作者
Husam Al Jawaheri, Mashael Al Sabah, Yazan Boshmaf, Aiman Erbad
发表日期
2020/2/1
期刊
Computers & Security
卷号
89
页码范围
101684
出版商
Elsevier Advanced Technology
简介
With the rapid increase of threats on the Internet, people are continuously seeking privacy and anonymity. Services such as Bitcoin and Tor were introduced to provide anonymity for online transactions and Web browsing. Due to its pseudonymity model, Bitcoin lacks retroactive operational security, which means historical pieces of information could be used to identify a certain user. By exploiting publicly available information, we show how relying on Bitcoin for payments on Tor hidden services could lead to deanonymization of these services’ users. Such linking is possible by finding at least one past transaction in the Blockchain that involves their publicly declared Bitcoin addresses.
To demonstrate the consequences of this deanonymization approach, we carried out a real-world experiment simulating a passive, limited adversary. We crawled 1.5K hidden services and collected 88 unique and active Bitcoin …
引用总数
201820192020202120222023202468131621265