Tutela: An Open-Source Tool for Assessing User-Privacy on Ethereum and
Tornado Cash
- URL: http://arxiv.org/abs/2201.06811v1
- Date: Tue, 18 Jan 2022 08:31:12 GMT
- Title: Tutela: An Open-Source Tool for Assessing User-Privacy on Ethereum and
Tornado Cash
- Authors: Mike Wu, Will McTighe, Kaili Wang, Istvan A. Seres, Nick Bax, Manuel
Puebla, Mariano Mendez, Federico Carrone, Tom\'as De Mattey, Herman O.
Demaestri, Mariano Nicolini, Pedro Fontana
- Abstract summary: Tutela is an application built on expert's to report the true anonymity of an address.
It computes the true size of the anonymity pool of each Tornado Cash mixer.
- Score: 6.862106529464183
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: A common misconception among blockchain users is that pseudonymity guarantees
privacy. The reality is almost the opposite. Every transaction one makes is
recorded on a public ledger and reveals information about one's identity.
Mixers, such as Tornado Cash, were developed to preserve privacy through
"mixing" transactions with those of others in an anonymity pool, making it
harder to link deposits and withdrawals from the pool. Unfortunately, it is
still possible to reveal information about those in the anonymity pool if users
are not careful. We introduce Tutela, an application built on expert heuristics
to report the true anonymity of an Ethereum address. In particular, Tutela has
three functionalities: first, it clusters together Ethereum addresses based on
interaction history such that for an Ethereum address, we can identify other
addresses likely owned by the same entity; second, it shows Ethereum users
their potentially compromised transactions; third, Tutela computes the true
size of the anonymity pool of each Tornado Cash mixer by excluding potentially
compromised transactions. A public implementation of Tutela can be found at
https://github.com/TutelaLabs/tutela-app. To use Tutela, visit
https://www.tutela.xyz.
Related papers
- Deanonymizing Ethereum Validators: The P2P Network Has a Privacy Issue [19.43262773933136]
Many blockchain networks aim to preserve the anonymity of validators in the peer-to-peer (P2P) network.
This work demonstrates that the P2P network does not offer this anonymity.
We present a methodology that enables any node in the network to identify validators hosted on connected peers.
arXiv Detail & Related papers (2024-09-06T15:57:43Z) - Self-Replicating and Self-Employed Smart Contract on Ethereum Blockchain [0.0]
We developed self-replicating and self-employed agents who earn the energy by themselves to replicate them.
When a certain amount of Ether is accumulated, the agent replicates itself and leaves offspring.
The goal of this project is to implement artificial agents that lives for itself, not as a tool for humans.
arXiv Detail & Related papers (2024-05-07T06:17:06Z) - Enhancing Trust and Privacy in Distributed Networks: A Comprehensive Survey on Blockchain-based Federated Learning [51.13534069758711]
Decentralized approaches like blockchain offer a compelling solution by implementing a consensus mechanism among multiple entities.
Federated Learning (FL) enables participants to collaboratively train models while safeguarding data privacy.
This paper investigates the synergy between blockchain's security features and FL's privacy-preserving model training capabilities.
arXiv Detail & Related papers (2024-03-28T07:08:26Z) - Pisces: Private and Compliable Cryptocurrency Exchange [7.907585289497186]
We propose a cryptocurrency exchange that restores user anonymity for the first time.
Since the platform knows highly sensitive user private information such as passport number, bank information etc, linking all (on-chain) transactions raises a serious privacy concern.
We also ensure that the user cannot double spend, and the user has to properly report accumulated profit for tax purposes, even in the private setting.
arXiv Detail & Related papers (2023-09-04T15:33:46Z) - Blockchain Large Language Models [65.7726590159576]
This paper presents a dynamic, real-time approach to detecting anomalous blockchain transactions.
The proposed tool, BlockGPT, generates tracing representations of blockchain activity and trains from scratch a large language model to act as a real-time Intrusion Detection System.
arXiv Detail & Related papers (2023-04-25T11:56:18Z) - RiDDLE: Reversible and Diversified De-identification with Latent
Encryptor [57.66174700276893]
This work presents RiDDLE, short for Reversible and Diversified De-identification with Latent Encryptor.
Built upon a pre-learned StyleGAN2 generator, RiDDLE manages to encrypt and decrypt the facial identity within the latent space.
arXiv Detail & Related papers (2023-03-09T11:03:52Z) - Smooth Anonymity for Sparse Graphs [69.1048938123063]
differential privacy has emerged as the gold standard of privacy, however, when it comes to sharing sparse datasets.
In this work, we consider a variation of $k$-anonymity, which we call smooth-$k$-anonymity, and design simple large-scale algorithms that efficiently provide smooth-$k$-anonymity.
arXiv Detail & Related papers (2022-07-13T17:09:25Z) - Quantum-resistance in blockchain networks [46.63333997460008]
This paper describes the work carried out by the Inter-American Development Bank, the IDB Lab, LACChain, Quantum Computing (CQC), and Tecnologico de Monterrey to identify and eliminate quantum threats in blockchain networks.
The advent of quantum computing threatens internet protocols and blockchain networks because they utilize non-quantum resistant cryptographic algorithms.
arXiv Detail & Related papers (2021-06-11T23:39:25Z) - Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's
Post-Quantum Security [67.06003361150228]
A proof of work (PoW) is an important cryptographic construct enabling a party to convince others that they invested some effort in solving a computational task.
In this work, we examine the hardness of finding such chain of PoWs against quantum strategies.
We prove that the chain of PoWs problem reduces to a problem we call multi-solution Bernoulli search, for which we establish its quantum query complexity.
arXiv Detail & Related papers (2020-12-30T18:03:56Z) - Blockchain is Watching You: Profiling and Deanonymizing Ethereum Users [0.0]
We propose and implement user profiling techniques based on quasi-identifiers.
We describe a malicious value-fingerprinting attack, a variant of the Danaan-gift attack, applicable for the confidential transaction overlays.
arXiv Detail & Related papers (2020-05-28T14:33:32Z) - Collaborative Deanonymization [0.0]
We propose protocols to resolve the tension between anonymity and accountability in a peer-to-peer manner.
We illustrate how the protocols could apply to Monero rings and CoinJoin transactions in Bitcoin.
arXiv Detail & Related papers (2020-05-07T15:03:19Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.