When A Small Leak Sinks A Great Ship: Deanonymizing Tor Hidden Service Users Through Bitcoin Transactions Analysis

01/23/2018
by   Husam Al Jawaheri, et al.
0

With the rapid increase of threats on the Internet, people are continuously seeking privacy and anonymity. Services such as Bitcoin and Tor were introduced to provide anonymity for online transactions and Web browsing. Due to its pseudonymity model, Bitcoin lacks retroactive operational security, which means historical pieces of information could be used to identify a certain user. We investigate the feasibility of deanonymizing users of Tor hidden services who rely on Bitcoin as a payment method by exploiting public information leaked from online social networks, the Blockchain, and onion websites. This, for example, allows an adversary to link a user with @alice Twitter address to a Tor hidden service with private.onion address by finding at least one past transaction in the Blockchain that involves their publicly declared Bitcoin addresses. To demonstrate the feasibility of this deanonymization attack, we carried out a real-world experiment simulating a passive, limited adversary. We crawled 1.5K hidden services and collected 88 unique Bitcoin addresses. We then crawled 5B tweets and 1M BitcoinTalk forum pages and collected 4.2K and 41K unique Bitcoin addresses, respectively. Each user address was associated with an online identity along with its public profile information. By analyzing the transactions in the Blockchain, we were able to link 125 unique users to 20 Tor hidden services, including sensitive ones, such as The Pirate Bay and Silk Road. We also analyzed two case studies in detail to demonstrate the implications of the resulting information leakage on user anonymity. In particular, we confirm that Bitcoin addresses should always be considered exploitable, as they can be used to deanonymize users retroactively. This is especially important for Tor hidden service users who actively seek and expect privacy and anonymity.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/28/2022

Investigating transactions in cryptocurrencies

This thesis presents techniques to investigate transactions in uncharted...
research
11/17/2022

Social Networks are Divulging Your Identity behind Crypto Addresses

Cryptocurrencies, such as Bitcoin and Ethereum, are becoming increasingl...
research
02/28/2020

Toward Active and Passive Confidentiality Attacks On Cryptocurrency Off-Chain Networks

Cryptocurrency off-chain networks such as Lightning (e.g., Bitcoin) or R...
research
11/18/2019

A First Look at References from the Dark to Surface Web World

Tor is one of the most well-known networks that protects the identity of...
research
07/09/2019

Characterizing Bitcoin donations to open source software on GitHub

Web-based hosting services for version control, such as GitHub, have mad...
research
09/17/2018

BlockTag: Design and applications of a tagging system for blockchain analysis

Annotating blockchains with auxiliary data is useful for many applicatio...
research
02/12/2018

A first look at the usability of bitcoin key management

Bitcoin users are directly or indirectly forced to deal with public key ...

Please sign up or login with your details

Forgot password? Click here to reset