Tutela: An Open-Source Tool for Assessing User-Privacy on Ethereum and
Tornado Cash
- URL: http://arxiv.org/abs/2201.06811v1
- Date: Tue, 18 Jan 2022 08:31:12 GMT
- Title: Tutela: An Open-Source Tool for Assessing User-Privacy on Ethereum and
Tornado Cash
- Authors: Mike Wu, Will McTighe, Kaili Wang, Istvan A. Seres, Nick Bax, Manuel
Puebla, Mariano Mendez, Federico Carrone, Tom\'as De Mattey, Herman O.
Demaestri, Mariano Nicolini, Pedro Fontana
- Abstract summary: Tutela is an application built on expert's to report the true anonymity of an address.
It computes the true size of the anonymity pool of each Tornado Cash mixer.
- Score: 6.862106529464183
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: A common misconception among blockchain users is that pseudonymity guarantees
privacy. The reality is almost the opposite. Every transaction one makes is
recorded on a public ledger and reveals information about one's identity.
Mixers, such as Tornado Cash, were developed to preserve privacy through
"mixing" transactions with those of others in an anonymity pool, making it
harder to link deposits and withdrawals from the pool. Unfortunately, it is
still possible to reveal information about those in the anonymity pool if users
are not careful. We introduce Tutela, an application built on expert heuristics
to report the true anonymity of an Ethereum address. In particular, Tutela has
three functionalities: first, it clusters together Ethereum addresses based on
interaction history such that for an Ethereum address, we can identify other
addresses likely owned by the same entity; second, it shows Ethereum users
their potentially compromised transactions; third, Tutela computes the true
size of the anonymity pool of each Tornado Cash mixer by excluding potentially
compromised transactions. A public implementation of Tutela can be found at
https://github.com/TutelaLabs/tutela-app. To use Tutela, visit
https://www.tutela.xyz.
Related papers
- Self-Replicating and Self-Employed Smart Contract on Ethereum Blockchain [0.0]
We developed self-replicating and self-employed agents who earn the energy by themselves to replicate them.
When a certain amount of Ether is accumulated, the agent replicates itself and leaves offspring.
The goal of this project is to implement artificial agents that lives for itself, not as a tool for humans.
arXiv Detail & Related papers (2024-05-07T06:17:06Z) - Enhancing Trust and Privacy in Distributed Networks: A Comprehensive Survey on Blockchain-based Federated Learning [51.13534069758711]
Decentralized approaches like blockchain offer a compelling solution by implementing a consensus mechanism among multiple entities.
Federated Learning (FL) enables participants to collaboratively train models while safeguarding data privacy.
This paper investigates the synergy between blockchain's security features and FL's privacy-preserving model training capabilities.
arXiv Detail & Related papers (2024-03-28T07:08:26Z) - Pisces: Private and Compliable Cryptocurrency Exchange [7.907585289497186]
We propose a cryptocurrency exchange that restores user anonymity for the first time.
Since the platform knows highly sensitive user private information such as passport number, bank information etc, linking all (on-chain) transactions raises a serious privacy concern.
We also ensure that the user cannot double spend, and the user has to properly report accumulated profit for tax purposes, even in the private setting.
arXiv Detail & Related papers (2023-09-04T15:33:46Z) - Blockchain Large Language Models [65.7726590159576]
This paper presents a dynamic, real-time approach to detecting anomalous blockchain transactions.
The proposed tool, BlockGPT, generates tracing representations of blockchain activity and trains from scratch a large language model to act as a real-time Intrusion Detection System.
arXiv Detail & Related papers (2023-04-25T11:56:18Z) - RiDDLE: Reversible and Diversified De-identification with Latent
Encryptor [57.66174700276893]
This work presents RiDDLE, short for Reversible and Diversified De-identification with Latent Encryptor.
Built upon a pre-learned StyleGAN2 generator, RiDDLE manages to encrypt and decrypt the facial identity within the latent space.
arXiv Detail & Related papers (2023-03-09T11:03:52Z) - Towards Measuring the Traceability of Cryptocurrencies [0.5371337604556311]
We put forward a formal framework to measure the (un)traceability and anonymity of cryptocurrencies.
Our work provides the first practical, efficient, and probabilistic measure to assess the traceability of cryptocurrencies.
We implement and extensively evaluate our proposed traceability measure on several cryptocurrency transaction graphs.
arXiv Detail & Related papers (2022-11-08T14:08:39Z) - Smooth Anonymity for Sparse Graphs [69.1048938123063]
differential privacy has emerged as the gold standard of privacy, however, when it comes to sharing sparse datasets.
In this work, we consider a variation of $k$-anonymity, which we call smooth-$k$-anonymity, and design simple large-scale algorithms that efficiently provide smooth-$k$-anonymity.
arXiv Detail & Related papers (2022-07-13T17:09:25Z) - Token Spammers, Rug Pulls, and SniperBots: An Analysis of the Ecosystem of Tokens in Ethereum and the Binance Smart Chain (BNB) [50.888293380932616]
We study the ecosystem of the tokens and liquidity pools, highlighting analogies and differences between the two blockchains.
We estimate the lifetime of the tokens, discovering that about 60% of them are active for less than one day.
We present an exit scam fraud and quantify its prevalence on both blockchains.
arXiv Detail & Related papers (2022-06-16T14:20:19Z) - Quantum Multi-Solution Bernoulli Search with Applications to Bitcoin's
Post-Quantum Security [67.06003361150228]
A proof of work (PoW) is an important cryptographic construct enabling a party to convince others that they invested some effort in solving a computational task.
In this work, we examine the hardness of finding such chain of PoWs against quantum strategies.
We prove that the chain of PoWs problem reduces to a problem we call multi-solution Bernoulli search, for which we establish its quantum query complexity.
arXiv Detail & Related papers (2020-12-30T18:03:56Z) - Blockchain is Watching You: Profiling and Deanonymizing Ethereum Users [0.0]
We propose and implement user profiling techniques based on quasi-identifiers.
We describe a malicious value-fingerprinting attack, a variant of the Danaan-gift attack, applicable for the confidential transaction overlays.
arXiv Detail & Related papers (2020-05-28T14:33:32Z) - Collaborative Deanonymization [0.0]
We propose protocols to resolve the tension between anonymity and accountability in a peer-to-peer manner.
We illustrate how the protocols could apply to Monero rings and CoinJoin transactions in Bitcoin.
arXiv Detail & Related papers (2020-05-07T15:03:19Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.