Re: [Bitcoin-development] Deanonymisation of clients in Bitcoin P2P network paper

2015-01-22 Thread Mike Hearn
> > I hear that. But I don't see why mainstream wallets and wallets > designed for crypto research should not share a common core. > I think there was some misunderstanding. I was saying they *could and should* share common cores, so we are in agreement without realising it :) I also didn't mean t

Re: [Bitcoin-development] Deanonymisation of clients in Bitcoin P2P network paper

2015-01-21 Thread Isidor Zeuner
Hi there, some thoughts in-line: > > > > Finally, distributors of consumer wallets can use this research in > > order to distribute their wallet with policies which may be less prone > > to Tor-specific attacks. Or leave this out altogether if their > > audience has different expectations for conn

Re: [Bitcoin-development] Deanonymisation of clients in Bitcoin P2P network paper

2014-12-15 Thread Isidor Zeuner
[...] > > I'm confused by this, I run quite a few nodes exclusively on tor and > > chart their connectivity and have seen no such connection dropping > > behaviour. > > In my experience the problem has always been getting bootstrapped. > Most nodes hardly give any hidden service nodes in their geta

Re: [Bitcoin-development] Deanonymisation of clients in Bitcoin P2P network paper

2014-12-11 Thread Isidor Zeuner
[...] > And, on the flip side if the host is persistently behind tor, even > with some watermarkable behaviour, their privacy is protected. So > making sure that hosts can continually use tor (or similar systems) > should be the higher priority. (And, of course, not reimplementing > tor leverage

Re: [Bitcoin-development] Deanonymisation of clients in Bitcoin P2P network paper

2014-12-08 Thread Mike Hearn
> > Finally, distributors of consumer wallets can use this research in > order to distribute their wallet with policies which may be less prone > to Tor-specific attacks. Or leave this out altogether if their > audience has different expectations for connecting to Bitcoin. > Sure. I guess there wi

Re: [Bitcoin-development] Deanonymisation of clients in Bitcoin P2P network paper

2014-12-08 Thread Isidor Zeuner
> > > > [As an aside I agree that there are lots of things to improve here, > > but the fact that users can in theory be forced off of tor via DOS > > attacks is not immediately concerning to me because its a conscious > > choice users would make to abandon their privacy > > > Bitcoin already has a

Re: [Bitcoin-development] Deanonymisation of clients in Bitcoin P2P network paper

2014-12-01 Thread Isidor Zeuner
Hi Gregory, response below quote: > > Since this attack vector has been discussed, I started making some > > measurements on how effective it is to connect to Bitcoin using Tor, > > and I found that the number of connections dropping to near-zero is > > a situation which occurs rather frequently,

Re: [Bitcoin-development] Deanonymisation of clients in Bitcoin P2P network paper

2014-11-27 Thread Gregory Maxwell
On Fri, Nov 28, 2014 at 12:45 AM, Mistr Bigs wrote: > That's what I was trying to say... The researchers are deanonymizing > transactions from non-Tor connected hosts. So why are we talking about Tor > limitations in response to this? Shouldn't we be discussing how to address > the issues in Bitco

Re: [Bitcoin-development] Deanonymisation of clients in Bitcoin P2P network paper

2014-11-27 Thread Mistr Bigs
That's what I was trying to say... The researchers are deanonymizing transactions from non-Tor connected hosts. So why are we talking about Tor limitations in response to this? Shouldn't we be discussing how to address the issues in Bitcoin proper? M On 11/27/2014 9:30 PM, Gregory Maxwell wrote:

Re: [Bitcoin-development] Deanonymisation of clients in Bitcoin P2P network paper

2014-11-27 Thread Gregory Maxwell
On Thu, Nov 27, 2014 at 5:44 PM, Mistr Bigs wrote: > I might be mistaken, but it seems to me this paper discusses unintended ways > of obtaining the IP addresses of clients involved in transactions on the > core Bitcoin network. You're mistaken. :) If a node is used exclusively via tor it effect

Re: [Bitcoin-development] Deanonymisation of clients in Bitcoin P2P network paper

2014-11-27 Thread Mistr Bigs
I might be mistaken, but it seems to me this paper discusses unintended ways of obtaining the IP addresses of clients involved in transactions on the core Bitcoin network. Tor was mentioned only insofar as it might be one's first thought of how to mitigate this risk, yet Bitcoin over Tor has its ow

Re: [Bitcoin-development] Deanonymisation of clients in Bitcoin P2P network paper

2014-11-27 Thread Wladimir
On Thu, Nov 27, 2014 at 2:22 AM, Gregory Maxwell wrote: >> Since this attack vector has been discussed, I started making some >> measurements on how effective it is to connect to Bitcoin using Tor, >> and I found that the number of connections dropping to near-zero is >> a situation which occurs r

Re: [Bitcoin-development] Deanonymisation of clients in Bitcoin P2P network paper

2014-11-27 Thread Mike Hearn
> > [As an aside I agree that there are lots of things to improve here, > but the fact that users can in theory be forced off of tor via DOS > attacks is not immediately concerning to me because its a conscious > choice users would make to abandon their privacy Bitcoin already has a large populat

Re: [Bitcoin-development] Deanonymisation of clients in Bitcoin P2P network paper

2014-11-26 Thread Gregory Maxwell
> Since this attack vector has been discussed, I started making some > measurements on how effective it is to connect to Bitcoin using Tor, > and I found that the number of connections dropping to near-zero is > a situation which occurs rather frequently, which suggests that there > is still room t

Re: [Bitcoin-development] Deanonymisation of clients in Bitcoin P2P network paper

2014-11-26 Thread Isidor Zeuner
Hello there, quote: > Please see also the following: > > https://cpunks.org//pipermail/cypherpunks/2014-November/005971.html > I agree about the severity of the Tor/Bitcoin issue, but I see no point in bashing Bitcoin's financial privacy characteristics as the linked pages seem to do. Bitcoin ca

Re: [Bitcoin-development] Deanonymisation of clients in Bitcoin P2P network paper

2014-11-26 Thread odinn
-BEGIN PGP SIGNED MESSAGE- Hash: SHA512 Please see also the following: https://cpunks.org//pipermail/cypherpunks/2014-November/005971.html Respect, - -Odinn Jeff Garzik: > I don't recall being contacted directly, but the attack has been > discussed. It relies on a number of condition

Re: [Bitcoin-development] Deanonymisation of clients in Bitcoin P2P network paper

2014-11-26 Thread Jeff Garzik
I don't recall being contacted directly, but the attack has been discussed. It relies on a number of conditions. For example, if you are over Tor, they try to kick the machine off Tor, _assuming_ that it will fall back to non-Tor. That's only true for dual stack nodes, which are not really 100%

[Bitcoin-development] Deanonymisation of clients in Bitcoin P2P network paper

2014-11-25 Thread Jean-Paul Kogelman
This paper was just posted on reddit that describes how an attacker can de-anonymize clients on the bitcoin network. It mentions that the core devs were contacted prior to publication. I was just wondering, how many of these issues have already been addressed? Paper (University of Luxembourg):