). If multiple coin washers existed they could also send coins to each other with instructions to forward. If such nodes also ran their own private testnet of sorts (zero fee) and sent mountains of arbitrary transactions with the right format it could be quite difficult even for even the ISP to sort the real transactions from the fake (see: chaffing and winnowing).

I think the above should be sufficient to beat analysis-based attacks, using Tor or I2P beefs up protection against analysis a bit more and I trust that the security already bundled in the bitcoin client should cover the rest.

Have I missed anything?

never used it but think this is something like that http://bitcoinlaundry.com/

can listen to more about it here http://agoristradio.com/?p=407


The problem with something as simple as bitcoinlaundry is that simple network analysis undoes your anonymity. If Alice wants to send Bob 3.14 BTC without it being traceable, bitcoinlaundry says "hand it to Charlie and have Charlie hand it to Bob" which, in the context of bitcoin, is a good start because at least it keeps your address off the books and all someone could conceivably discover is that you sent coins to Charlie, right?

Problem #1: if Dave has the ability to watch what Charlie sends and receives, he can pretty easily see that Alice sent in 3.14 BTC and soon after Charlie sent that exact amount to Bob - unless your transaction is an amount that a huge volume of others will be sending (1 BTC even perhaps) it is easily identified. Charlie could also be scrutinized by watching the timing of several known transactions and then observing the money in/out timing of unknown transactions.

Problem #2: Since Charlie operates on the open internet under his real name his equipment (and wallet) could be seized by the authorities quite easily. It's very difficult to do this sort of thing properly without keeping at least temporary records of where money came from and where it is destined.

Problem #3: Even if you solve problem 1 and 2, chances are that Charlie isn't performing enough transactions each day to properly disguise who sent what to whom. Even if he is, such data is not made available and neither Alice nor Bob have any way of knowing whether their transaction will be securely hidden among the transactions of others. Charlie could easily generate many fake transactions to hide the valid ones, but I don't know how similar testnet (or namecoin or any blockchain branch really) traffic looks to valid BTC traffic when sniffed offhand, I may be barking up the wrong tree on this one.

Much like running an exchange the security and thought process that must go into a coin washer are NOT trivial. Unlike an exchange, the first time one of these gets hacked it'll probably be by the government and people will probably go to jail as a result, so if anyone takes this and runs with it - DO IT RIGHT.
hero member
Activity: 836
Merit: 1007
"How do you eat an elephant? One bit at a time..."
Yes, bitcoinlaundry.com sounds interesting. When you wish to conduct a transaction that you'd prefer to be more private simply pay the bill through this account. From what I've read elsewhere the more people that use this service the less likely you are to receive the same coins back. Maybe we should start sending more payments through here - even if it's just to help others mix up their coins. Would that work or would it be too easy to match the amounts paid in and the amounts paid out?
k
sr. member
Activity: 451
Merit: 250
Someone needs to fire up Tor/I2P/etc and make a "Coin Wash" site.

Someone sends in an arbitrary amount of BTC along with multiple new addresses. The BTC that go in are broken into randomly-sized portions and sent to the new addresses at random intervals, interleaved with other transactions (minus a fee of course). If multiple coin washers existed they could also send coins to each other with instructions to forward. If such nodes also ran their own private testnet of sorts (zero fee) and sent mountains of arbitrary transactions with the right format it could be quite difficult even for even the ISP to sort the real transactions from the fake (see: chaffing and winnowing).

I think the above should be sufficient to beat analysis-based attacks, using Tor or I2P beefs up protection against analysis a bit more and I trust that the security already bundled in the bitcoin client should cover the rest.

Have I missed anything?

never used it but think this is something like that http://bitcoinlaundry.com/

can listen to more about it here http://agoristradio.com/?p=407
Pages:
Jump to: