Author

Topic: Re: How 'Anonymous' is Bitcoin? (Read 5072 times)

legendary
Activity: 1039
Merit: 1005
November 11, 2014, 05:31:40 AM
#43
I want to disscus about Bitcoin forum........ who know>? help me!  Cry

Ask your question in the newbie area. If you don't ask, you won't get answers.

Onkel Paul
newbie
Activity: 42
Merit: 0
November 11, 2014, 04:33:59 AM
#42
I want to disscus about Bitcoin forum........ who know>? help me!  Cry
full member
Activity: 154
Merit: 100
November 01, 2014, 03:01:56 AM
#41
There are various mixing services that does that for you for a lil fee after than no one can track your coins.
We have seen before if you don't use change address it's not anonymous one can track the destination and link it with xyz.
Regarding IPS"s using a third party ip changers will solve it or use TOR+VPN makes it real hard to track.
full member
Activity: 210
Merit: 100
November 01, 2014, 02:52:06 AM
#40
There were some papers and articles published about the deanonymization the bitcoin network and such, reading those may help you understanding how such techniques work. One of them e.g.

http://www.coindesk.com/eavesdropping-attack-can-unmask-60-bitcoin-clients/ (June 2014)
Informal description of the client deanonymization attack on the Bitcoin P2P network

"The researchers also found that the attack could be designed to prevent the use of the Tor network, which anonymises traffic. Additionally, the attack can 'glue' transactions, so that transactions performed on one machine using multiple bitcoin addresses can be grouped together."

(Also asking here, is this concept/theory correct?)
Something like this tells me that if all transactions (and hence addresses) in a wallet can be tied together, then if a single transaction reveals your identity (at any point in time), your wallet and subsequent transactions are compromised. Assuming someone is willing to invest the time and effort.


Yes, the concept/theory of a poisoned node is correct.  It is because, like Skype actually, every time you use a full wallet (like Armory) it broadcasts your IP address every time you boot up and/or send or receive (it's not clear to me which, but it's one or the other).  From this information a dedicated person can track your activities--if they have specialized software like the researchers from the paper below.  Or, as in the paper involving Tor, they can set up 'poisoned nodes' next to yours (possibly geographically located, so they are the first nodes to greet your PC when you boot up), and intercept your bitcoin communications that you think are heading to Tor, but in fact are going to the poisoned nodes.  But to do so, they need to have lots of such bad, poisoned nodes (the article mentions renting lots of servers), to trick the good nodes, which is something only either a big government agency or a very sophisticated criminal syndicate can afford to do, not your casual basement hacker.

TonyT

 
https://www.getbitcoin.com.au/bitcoin-news/investigation-white-paper-anonymous-bitcoin

Although numerous Bitcoin clients exist, none of them are specialized for data collection. Available clients often need to balance receiving and spending bitcoins, vetting and rejecting invalid transactions, maintaining a user's wallet, mining bitcoins, and, perhaps most detrimental to our study, disconnecting from "poorly-behaving" peers; these were precisely the peers we were interested in.  Because existing software had integrated functionality that interfered with our goals, we decided to build our own Bitcoin client called CoinSeer, which was a lean tool designed exclusively for data collection. For 5 months, between July 24, 2012 and January 2, 2013, CoinSeer created an outbound connection to every listening peer whose IP address was advertised on the Bitcoin network. We maintained that connection until either the remote peer hung up or timed out. In any given hour, we were connected to a median of 2,678 peers; for the duration of our collection period, we consistently maintained more connections than the only other Bitcoin superclient we know of - blockchain.info. This data collection effort required storing 60 GB of data per week
sr. member
Activity: 476
Merit: 251
October 31, 2014, 07:16:48 AM
#39
There were some papers and articles published about the deanonymization the bitcoin network and such, reading those may help you understanding how such techniques work. One of them e.g.

http://www.coindesk.com/eavesdropping-attack-can-unmask-60-bitcoin-clients/ (June 2014)
Informal description of the client deanonymization attack on the Bitcoin P2P network

"The researchers also found that the attack could be designed to prevent the use of the Tor network, which anonymises traffic. Additionally, the attack can 'glue' transactions, so that transactions performed on one machine using multiple bitcoin addresses can be grouped together."

(Also asking here, is this concept/theory correct?)
Something like this tells me that if all transactions (and hence addresses) in a wallet can be tied together, then if a single transaction reveals your identity (at any point in time), your wallet and subsequent transactions are compromised. Assuming someone is willing to invest the time and effort.
legendary
Activity: 1039
Merit: 1005
October 29, 2014, 03:50:11 AM
#38
There isn't any risk to send Bitcoins by tor, your Bitcoins aren't going to get stolen as it doesn't visit any website, just connecting to nodes and broadcast your transaction. The security risk here is minimal.

This is only true if you do it properly (i.e. run your wallet on the PC, and let it connect to the bitcoin p2p network through Tor).
Connecting to online wallets through Tor is risky, because there are malicious exit nodes performing man-in-the-middle attacks and stealing passwords.
I don't use online wallets or Tor, so I can't give advice on how to do this securely.

Onkel Paul
legendary
Activity: 3038
Merit: 4418
Crypto Swap Exchange
October 29, 2014, 02:44:11 AM
#37


I don't trust mixers, I don't trust VPNs. Do I remain anonymous? Will my IP be traced when sending/receiving BTC?

What happens if I use Armory without TOR?

mixers don't keep records, but if you don't trust them, your bitcoin can be traced to you more easily, even if you hide your IP.  Your IP address is not going to be logged unless the government or police are after you.  Then they will ask your ISP to track you, or they will install their own backdoor sniffer program without asking.  So you must trust somebody or you will be traced.  How do you intend to buy BTC?  The same trust exists, unless you buy it in person from a stranger in your town.

Using Armor without TOR is safer I have heard, than using it with TOR, since TOR has lots of spyware sites in it (the dark network) that will steal your BTC.  

But I'm a newbie, so ask around.  
Mixer can keep records, you don't know if they are saying the truth. Your Bitcoins can easily be tracked if you don't use a mixer and a new address for every transaction. Unless you are a criminal, no one is going to waste their time inspecting blockchain for your transactions. To try to gain maximum anonymity, try using time delay feature on bitmixer.

There isn't any risk to send Bitcoins by tor, your Bitcoins aren't going to get stolen as it doesn't visit any website, just connecting to nodes and broadcast your transaction. The security risk here is minimal.
hero member
Activity: 924
Merit: 1000
October 28, 2014, 07:04:22 PM
#36
Not nearly as people think it is. While it does have some anonymity built in, its by far from being anonymous.
legendary
Activity: 938
Merit: 1000
BTC | LTC | XLM | VEN | ARDR
October 27, 2014, 06:39:36 AM
#35


Are paid VPN services useful?
I recently tried out paid version of CyberGhost VPN (http://www.cyberghostvpn.com/en) where you can fake your IP to your choice of country.

Does this provide anonymity, given that we use new BTC address for every transaction?

You can also use Security Kiss: http://www.securitykiss.com/

Private InternetAcces does the trick for me, easy, encrypted and no logs.
hero member
Activity: 658
Merit: 500
October 26, 2014, 04:34:56 PM
#34


Are paid VPN services useful?
I recently tried out paid version of CyberGhost VPN (http://www.cyberghostvpn.com/en) where you can fake your IP to your choice of country.

Does this provide anonymity, given that we use new BTC address for every transaction?

You can also use Security Kiss: http://www.securitykiss.com/
full member
Activity: 210
Merit: 100
October 22, 2014, 09:28:44 AM
#33


I don't trust mixers, I don't trust VPNs. Do I remain anonymous? Will my IP be traced when sending/receiving BTC?

What happens if I use Armory without TOR?

mixers don't keep records, but if you don't trust them, your bitcoin can be traced to you more easily, even if you hide your IP.  Your IP address is not going to be logged unless the government or police are after you.  Then they will ask your ISP to track you, or they will install their own backdoor sniffer program without asking.  So you must trust somebody or you will be traced.  How do you intend to buy BTC?  The same trust exists, unless you buy it in person from a stranger in your town.

Using Armor without TOR is safer I have heard, than using it with TOR, since TOR has lots of spyware sites in it (the dark network) that will steal your BTC.  

But I'm a newbie, so ask around.  
hero member
Activity: 980
Merit: 507
October 22, 2014, 08:27:09 AM
#32

And what happens if I use Armory withouth TOR? Do I remain anonymous? Will my IP be traced when sending/receiving BTC?

Maybe it's not really necessary to use TOR with Armory after all...

I just want to prevent someone to know my IP when sending/receiving BTC, that's all


If you worry about IP addresses being tracked (which are not permanent, unlike BTC addresses), just follow this protocol:  wash your BTC twice, using two different mixers, sending the output of one into the input of the second, and the output of the second back to your Armory wallet.  Next, go to the VPN that accepts bitcoins, they advertise on this forum but they're easy enough to find (or find an equivalent service on the net) and buy a year (or month, etc) of VPN service.  Pay them in BTC with a fake name and some email address.  Click the checkbox in Armory settings so it works with the VPN (see the Armory Help files, it's easy to find).  Now you can use Armory without Tor, and not only are you secure but also your IP address is hidden by the VPN.  And the chances of the VPN ripping off your BTC in a 'man in the middle' attack is very small (they are a reputable company, I've looked them up).

I don't trust mixers, I don't trust VPNs. Do I remain anonymous? Will my IP be traced when sending/receiving BTC?

What happens if I use Armory without TOR?
full member
Activity: 210
Merit: 100
October 22, 2014, 08:12:47 AM
#31

And what happens if I use Armory withouth TOR? Do I remain anonymous? Will my IP be traced when sending/receiving BTC?

Maybe it's not really necessary to use TOR with Armory after all...

I just want to prevent someone to know my IP when sending/receiving BTC, that's all


If you worry about IP addresses being tracked (which are not permanent, unlike BTC addresses), just follow this protocol:  wash your BTC twice, using two different mixers, sending the output of one into the input of the second, and the output of the second back to your Armory wallet.  Next, go to the VPN that accepts bitcoins, they advertise on this forum but they're easy enough to find (or find an equivalent service on the net) and buy a year (or month, etc) of VPN service.  Pay them in BTC with a fake name and some email address.  Click the checkbox in Armory settings so it works with the VPN (see the Armory Help files, it's easy to find).  Now you can use Armory without Tor, and not only are you secure but also your IP address is hidden by the VPN.  And the chances of the VPN ripping off your BTC in a 'man in the middle' attack is very small (they are a reputable company, I've looked them up).
hero member
Activity: 980
Merit: 507
October 22, 2014, 07:27:45 AM
#30


Is it secure enough? I lost 1 BTC using blockchain + TOR (a few days ago) and 1 BTC using coinbase + TOR ( a few months ago)

I used them as hot wallets, while the rest of the BTC were, and still are in a cold wallet with Armory.

What was your client for the hot wallet that you lost money in?  What brand? How did you lose the money?  Keyboard logger?

Blockchain and coinbase. On blockchain I had Google second factor authentication and a second password when sending money and in Coinbase I just had a password, and after a "conextion untrusted" screen, the funds were gone.

I've read that's because when using clearnet sites with TOR the exit node may be "infected" and the hacker can obtain your details, that's why I no longer trust online wallets with TOR and I've decided to use Armory for a hot wallet as well. But I want to use it with TOR, and I'm a Little paranoid to be honest. I also have a cold wallet in Armory and if they hack that wallet... that would de a disaster.

EDIT:

And what happens if I use Armory withouth TOR? Do I remain anonymous? Will my IP be traced when sending/receiving BTC?

Maybe it's not really necessary to use TOR with Armory after all...

I just want to prevent someone to know my IP when sending/receiving BTC, that's all
full member
Activity: 210
Merit: 100
October 21, 2014, 09:18:21 PM
#29


Is it secure enough? I lost 1 BTC using blockchain + TOR (a few days ago) and 1 BTC using coinbase + TOR ( a few months ago)

I used them as hot wallets, while the rest of the BTC were, and still are in a cold wallet with Armory.

What was your client for the hot wallet that you lost money in?  What brand? How did you lose the money?  Keyboard logger?
hero member
Activity: 980
Merit: 507
October 21, 2014, 08:16:20 PM
#28
Hello everyone,

I need your help here.

I'm currently using Armory (1 cold wallet and 1 hot wallet for small amounts) Both wallets with multiple addresses.

I want to use Armory with TOR because I don't want to show my real IP. I've read all the discussion about the IP not being shown in the blockchain but I want to be as safest as possible.

I have to configure Bitcoin QT and then change some parameter at bitcoin.conf if I'm not wrong.

My question is...

Is it secure enough? I lost 1 BTC using blockchain + TOR (a few days ago) and 1 BTC using coinbase + TOR ( a few months ago)

I used them as hot wallets, while the rest of the BTC were, and still are in a cold wallet with Armory.

So basically, I'm chanching now to Armory + TOR for a hot wallet since I no longer trust online wallets + TOR

What are your thoughts?

Is it a good idea?

Any tips?

Maybe it's better to don't use Armory + TOR for a hot wallet?

And what about Armory + TOR for a cold wallet? I've been running Armory without TOR all this time.

I'm quite paranoid and lost here, any help would be much appreciated!!

Best regards!!
full member
Activity: 144
Merit: 100
ActionCrypto.com- Bitcoin Binary Options
October 15, 2014, 01:07:17 AM
#27

Not sure if I understood your original post, but using new addresses does not automatically make you safe and anonymous. If you have 10 btc and get it from coinbase, they probably have records. Even if you send it to a few different addresses, and have those addresses send it off to more addresses, it's still relatively easy to write a script to group them together when you spend any one of them. If you're paranoid about that, better find a coin mixer, mix your coins after acquiring them, and then transfer them to a multitude of HD wallets.

Yes, when I wrote my original post I did not know that.  Can you recommend a coin mixer?  If so please let me know.  I will probably pick the 'most popular one' and take my chances with the minimum number of coins they let you wash at any one time.

You say: "If you're paranoid about that, better find a coin mixer, mix your coins after acquiring them, and then transfer them to a multitude of HD wallets".  Why transfer the mixed coins to a multitude of HD wallets?  Hard drive wallets?  Is this for security (as in Armory "offline" wallets that live on your hard drive but are not connected to the internet)?  Or in case one wallet is stolen or compromised, you won't lose all your money?  This goes to security, not anonymity, right?

TonyT

Even a Coin mixer wouldn't really guarantee anonymity. Incase you get into a legal issue, then the coin mixer will have to give up details on thee address from which funds are generated and to which they land into.
In theory this is correct, but in practice it is not. The court/government would first need to find the mixing service (both bitmixer and bitcoin fog essentially have anon owners, so finding them would be very difficult). Your statement also assumes that a mixer will keep logs, which is something that most mixers claim not to do, and if it is trust that mixers are not keeping logs then there is no information to give
full member
Activity: 182
Merit: 100
October 15, 2014, 01:01:04 AM
#26

Not sure if I understood your original post, but using new addresses does not automatically make you safe and anonymous. If you have 10 btc and get it from coinbase, they probably have records. Even if you send it to a few different addresses, and have those addresses send it off to more addresses, it's still relatively easy to write a script to group them together when you spend any one of them. If you're paranoid about that, better find a coin mixer, mix your coins after acquiring them, and then transfer them to a multitude of HD wallets.

Yes, when I wrote my original post I did not know that.  Can you recommend a coin mixer?  If so please let me know.  I will probably pick the 'most popular one' and take my chances with the minimum number of coins they let you wash at any one time.

You say: "If you're paranoid about that, better find a coin mixer, mix your coins after acquiring them, and then transfer them to a multitude of HD wallets".  Why transfer the mixed coins to a multitude of HD wallets?  Hard drive wallets?  Is this for security (as in Armory "offline" wallets that live on your hard drive but are not connected to the internet)?  Or in case one wallet is stolen or compromised, you won't lose all your money?  This goes to security, not anonymity, right?

TonyT

Even a Coin mixer wouldn't really guarantee anonymity. Incase you get into a legal issue, then the coin mixer will have to give up details on thee address from which funds are generated and to which they land into.
full member
Activity: 210
Merit: 100
October 14, 2014, 08:00:38 PM
#25

Not sure if I understood your original post, but using new addresses does not automatically make you safe and anonymous. If you have 10 btc and get it from coinbase, they probably have records. Even if you send it to a few different addresses, and have those addresses send it off to more addresses, it's still relatively easy to write a script to group them together when you spend any one of them. If you're paranoid about that, better find a coin mixer, mix your coins after acquiring them, and then transfer them to a multitude of HD wallets.

Yes, when I wrote my original post I did not know that.  Can you recommend a coin mixer?  If so please let me know.  I will probably pick the 'most popular one' and take my chances with the minimum number of coins they let you wash at any one time.

You say: "If you're paranoid about that, better find a coin mixer, mix your coins after acquiring them, and then transfer them to a multitude of HD wallets".  Why transfer the mixed coins to a multitude of HD wallets?  Hard drive wallets?  Is this for security (as in Armory "offline" wallets that live on your hard drive but are not connected to the internet)?  Or in case one wallet is stolen or compromised, you won't lose all your money?  This goes to security, not anonymity, right?

TonyT
full member
Activity: 210
Merit: 100
October 14, 2014, 07:56:00 PM
#24
[...]

  But I think they already are doing a 'several peers' download, since, as I type this, I notice the blockchain is being downloaded from "7 peers" it says.

TonyT

That's the peers you are connected to. Only one of them will be the "sync-node" which is the one you actually get the data from. If you start a new system from scratch and that sync-node happens to be a slow one you can wait for a very long time. Unless you delete peers.dat and connect only to a single "known" quick node until you have the blockchain data. Once that's done you can connect in the regular way again.

You can see which one is the sync node in Bitcoin Core (formerly Bitcoin Qt) too: Go to the debug window and in the console type: getpeerinfo .



If you are using Armory, I highly recommend to donate Smiley

Thanks for that information.  It was 36 hours on a 1.5 Mbps connection before the blockchain (about 35 GB large it seems) was downloaded, and now, it is "Synchronizing with Network" and will take another couple of hours to do that.

BTW I am probably going to take my chances washing my bitcoins once I buy them, using Tor to anonymize the internet address, as recommended earlier.  You have to fiddle with the Armory settings to allow it to work with Tor according to the manual.

TonyT
newbie
Activity: 25
Merit: 0
October 14, 2014, 04:36:18 PM
#23
Thanks to OnkelPaul for the replies.

Here is a good article that's not too technical that explains how not reusing bitcoin addresses would make bitcoin virtually anonymous.  But when businesses reuse addresses, they become easy to spot. see:

http://www.bitcoinnotbombs.com/innovations-that-enhance-bitcoin-anonymity/

I guess a simple example of this might be:  if anonymous buyers, "A", "B", "C" buy something from a seller "S" who does not change their bitcoin address, and the seller S then uses the money from A,B,C to buy from a supplier SS, who also don't change their bitcoin address, and S and SS constantly deal with each other you might get a diagram like: A, B, C <--> (single link from each buyer to S) to S, which then has multiple links to SS and back to S in the blockchain (and SS never deals with anybody but S).  You can conclude that A, B, C are random retail customers of S, S is the middleman, and SS is the sub-contractor or supplier to S.  At least that's the way I think of it.

Another example might be if a unique Bitcoin amount that is very distinctive like the sum of 789.12345678987654321 bitcoins is passed around, but each time it is passed between parties then 10 bitcoins are subtracted from the sum, and everybody except S and SS in the above example uses new bitcoin addresses, and say S and SS are known drug dealers, and reuse their bitcoin addresses, and the 'word on the street' is that a large cache of meth is circulating, being passed from party to party, then it follows that everybody who processed the bitcoin sum of 789.12345678987654321 (minus 10 every transaction) is a drug dealer who is trafficking this meth, and taking 10 bitcoins for their trouble (sorry it's kind of stupid but it's the best example I could think of at the moment).  

TonyT

Not sure if I understood your original post, but using new addresses does not automatically make you safe and anonymous. If you have 10 btc and get it from coinbase, they probably have records. Even if you send it to a few different addresses, and have those addresses send it off to more addresses, it's still relatively easy to write a script to group them together when you spend any one of them. If you're paranoid about that, better find a coin mixer, mix your coins after acquiring them, and then transfer them to a multitude of HD wallets.
legendary
Activity: 1358
Merit: 1001
https://gliph.me/hUF
October 14, 2014, 12:04:53 PM
#22
[...]

  But I think they already are doing a 'several peers' download, since, as I type this, I notice the blockchain is being downloaded from "7 peers" it says.

TonyT

That's the peers you are connected to. Only one of them will be the "sync-node" which is the one you actually get the data from. If you start a new system from scratch and that sync-node happens to be a slow one you can wait for a very long time. Unless you delete peers.dat and connect only to a single "known" quick node until you have the blockchain data. Once that's done you can connect in the regular way again.

You can see which one is the sync node in Bitcoin Core (formerly Bitcoin Qt) too: Go to the debug window and in the console type: getpeerinfo .



If you are using Armory, I highly recommend to donate Smiley
full member
Activity: 210
Merit: 100
October 14, 2014, 11:37:45 AM
#21

Armory is also working on an overhaul of their backend, so that will help speed things up further. Bitcoin Core devs are working to get bitcoind to download the blockchain from several peers (unlike just one, like it is now), so that will help speed up things too.

Thanks. I might send a donation to the Armory people, one of which posts here, as they seem good guys.  But I think they already are doing a 'several peers' download, since, as I type this, I notice the blockchain is being downloaded from "7 peers" it says.

TonyT
legendary
Activity: 1358
Merit: 1001
https://gliph.me/hUF
October 14, 2014, 11:22:13 AM
#20
[...] It might take a few hours or days of computing power, depending on how many keys/transactions you've done, but it can be done.  At least that's what I understood, reading between the lines for the last few hours.  Please correct me if I'm wrong.

TonyT

The few hours / days are mainly needed to get the underlying bitcoind to sync with the network and verify the addresses, once done Armory will build a database. But, say, if you restore your wallet on an online Armory system that has the blockchain and database already up to date, it probably takes not nearly as long (depending on amount of addresses and transactions those addresses were involved).

Armory is also working on an overhaul of their backend, so that will help speed things up further. Bitcoin Core devs are working to get bitcoind to download the blockchain from several peers (unlike just one, like it is now), so that will help speed up things too.
full member
Activity: 210
Merit: 100
October 14, 2014, 10:40:33 AM
#19
[...]
** UPDATE:  I see that Armory, a decent bitcoin wallet, will only generate 100 unique addresses before you need a new copy, see here: http://bitcoin.stackexchange.com/questions/9828/do-i-need-to-backup-a-wallet-every-time-i-generate-a-new-address   ("Please note that by default, Armory only generates 100 addresses. This means that when you use more than 100 and you lose your wallet, after you restore the back-up, the client will at first only see the first 100 addresses. You will have to specifically tell Armory to look for more addresses."
[...]

There is a misunderstanding. Armory will generate as many addresses as you please. You will not even know when you have more than 100. Regarding this comment:
Quote
This means that when you use more than 100 and you lose your wallet, after you restore the back-up, the client will at first only see the first 100 addresses.

This is of concern only if you restore from a backup. The restored wallet will show 100 restored addresses, if you had more and want to see them you can do so from withing the client. However that has nothing to do with how many addresses Armory can generate.

Yes, you are correct.  Apparently the comment I quoted was from an earlier version of Armory I just found out some minutes ago.  Just to show my ignorance, or lack thereof, I think the way Armory currently works is as follows ('deterministic wallet'):  you can generate an infinite number of bitcoin addresses with Armory.  Should you lose your private keys, if you know your Armory "root" key, which you can print out on a piece of paper when you first install Armory, you can then reconstruct all your private keys, now and forever more (infinitely many), and, then using the 50 GB+ blockchain, figure out how much bitcoin is associated with each private key (if non-zero), and then reconstruct your balance in your wallet.  It might take a few hours or days of computing power, depending on how many keys/transactions you've done, but it can be done.  At least that's what I understood, reading between the lines for the last few hours.  Please correct me if I'm wrong.

TonyT
legendary
Activity: 1358
Merit: 1001
https://gliph.me/hUF
October 14, 2014, 10:09:36 AM
#18
[...]
** UPDATE:  I see that Armory, a decent bitcoin wallet, will only generate 100 unique addresses before you need a new copy, see here: http://bitcoin.stackexchange.com/questions/9828/do-i-need-to-backup-a-wallet-every-time-i-generate-a-new-address   ("Please note that by default, Armory only generates 100 addresses. This means that when you use more than 100 and you lose your wallet, after you restore the back-up, the client will at first only see the first 100 addresses. You will have to specifically tell Armory to look for more addresses."
[...]

There is a misunderstanding. Armory will generate as many addresses as you please. You will not even know when you have more than 100. Regarding this comment:
Quote
This means that when you use more than 100 and you lose your wallet, after you restore the back-up, the client will at first only see the first 100 addresses.

This is of concern only if you restore from a backup. The restored wallet will show 100 restored addresses, if you had more and want to see them you can do so from withing the client. However that has nothing to do with how many addresses Armory can generate.
full member
Activity: 210
Merit: 100
October 14, 2014, 09:26:40 AM
#17
Thanks to OnkelPaul for the replies.

Here is a good article that's not too technical that explains how not reusing bitcoin addresses would make bitcoin virtually anonymous.  But when businesses reuse addresses, they become easy to spot. see:

http://www.bitcoinnotbombs.com/innovations-that-enhance-bitcoin-anonymity/

I guess a simple example of this might be:  if anonymous buyers, "A", "B", "C" buy something from a seller "S" who does not change their bitcoin address, and the seller S then uses the money from A,B,C to buy from a supplier SS, who also don't change their bitcoin address, and S and SS constantly deal with each other you might get a diagram like: A, B, C <--> (single link from each buyer to S) to S, which then has multiple links to SS and back to S in the blockchain (and SS never deals with anybody but S).  You can conclude that A, B, C are random retail customers of S, S is the middleman, and SS is the sub-contractor or supplier to S.  At least that's the way I think of it.

Another example might be if a unique Bitcoin amount that is very distinctive like the sum of 789.12345678987654321 bitcoins is passed around, but each time it is passed between parties then 10 bitcoins are subtracted from the sum, and everybody except S and SS in the above example uses new bitcoin addresses, and say S and SS are known drug dealers, and reuse their bitcoin addresses, and the 'word on the street' is that a large cache of meth is circulating, being passed from party to party, then it follows that everybody who processed the bitcoin sum of 789.12345678987654321 (minus 10 every transaction) is a drug dealer who is trafficking this meth, and taking 10 bitcoins for their trouble (sorry it's kind of stupid but it's the best example I could think of at the moment).  

TonyT
legendary
Activity: 1039
Merit: 1005
October 14, 2014, 08:37:41 AM
#16
And those nodes can only be revieling atm of the transaction, after that it's gone?!

Of course those nodes can keep a log of where they got a transaction from. If they show the information from this log, it's available to everybody. However, as they can only know the IP address from which they received a transaction, a node that wants to stay out of the spotlight could just send the transaction through another node that's not recording IP addresses, and then this node sends the transaction to other nodes who can't see from where it originally came.

Onkel Paul
legendary
Activity: 938
Merit: 1000
BTC | LTC | XLM | VEN | ARDR
October 14, 2014, 08:31:47 AM
#15
NO ip address in the blockchain, my life is a lie!! Grin. But seriously, it is in the blockchain right?

If you are asking if an IP address is stored in the blockchain, the answer is no. Nodes will just see a transaction was relayed by X which may be your IP address or not.



And those nodes can only be revieling atm of the transaction, after that it's gone?!
legendary
Activity: 1039
Merit: 1005
October 14, 2014, 08:25:05 AM
#14
But seriously, it is in the blockchain right?

No, why should it be?
See http://bitcoin.stackexchange.com/questions/193/how-do-i-see-the-ip-address-of-a-bitcoin-transaction
All you need in the blockchain is transactions and the proof of work as shown by the block hash. IP addresses are meaningless in this context.

Onkel Paul
legendary
Activity: 4228
Merit: 1313
October 14, 2014, 08:24:53 AM
#13
NO ip address in the blockchain, my life is a lie!! Grin. But seriously, it is in the blockchain right?

If you are asking if an IP address is stored in the blockchain, the answer is no. Nodes will just see a transaction was relayed by X which may be your IP address or not.

legendary
Activity: 938
Merit: 1000
BTC | LTC | XLM | VEN | ARDR
October 14, 2014, 08:03:19 AM
#12
NO ip address in the blockchain, my life is a lie!! Grin. But seriously, it is in the blockchain right?
legendary
Activity: 1039
Merit: 1005
October 14, 2014, 08:01:33 AM
#11
OK time for a concrete example on bitcoin security or lack thereof.

Examine this URL: https://www.biteasy.com/blockchain/addresses/1P62VZZ9kL97dzzcWhG7JZDssaW2MDgn82

Note the person(s) using this bitcoin address are not using a different bitcoin address for every transaction, but instead are receiving and sending a lot from this address (it seems to me, unless I am misreading the data).

I didn't look at the blockchain data but there are lots of addresses of this kind. Most belong to companies, and the association between company and address is known to quite a number of users/customers/etc. so why bother with hiding it?

1) Why don't people use a unique bitcoin address every time they receive money?  is it convenience, or maybe they advertise the bitcoin address and cannot change it easily (such as: 'please donate to my charity at this bitcoin address: 1P62...etc"?)

The charity example is actually a pretty good one. In such a case, the incoming funds address can be well-known, and for better transparency regarding management of their funds, charities might actually prefer to have all incoming donations on one address.

2) Where is the IP address associated with the address above?  Where is it buried in the blockchain?  I cannot find it.

TonyT

IP addresses are not in the blockchain. The only place where IP addresses and transactions can be connected is when a node receives a transaction from another node. Depending on the connectedness of the originating client, the transaction might originally come from that IP. For example, big mining pools often send their payments through few IP addresses to many well-connected nodes such as blockchain.info. Such a node can make an educated guess about the origin of the transaction. It is relatively easy to avoid by using a proxy and keeping only a few outgoing connections to small nodes which are unlikely to do IP/transaction analysis.

Onkel Paul
full member
Activity: 210
Merit: 100
October 14, 2014, 07:49:08 AM
#10
OK time for a concrete example on bitcoin security or lack thereof.

Examine this URL: https://www.biteasy.com/blockchain/addresses/1P62VZZ9kL97dzzcWhG7JZDssaW2MDgn82

Note the person(s) using this bitcoin address are not using a different bitcoin address for every transaction, but instead are receiving and sending a lot from this address (it seems to me, unless I am misreading the data).

1) Why don't people use a unique bitcoin address every time they receive money?  is it convenience, or maybe they advertise the bitcoin address and cannot change it easily (such as: 'please donate to my charity at this bitcoin address: 1P62...etc"?) ** UPDATE:  I see that Armory, a decent bitcoin wallet, will only generate 100 unique addresses before you need a new copy, see here: http://bitcoin.stackexchange.com/questions/9828/do-i-need-to-backup-a-wallet-every-time-i-generate-a-new-address   ("Please note that by default, Armory only generates 100 addresses. This means that when you use more than 100 and you lose your wallet, after you restore the back-up, the client will at first only see the first 100 addresses. You will have to specifically tell Armory to look for more addresses." so I supposed people don't want to go through extra effort in creating addresses is one reason, but apparently Armory can generate, if you let it, an infinite number of addresses, see: https://en.bitcoin.it/wiki/Deterministic_Wallet   So I supposed laziness / indifference is the main reason people use the same address over and over again?  ***

2) Where is the IP address associated with the address above?  Where is it buried in the blockchain?  I cannot find it.

TonyT
legendary
Activity: 4228
Merit: 1313
October 14, 2014, 07:15:20 AM
#9
IP logging can be an issue with bitcoins. Here is more info on the anonymity part of bitcoin: https://bitcoin.org/en/protect-your-privacy
use Tor or i2p with bitcoin.

Are paid VPN services useful?
I recently tried out paid version of CyberGhost VPN (http://www.cyberghostvpn.com/en) where you can fake your IP to your choice of country.

Does this provide anonymity, given that we use new BTC address for every transaction?

Paid VPN can be useful as a part of a strategy. Alone, no.  It also depends on what attack vectors you are trying to protect against, how you are paying for the VPN etc.
sr. member
Activity: 294
Merit: 250
October 14, 2014, 06:34:21 AM
#8
You can use electrum wallet and connect to a SOCKS5 anonymous server to make transactions when you run electrum from the Linux terminal. I believe that Tor is used by the server so your transactions remain anonymous in that your IP isn't revealed.

Someone correct me on this if I'm wrong.

legendary
Activity: 1400
Merit: 1000
October 14, 2014, 06:30:12 AM
#7
How do we use tor for bitcoin wallet, considering its just a browser?
Tor is not a browser.
+1

How do we use tor for bitcoin wallet, considering its just a browser?
1. Run Tor
2. Bitcoin Core -> Settings -> Options -> Net -> Connect through SOCKS proxy -> IP = 127.0.0.1 ,    Port = 9150 if using TOR BROWSER BUNDLE
                or Port = 9050 if using TOR
3. Restart Bitcoin Core.
That's all  Wink
legendary
Activity: 4542
Merit: 3393
Vile Vixen and Miss Bitcointalk 2021-2023
October 14, 2014, 06:24:13 AM
#6
How do we use tor for bitcoin wallet, considering its just a browser?
Tor is not a browser.
full member
Activity: 182
Merit: 100
October 14, 2014, 06:05:22 AM
#5
IP logging can be an issue with bitcoins. Here is more info on the anonymity part of bitcoin: https://bitcoin.org/en/protect-your-privacy
use Tor or i2p with bitcoin.

How do we use tor for bitcoin wallet, considering its just a browser?
sgk
legendary
Activity: 1470
Merit: 1002
!! HODL !!
October 14, 2014, 05:05:23 AM
#4
IP logging can be an issue with bitcoins. Here is more info on the anonymity part of bitcoin: https://bitcoin.org/en/protect-your-privacy
use Tor or i2p with bitcoin.

Are paid VPN services useful?
I recently tried out paid version of CyberGhost VPN (http://www.cyberghostvpn.com/en) where you can fake your IP to your choice of country.

Does this provide anonymity, given that we use new BTC address for every transaction?
legendary
Activity: 1400
Merit: 1000
October 14, 2014, 04:55:32 AM
#3
IP logging can be an issue with bitcoins. Here is more info on the anonymity part of bitcoin: https://bitcoin.org/en/protect-your-privacy
use Tor or i2p with bitcoin.
full member
Activity: 182
Merit: 100
October 14, 2014, 04:20:02 AM
#2
IP logging can be an issue with bitcoins. Here is more info on the anonymity part of bitcoin: https://bitcoin.org/en/protect-your-privacy
full member
Activity: 210
Merit: 100
October 14, 2014, 02:40:36 AM
#1
There are a number of ways you lose your privacy with bitcoin.

You need to connect to other nodes for blocks, so your IP is revealed.

Spv wallets - the nodes these connect to have the IP, and a huge list of addresses all owned by that person.

All transaction history is public, unchangeable, so retrospective analysis is possible. If you were up to no good on the silkroad, imagine the FBI set up a node to service SPV clients? And they logged the IP of owners of addresses linked to the silk road? Are you sure you removed that key from your wallet? :-p

Into transactions now.. Services that use multisig are bad for privacy if you don't tumble coins. If you pay into a multisig address s, coins can't be mixed up (not talking about bitfog here, just the wallet preferentially spending older coins to keep fees low - this means seller might get diff coins to the one you lodged). So, if I have a list of multisig addresses a marketplace used, I can learn the address of the buyer and seller.

If someone redeems the funds from the multisig, everyone learns the public keys of the people involved. Imagine you keep that key in your wallet, expecting to never use it again... But your node gives away that you own it by bloom filters mentioned above?

There is a full stack of software to understand.. Plus, have you read all the research papers on the topic? Martin and Harrigans was in 2011, so you've plenty to read from between now and then.

You seem knowledgeable.  So please answer this:  if I change the Bitcoin address every time I send money to somebody using my heavy Armory client, isn't that 100% anonymous?  Or is ISP/internet address recorded in the XYZ Gibabit 'blockchain' in every transaction, regardless of whether or not you change the Bitcoin address?  Assume also I've received money at my Armory client, using a Bitcoin address, but assume that every time I receive money, I always change the Bitcoin address.

TonyT
Jump to: