Tutela: An Open-Source Tool for Assessing User-Privacy on Ethereum and
Tornado Cash
- URL: http://arxiv.org/abs/2201.06811v1
- Date: Tue, 18 Jan 2022 08:31:12 GMT
- Title: Tutela: An Open-Source Tool for Assessing User-Privacy on Ethereum and
Tornado Cash
- Authors: Mike Wu, Will McTighe, Kaili Wang, Istvan A. Seres, Nick Bax, Manuel
Puebla, Mariano Mendez, Federico Carrone, Tom\'as De Mattey, Herman O.
Demaestri, Mariano Nicolini, Pedro Fontana
- Abstract summary: Tutela is an application built on expert's to report the true anonymity of an address.
It computes the true size of the anonymity pool of each Tornado Cash mixer.
- Score: 6.862106529464183
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: A common misconception among blockchain users is that pseudonymity guarantees
privacy. The reality is almost the opposite. Every transaction one makes is
recorded on a public ledger and reveals information about one's identity.
Mixers, such as Tornado Cash, were developed to preserve privacy through
"mixing" transactions with those of others in an anonymity pool, making it
harder to link deposits and withdrawals from the pool. Unfortunately, it is
still possible to reveal information about those in the anonymity pool if users
are not careful. We introduce Tutela, an application built on expert heuristics
to report the true anonymity of an Ethereum address. In particular, Tutela has
three functionalities: first, it clusters together Ethereum addresses based on
interaction history such that for an Ethereum address, we can identify other
addresses likely owned by the same entity; second, it shows Ethereum users
their potentially compromised transactions; third, Tutela computes the true
size of the anonymity pool of each Tornado Cash mixer by excluding potentially
compromised transactions. A public implementation of Tutela can be found at
https://github.com/TutelaLabs/tutela-app. To use Tutela, visit
https://www.tutela.xyz.
Related papers
- Privacy-Preserving Smart Contracts for Permissioned Blockchains: A zk-SNARK-Based Recipe Part-1 [1.7265013728931]
This work proposes a solution utilizing zk-SNARKs to provide privacy in smart contracts and blockchains.
The proposal includes a new type of transactions, called delegated transactions, which enable use cases like Delivery vs Payment (DvP)
arXiv Detail & Related papers (2025-01-06T21:16:33Z) - Self-Replicating and Self-Employed Smart Contract on Ethereum Blockchain [0.0]
We developed self-replicating and self-employed agents who earn the energy by themselves to replicate them.
When a certain amount of Ether is accumulated, the agent replicates itself and leaves offspring.
The goal of this project is to implement artificial agents that lives for itself, not as a tool for humans.
arXiv Detail & Related papers (2024-05-07T06:17:06Z) - The Devil Behind the Mirror: Tracking the Campaigns of Cryptocurrency Abuses on the Dark Web [39.96427593096699]
We identify 2,564 illicit sites with 1,189 illicit blockchain addresses, which account for 90.8 BTC in revenue.
Our exploration suggests that illicit activities on the dark web have strong correlations, which can guide us to identify new illicit blockchain addresses and onions.
arXiv Detail & Related papers (2024-01-09T16:35:25Z) - Interplay between Cryptocurrency Transactions and Online Financial
Forums [41.94295877935867]
This study focuses on the study of the interplay between these cryptocurrency forums and fluctuations in cryptocurrency values.
It shows that the activity of Bitcointalk forum keeps a direct relationship with the trend in the values of BTC.
The experiment highlights that forum data can explain specific events in the financial field.
arXiv Detail & Related papers (2023-11-27T16:25:28Z) - Pisces: Private and Compliable Cryptocurrency Exchange [7.907585289497186]
We propose a cryptocurrency exchange that restores user anonymity for the first time.
Since the platform knows highly sensitive user private information such as passport number, bank information etc, linking all (on-chain) transactions raises a serious privacy concern.
We also ensure that the user cannot double spend, and the user has to properly report accumulated profit for tax purposes, even in the private setting.
arXiv Detail & Related papers (2023-09-04T15:33:46Z) - Blockchain Large Language Models [65.7726590159576]
This paper presents a dynamic, real-time approach to detecting anomalous blockchain transactions.
The proposed tool, BlockGPT, generates tracing representations of blockchain activity and trains from scratch a large language model to act as a real-time Intrusion Detection System.
arXiv Detail & Related papers (2023-04-25T11:56:18Z) - RiDDLE: Reversible and Diversified De-identification with Latent
Encryptor [57.66174700276893]
This work presents RiDDLE, short for Reversible and Diversified De-identification with Latent Encryptor.
Built upon a pre-learned StyleGAN2 generator, RiDDLE manages to encrypt and decrypt the facial identity within the latent space.
arXiv Detail & Related papers (2023-03-09T11:03:52Z) - Smooth Anonymity for Sparse Graphs [69.1048938123063]
differential privacy has emerged as the gold standard of privacy, however, when it comes to sharing sparse datasets.
In this work, we consider a variation of $k$-anonymity, which we call smooth-$k$-anonymity, and design simple large-scale algorithms that efficiently provide smooth-$k$-anonymity.
arXiv Detail & Related papers (2022-07-13T17:09:25Z) - Quantum-resistance in blockchain networks [46.63333997460008]
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Quantum Computing (CQC), and Tecnologico de Monterrey to identify and eliminate quantum threats in blockchain networks.
The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms.
arXiv Detail & Related papers (2021-06-11T23:39:25Z) - Blockchain is Watching You: Profiling and Deanonymizing Ethereum Users [0.0]
We propose and implement user profiling techniques based on quasi-identifiers.
We describe a malicious value-fingerprinting attack, a variant of the Danaan-gift attack, applicable for the confidential transaction overlays.
arXiv Detail & Related papers (2020-05-28T14:33:32Z) - Collaborative Deanonymization [0.0]
We propose protocols to resolve the tension between anonymity and accountability in a peer-to-peer manner.
We illustrate how the protocols could apply to Monero rings and CoinJoin transactions in Bitcoin.
arXiv Detail & Related papers (2020-05-07T15:03:19Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.