X-Git-Url: http://pere.pagekite.me/gitweb/homepage.git/blobdiff_plain/7c3835c47e8f99ed8de332652241959d39087638..3882048f60f47ce7edb89cc3816978cff32551f9:/blog/data/2014-01-29-bitcoin.txt diff --git a/blog/data/2014-01-29-bitcoin.txt b/blog/data/2014-01-29-bitcoin.txt index 5264b0a996..38aa6fe604 100644 --- a/blog/data/2014-01-29-bitcoin.txt +++ b/blog/data/2014-01-29-bitcoin.txt @@ -1,18 +1,19 @@ Title: A fist full of non-anonymous Bitcoins -Tags: english, bitcoin +Tags: english, bitcoin, personvern, sikkerhet, usenix Date: 2014-01-29 14:10
Bitcoin is a incredible use of peer to peer communication and encryption, allowing direct and immediate money transfer without any central control. It is sometimes claimed to be ideal for illegal -activity, which I believe is quite a long way from the truth. At last +activity, which I believe is quite a long way from the truth. At least I would not conduct illegal money transfers using a system where the -details of every transaction is kept forever. This point is -investigated in an peer reviewed article in USENIX ;login: from -December 2013, in the article -A +details of every transaction are kept forever. This point is +investigated in +USENIX ;login: +from December 2013, in the article +"A Fistful of Bitcoins - Characterizing Payments Among Men with No -Names by Sarah Meiklejohn, Marjori Pomarole,Grant Jordan, Kirill +Names" by Sarah Meiklejohn, Marjori Pomarole,Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage. They analyse the transaction log in the Bitcoin system, using it to find addresses belong to individuals and organisations and follow the flow @@ -20,7 +21,7 @@ of money from both Bitcoin theft and trades on Silk Road to where the money end up. This is how they wrap up their article:
-To demonstrate the usefulness of this type of analysis, we turned +
"To demonstrate the usefulness of this type of analysis, we turned our attention to criminal activity. In the Bitcoin economy, criminal activity can appear in a number of forms, such as dealing drugs on Silk Road or simply stealing someone elseâs bitcoins. We followed the @@ -42,17 +43,17 @@ stolen bitcoins were deposited. Because such exchanges seem to serve as chokepoints into and out of the Bitcoin economy (i.e., there are few alternative ways to cash out), we conclude that using Bitcoin for money laundering or other illicit purposes does not (at least at -present) seem to be particularly attractive.
+present) seem to be particularly attractive."
These researches are not the first to analyse the Bitcoin -transaction log. The 2001 paper -An Analysis of Anonymity in -the Bitcoin System by Fergal Reid and Martin Harrigan is +transaction log. The 2011 paper +"An Analysis of Anonymity in +the Bitcoin System" by Fergal Reid and Martin Harrigan is summarized like this:
-Anonymity in Bitcoin, a peer-to-peer electronic currency system, is a +"Anonymity in Bitcoin, a peer-to-peer electronic currency system, is a complicated issue. Within the system, users are identified by public-keys only. An attacker wishing to de-anonymize its users will attempt to construct the one-to-many mapping between users and @@ -67,12 +68,14 @@ complementary views of the Bitcoin system and have implications for anonymity. We combine these structures with external information and techniques such as context discovery and flow analysis to investigate an alleged theft of Bitcoins, which, at the time of the theft, had a -market value of approximately half a million U.S. dollars. +market value of approximately half a million U.S. dollars."
I hope these references can help kill the urban myth that Bitcoin -are anonymous.
+is anonymous. It isn't really a good fit for illegal activites. Use +cash if you need to stay anonymous, at least until regular DNA +sampling of notes and coins become the norm. :) -As usual, if you use bitcoin and want to show your support of my +
As usual, if you use Bitcoin and want to show your support of my activities, please send Bitcoin donations to my address 15oWEoG9dUPovwmUL9KWAnYRtNJEkP1u1b.