Tutela: An Open-Source Tool for Assessing User-Privacy on Ethereum and Tornado Cash

by   Mike Wu, et al.
Stanford University

A common misconception among blockchain users is that pseudonymity guarantees privacy. The reality is almost the opposite. Every transaction one makes is recorded on a public ledger and reveals information about one's identity. Mixers, such as Tornado Cash, were developed to preserve privacy through "mixing" transactions with those of others in an anonymity pool, making it harder to link deposits and withdrawals from the pool. Unfortunately, it is still possible to reveal information about those in the anonymity pool if users are not careful. We introduce Tutela, an application built on expert heuristics to report the true anonymity of an Ethereum address. In particular, Tutela has three functionalities: first, it clusters together Ethereum addresses based on interaction history such that for an Ethereum address, we can identify other addresses likely owned by the same entity; second, it shows Ethereum users their potentially compromised transactions; third, Tutela computes the true size of the anonymity pool of each Tornado Cash mixer by excluding potentially compromised transactions. A public implementation of Tutela can be found at https://github.com/TutelaLabs/tutela-app. To use Tutela, visit https://www.tutela.xyz.


page 3

page 4

page 8

page 9


Blockchain is Watching You: Profiling and Deanonymizing Ethereum Users

Ethereum is the largest public blockchain by usage. It applies an accoun...

BERT4ETH: A Pre-trained Transformer for Ethereum Fraud Detection

As various forms of fraud proliferate on Ethereum, it is imperative to s...

What's in Your Wallet? Privacy and Security Issues in Web 3.0

Much of the recent excitement around decentralized finance (DeFi) comes ...

Social Networks are Divulging Your Identity behind Crypto Addresses

Cryptocurrencies, such as Bitcoin and Ethereum, are becoming increasingl...

Anonymity Analysis of the Umbra Stealth Address Scheme on Ethereum

Stealth addresses are a privacy-enhancing technology that provides recip...

An Empirical Analysis of Anonymity in Zcash

Among the now numerous alternative cryptocurrencies derived from Bitcoin...

Incentives Against Power Grabs or How to Engineer the Revolution in a Pooled Proof of Stake System

Proof-of-Stake (PoS) blockchain systems, especially those that allow sta...

Please sign up or login with your details

Forgot password? Click here to reset