45 research outputs found

    Tracing Transactions Across Cryptocurrency Ledgers

    Get PDF
    One of the defining features of a cryptocurrency is that its ledger, containing all transactions that have evertaken place, is globally visible. As one consequenceof this degree of transparency, a long line of recent re-search has demonstrated that even in cryptocurrenciesthat are specifically designed to improve anonymity it is often possible to track money as it changes hands,and in some cases to de-anonymize users entirely. With the recent proliferation of alternative cryptocurrencies, however, it becomes relevant to ask not only whether ornot money can be traced as it moves within the ledgerof a single cryptocurrency, but if it can in fact be tracedas it moves across ledgers. This is especially pertinent given the rise in popularity of automated trading platforms such as ShapeShift, which make it effortless to carry out such cross-currency trades. In this paper, weuse data scraped from ShapeShift over a thirteen-monthperiod and the data from eight different blockchains to explore this question. Beyond developing new heuristics and creating new types of links across cryptocurrency ledgers, we also identify various patterns of cross-currency trades and of the general usage of these platforms, with the ultimate goal of understanding whetherthey serve a criminal or a profit-driven agenda.Comment: 14 pages, 13 tables, 6 figure

    An Empirical Analysis of Privacy in Cryptocurrencies

    Get PDF
    Cryptocurrencies have emerged as an important technology over the past decade and have, undoubtedly, become blockchain’s most popular application. Bitcoin has been by far the most popular out of the thousands of cryptocurrencies that have been created. Some of the features that made Bitcoin such a fascinating technology include its transactions being made publicly available and permanently stored, and the ability for anyone to have access. Despite this transparency, it was initially believed that Bitcoin provides anonymity to its users, since it allowed them to transact using a pseudonym instead of their real identity. However, a long line of research has shown that this initial belief was false and that, given the appropriate tools, Bitcoin transactions can indeed be traced back to the real-life entities performing them. In this thesis, we perform a survey to examine the anonymity aspect of cryptocurrencies. We start with early works that made first efforts on analysing how private this new technology was. We analyse both from the perspective of a passive observer with eyes only to the public immutable state of transactions, the blockchain, as well as from an observer who has access to network layer information. We then look into the projects that aimed to enhance the anonymity provided in cryptocurrencies and also analyse the evidence of how much they succeeded in practice. In the first part of our own contributions we present our own take on Bitcoin’s anonymity, inspired by the research already in place. We manage to extend existing heuristics and provide a novel methodology on measuring the confidence we have in our anonymity metrics, instead of looking into the issue from a binary perspective, as in previous research. In the second part we provide the first full-scale empirical work on measuring anonymity in a cryptocurrency that was built with privacy guarantees, based on a very well established cryptography, Zcash. We show that just building a tool which provides anonymity in theory is very different than the privacy offered in practice once users start to transact with it. Finally, we look into a technology that is not a cryptocurrency itself but is built on top of Bitcoin, thus providing a so-called layer 2 solution, the Lightning network. Again, our measurements showed some serious privacy concerns of this technology, some of which were novel and highly applicable

    An Empirical Analysis of Anonymity in Zcash

    Get PDF
    Among the now numerous alternative cryptocurrencies derived from Bitcoin, Zcash is often touted as the one with the strongest anonymity guarantees, due to its basis in well-regarded cryptographic research. In this paper, we examine the extent to which anonymity is achieved in the deployed version of Zcash. We investigate all facets of anonymity in Zcash's transactions, ranging from its transparent transactions to the interactions with and within its main privacy feature, a shielded pool that acts as the anonymity set for users wishing to spend coins privately. We conclude that while it is possible to use Zcash in a private way, it is also possible to shrink its anonymity set considerably by developing simple heuristics based on identifiable patterns of usage.Comment: 27th USENIX Security Symposium (USENIX Security '18), 15 pages, Zcas

    An Empirical Analysis of Privacy in the Lightning Network

    Get PDF
    Payment channel networks, and the Lightning Network in particular, seem to offer a solution to the lack of scalability and privacy offered by Bitcoin and other blockchain-based cryptocurrencies. Previous research has focused on the scalability, availability, and crypto-economics of the Lightning Network, but relatively little attention has been paid to exploring the level of privacy it achieves in practice. This paper presents a thorough analysis of the privacy offered by the Lightning Network, by presenting several attacks that exploit publicly available information about the network in order to learn information that is designed to be kept secret, such as how many coins a node has available or who the sender and recipient are in a payment routed through the network.Comment: 26 pages, 5 figure

    The dilemma of providing cardioverter/defibrillator back-up for all patients with heart failure eligible for cardiac resynchronization therapy

    Get PDF
    Cardiac resynchronization therapy (CRT) achieved by biventricular pacing (CRT-P) has been proved to improve symptoms and prognosis of patients with refractory heart failure. Sudden cardiac death is quite common among patients with symptomatic heart failure and implantable cardioverter-defibrillator (ICD) therapy has been proved to effectively reduce sudden deaths in heart failure patients. Given the results of the recently published primary prevention trials and the high incidence of sudden cardiac death among CRT-P recipients, CRT combined with backup defibrillator therapy (CRT-D) seems a logical therapeutic option in patients eligible for CRT. However, the apparent beneficial effects of such an appealing combination do not alleviate the skepticism about the unselected use of CRT-D therapy. This skepticism is largely related to the high cost of this method, to the limited availability of human and financial resources and to our inability to appropriately define the selection criteria for CRT candidates, which are expected to influence the clinicians??? decisions when confronted with the dilemma of providing CRT-D therapy for all patients eligible for CRT

    Individualized Tailoring of Hypolipidemic Pharmacological Treatment

    Get PDF
    The validation of the lipid hypothesis, which pertains to the relationship between dyslipidemia and atherogenesis, has established the central role of hypolipidemic treatment in the frontline of primary and secondary prevention of coronary artery disease. However, the complexity of the lipoprotein disorders, which are usually associated with more than one biochemical abnormalities, and the availability of several hypolipidemic agents in the existing therapeutic armamentarium with combined beneficial effects of variable intensity on several lipoproteins, have stressed the need for the development and implementation of easily applicable therapeutic algorithms which will enable the individualized tailoring of hypolipidemic management with maximal efficiency and safety. One such algorithm of individualized tailoring of hypolipidemic therapy is being proposed in this brief overview

    The Relation of Migraine Headaches and Interatrial Shunts

    Get PDF
    Foramen ovale plays a very important role in fetal circulation by bypassing the lungs and diverting circulation from the right to the left heart. With birth it is usually sealed; however, probe patent or incompletely sealed foramen ovale remains in approximately 25% of adults. Patent foramen ovale (PFO) acquires significance in various congenital heart diseases or other particular settings leading to a right to left shunt, and thus to paradoxical embolism. PFO has been associated with transient ischemic attacks or cryptogenic strokes and also a host of other problems, including migraine. The recognition of an association between migraine syndrome with aura and PFO appears to have come ???full circle??? over the past two decades. Epidemiologic studies have suggested a notably increased PFO prevalence in persons suffering from migraine.The prevalence of migraine headache is higher in cryptogenic stroke patients with PFO than in the general population. Studies have suggested that closure of the PFO may reduce migrainous symptoms. The relation between this association and the recognition of migraine as a risk factor for ischemic stroke in the young is unclear, though right to left passage of circulating factors has been postulated in both syndromes. Despite case series and uncontrolled studies documenting beneficial effects of PFO closure in patients with migraine, particularly those also afflicted by cryptogenic stroke, the recommendation for PFO closure in patients with migraine alone will need to await the results of ongoing randomized trials

    Genome-wide association analysis of susceptibility and clinical phenotype in multiple sclerosis

    Get PDF
    Multiple sclerosis (MS), a chronic disorder of the central nervous system and common cause of neurological disability in young adults, is characterized by moderate but complex risk heritability. Here we report the results of a genome-wide association study performed in a 1000 prospective case series of well-characterized individuals with MS and group-matched controls using the Sentrix® HumanHap550 BeadChip platform from Illumina. After stringent quality control data filtering, we compared allele frequencies for 551 642 SNPs in 978 cases and 883 controls and assessed genotypic influences on susceptibility, age of onset, disease severity, as well as brain lesion load and normalized brain volume from magnetic resonance imaging exams. A multi-analytical strategy identified 242 susceptibility SNPs exceeding established thresholds of significance, including 65 within the MHC locus in chromosome 6p21.3. Independent replication confirms a role for GPC5, a heparan sulfate proteoglycan, in disease risk. Gene ontology-based analysis shows a functional dichotomy between genes involved in the susceptibility pathway and those affecting the clinical phenotyp
    corecore