128 research outputs found

    Bitcoin over Tor isn't a good idea

    Get PDF
    Bitcoin is a decentralized P2P digital currency in which coins are generated by a distributed set of miners and transaction are broadcasted via a peer-to-peer network. While Bitcoin provides some level of anonymity (or rather pseudonymity) by encouraging the users to have any number of random-looking Bitcoin addresses, recent research shows that this level of anonymity is rather low. This encourages users to connect to the Bitcoin network through anonymizers like Tor and motivates development of default Tor functionality for popular mobile SPV clients. In this paper we show that combining Tor and Bitcoin creates an attack vector for the deterministic and stealthy man-in-the-middle attacks. A low-resource attacker can gain full control of information flows between all users who chose to use Bitcoin over Tor. In particular the attacker can link together user's transactions regardless of pseudonyms used, control which Bitcoin blocks and transactions are relayed to the user and can \ delay or discard user's transactions and blocks. In collusion with a powerful miner double-spending attacks become possible and a totally virtual Bitcoin reality can be created for such set of users. Moreover, we show how an attacker can fingerprint users and then recognize them and learn their IP address when they decide to connect to the Bitcoin network directly.Comment: 11 pages, 4 figures, 4 table

    Constructive activism in the dark web: cryptomarkets and illicit drugs in the digital ‘demimonde’

    Get PDF
    This paper explores activism enacted through Silk Road, a now defunct cryptomarket where illicit drugs were sold in the dark web. Drawing on a digital ethnography of Silk Road, we develop the notion of constructive activism to extend the lexicon of concepts available to discuss forms of online activism. Monitoring of the cryptomarket took place between June 2011 and its closure in October 2013. Just before and after the closure of the marketplace we conducted anonymous online interviews with 17 people who reported buying drugs on Silk Road (1.0). These interviews were conducted synchronously and interactively through encrypted instant messaging. Participants discussed harnessing and developing the technological tools needed to access Silk Road and engage within the Silk Road community. For participants Silk Road was not just a market for trading drugs: it facilitated a shared experience of personal freedom within a libertarian philosophical framework, where open discussions about stigmatized behaviours were encouraged and supported. Tensions between public activism against drug prohibition and the need to hide one's identity as a drug user from public scrutiny were partially resolved through community actions that internalized these politics, rather than engaging in forms of online activism that are intended to have real-world political effects. Most aptly described through van de Sande's (2015) concept of prefigurative politics, they sought to transform their values into built environments that were designed to socially engineer a more permissive digital reality, which we refer to as constructive activism

    Bitcoin forensics: a tutorial

    Get PDF
    Over the past eighteen months, the digital cryptocurrency Bitcoin has experienced significant growth in terms of usage and adoption. It has also been predicted that if this growth continues then it will become an increasingly useful tool for various illegal activities. Against this background, it seems safe to assume that students and professionals of digital forensics will require an understanding of the subject. New technologies are often a major challenge to the field of digital forensics due to the technical and legal challenges they introduce. This paper provides a set of tutorials for Bitcoin that allows for leaners from both backgrounds to be taught how it operates, and how it may impact on their working practice. Earlier this year they were delivered to a cohort of third year undergraduates. To the author’s knowledge, this represents the first integration of the topic into a digital forensics programme by a higher education provider

    Private Ordering Under Threat of Regulation

    Get PDF

    The Dark Web Phenomenon: A Review and Research Agenda

    Get PDF
    The internet can be broadly divided into three parts: surface, deep and dark. The dark web has become notorious in the media for being a hidden part of the web where all manner of illegal activities take place. This review investigates how the dark web is being utilised with an emphasis on cybercrime, and how law enforcement plays the role of its adversary. The review describes these hidden spaces, sheds light on their history, the activities that they harbour – including cybercrime, the nature of attention they receive, and methodologies employed by law enforcement in an attempt to defeat their purpose. More importantly, it is argued that these spaces should be considered a phenomenon and not an isolated occurrence to be taken as merely a natural consequence of technology. This paper contributes to the area of dark web research by serving as a reference document and by proposing a research agenda

    The Great Decentralization: How Web 3.0 Will Weaken Copyrights, 15 J. Marshall Rev. Intell. Prop. L. 136 (2015)

    Get PDF
    Bitcoin’s popularity increased as its value increased and people became excited about the prospect of a trustless, decentralized currency that could be used on the Internet. Within the last two years, however, people and organizations began exploiting the potential of the block chain that powers the bitcoin network. These people realized that the block chain—a transparent public ledger that cannot be altered—can be used for more than digital currency. One such organization calls itself Ethereum and its developers plan to use block chains to allow decentralized autonomous applications to operate free of government censorship or corruption. While such a network would have a profound effect on society—allowing trustless voting, uncensored social networking and the like—its impact on copyrights could be devastating. This paper argues that the emerging, decentralized Internet (also known as Web 3.0) will be the straw that breaks the copyright owner’s back. This paper argues that, with block chain technology and decentralized applications, those buying and selling unauthorized copies of copyrighted material cannot be subject to court injunctions; making enforcement of copyrights nearly impossible on a decentralized Internet. This paper then proposes that copyright holders get out in front of the problem by embracing a decentralized Internet. This can only be done by drastically reducing the price of copyright licenses. In other words, by offering cheap licenses at the dawn of Web 3.0, copyright holders can instill a sense that it’s better to be safe than sorry when it comes to the ongoing struggle between technology and copyrights
    • …
    corecore