Bitcoin and Blockchain Fundamentals
Bitcoin and Blockchain Fundamentals
Bitcoin and Blockchain Fundamentals
a.a. 2019-2020
2
Agenda
3 Cryptocurrencies anonymity
4 The Darkweb
7 Selected Readings
3
§ Reliable;
§ Secure; and
§ Censorship-resistant ecosystem
Block 1 is already confirmed Block 2 is already confirmed Block 3 has not been
and validated and it stores the and validated and it stores the confirmed yet.
information of 3 transactions. information of 3 transactions.
Bitcoin infrastructure
…
Final user - Software
T ra
Blockchain
on
Transaction Transaction Transaction Transaction Transaction Transaction Transaction Transacti
Cryptocurrencies | Definition
Definition
PROs CONs
PRO
13
14
Cryptocurrencies | Ecosystem
Cryptocurrencies Protocols
Exchanges
Mining providers
Wallet
16
3. Cryptocurrencies anonymity
17
When a user makes a transaction in a blockchain – for example, to make a payment – payment
Discovering and
details must be revealed. A blockchain address contains all the transactions ever made by that user
linking addresses which can be freely analyze through a blockchain explorer.
It could be possible to associate the real identity to a specific blockchain address. To do that, it is
Discovering user
required to exploit off-network information. In particular, the main identity sources could be (i)
identities donation websites (ii) specialized forums (iii) cryptocurrencies exchanges.
This challenge relates to obtaining access to other types of data from blockchain analysis such as
Getting transaction geolocation, data transfer, transfer amount and smart contract details. One of the most interesting
information and advanced tools that can be developed on a blockchain is the so called “smart-contract”.
18
Cryptocurrencies | Anonimity
Anonymous Cryptocurrencies
Anonymous Wallets
Anonymous Wallet
Anonymous Exchanges
Anonymity Services
18
19
19
Attack-resistant
Zcash is decentralized and maintained by a wide network of people and machines,
instead of a centralized entity, like a bank or government. There is no central database to be
hacked and no single point of failure. There is no authority that can shut it down or prevent
its use.
Private
Privacy is built into the core of Zcash, allowing people to send and receive Zcash without
disclosing the sender, receiver or the amount transacted. Privacy allows good people to
transact safely over digital mediums. Transparent addresses and transactions are also
available.
21
Mint Transactions
Pour Transactions
22
“Monero is cash for a connected world. It’s fast, private, and secure.
With Monero, you are your own bank. You can spend safely, knowing that others
cannot see your balances or track your activity.”
23
Untraceable
Sending and receiving addresses as well as transacted amounts are obfuscated by
default. Transactions on the Monero blockchain cannot be linked to a particular user or
real-world identity.
Fungible
Monero is fungible due to the nature of the currency which provides no way to link
transactions together nor trace the history of any particular XMR. 1 XMR is functionally
identical to any other 1 XMR.
24
43EH3omZS
UYCmJYskC
Send the Monero to that Ux2tV5oB5tL
Vrp58AeMYLr
Generate a bran new one-
specific address Fhcz2umUVQ time destination address
HiHu62nG5C
Sender S3mvcfgKHC
3fPtq6DHkEb Receiver
MjqvCAZJW5
nw9E
§ Ring Signatures are digital § A stealth address § The sender can reveal just
signatures where several prevents recipient’s funds being enough information for the
signers sign a transaction linked with their wallet. miners to confirm the transaction
§ The sender generates a one-time § The recipient gets their funds without disclosing publicly the
spend key and the recipient is through their wallets private view total amount spent. (Known as a
the only party that can detect key which scans the blockchain. “commit”).
and spend the money based on Once detected and retrieved by the § The network encrypts the
that key. wallet, a single-use private key is amount of each output and
§ No outside observer can match created corresponding with includes it in the transaction.
signers in the ring ensuring that senders public key.
transaction outputs are § The recipient can spend those
untraceable. funds using their private spend
§ A ring signature uses your account key. This occurs without the sender
keys and selected public keys or recipient wallets, nor the amount
from the blockchain to form a transacted publicly linked.
“ring” of possible signers
26
26
“We are privacy activists who have dedicated our lives to creating the software
that Silicon Valley will never build, the regulators will never allow, and the VC's will
never invest in. We build the software that Bitcoin deserves.”
27
Censorship-resistant
§ Be your own Swiss Bank – Samourai Wallet is a fully non custodial software and it
ensures consumers are always in control of their private keys. No email address, no ID
checks, and no hassle. Just install and go.
Offline
§ Take it anywhere, even offline – With this wallet a consumer could bypass data network
restrictions with offline sending. It is possible to roll offline storage wallets with any spare
mobile phone.
28
29
§ Bisq is entirely non-custodial; users stay in control of fiat and cryptocurrency funds.
§ Trades include security deposits from buyer and seller to prevent fraud.
§ Trading funds and security deposits are locked in a 2-of-3 multisig escrow.
Private
§ Every Bisq application is a Tor hidden service
§ Using Bisq requires no registration or centralized identity verification
§ Bisq has no central servers or databases to record data
§ Data is encrypted such that trade details are readable only by counterparties
Censorship-resistant
§ Bisq’s network is a fully distributed P2P network, and thus difficult to shut down
§ Bisq’s network is built on top of Tor, and thus inherits Tor’s own censorship resistance
§ Bisq is code, not a company; it is not incorporated, and it cannot be disincorporated
31
Download
and Run it
32
1 2
Download Bank
and Run it transfer
33
1 2 3
1 2 3 4
1 2 3 4 5
1 2 3 4 5 6
37
A A
B B
C C
When a customer send coins to BestMixer.io, they are entered into a pool of coins along with those of other depositors. A mixing
engine then tumbles the received coins along with the others in the pool. The coins customers will receive as a result are made
up of bits from many different sources, thereby scrambling their origins and making them untraceable
39
Chose a
cryptocurrency
40
1 2
1 2 3
1 2 3
§ Silk Road will receive 1
§ Bob is buying weed on § Dark Wallet will combine
BTC from an anonymous
Silk Road for 2 BTC their transactions so that
address
§ Alice is buying Alpaca the blockchain records
§ Grass Hill Alpacas will
socks on Grass Hill only a single movement
receive 1 BTC from an
Alpacas for 1 BTC of funds
anonymous address
44
4. The Darkweb
45
The web taxonomy: surface web, deep web and dark web
Google
The Surface Web is anything that can
Surface
Wikipedia 4% be indexed by a typical search engine
Web like Google, Bing or Yahoo.
Yahoo
Legal
Documents
The Deep Web is anything that a
Financial Deep search engine can’t find such as legal
Records 90% Web documents, financial records, private
information.
Government
Resources
45
Drug
Trafficking
The Dark Web is classified as a small
Gun Dark portion of the Deep Web that has been
Merchants 6% Web intentionally hidden and is inaccessible
through standard web browsers.
Child-
pornography
46
1. Download and
Run a VPN
47
50
51
1
§ Alice wants to buy a
good from Bob through
Silk Road
§ Alice needs to deposit
his bitcoin
51 in the Silk
Road “hot wallet. These
funds are held in
“escrow” by the
marketplace
52
1 2
§ The escrow system also
§ Alice wants to buy a
assists marketplace
good from Bob through
administrators in
Silk Road
mediating disputes
§ Alice needs to deposit
between buyers and
his bitcoin
52 in the Silk
sellers and minimizing
Road “hot wallet. These
scams in which money is
funds are held in
collected without the
“escrow” by the
intention of ever shipping
marketplace
any goods
53
Ok!
1 2 3
§ The escrow system also
§ Alice wants to buy a
assists marketplace § Funds are released when
good from Bob through
administrators in the vendor indicates the
Silk Road
mediating disputes goods have been sent. In
§ Alice needs to deposit
between buyers and some marketplaces, the
his bitcoin
53 in the Silk
sellers and minimizing funds are held until the
Road “hot wallet. These
scams in which money is buyer indicates that the
funds are held in
collected without the goods have been
“escrow” by the
intention of ever shipping received.
marketplace
any goods
54
+ =
An anonymous way of An anonymous, digital An anonymous way of
hosting and accessing method of payment purchasing illegal goods
illegal marketplaces
This issue is solved This problem is solved The combination of TOR for
through the use of The with a ”smart” use of covert communications and
Onion Router (TOR), cryptocurrencies. Bitcoin for covert payments
originally developed by the Bitcoin did for darkweb has led to the proliferation
US Navy. By routing the marketplaces what PayPal of darknet marketplaces.
message through several did for EBay—provide a
nodes, the TOR network reliable, scalable, and
obfuscates the path (and convenient payment
hence the IP address) of a mechanism.
message sent between two
clients.
55
80%
60%
40%
20%
0%
80%
60%
40%
20%
0%
For an illegal user that buys/sells illegal goods and services using bitcoin,
holding a large balance is costly due to (i) opportunity costs of capital,
Transacts more and (ii) risks associated with having holdings seized by authorities.
frequently
An illegal user predominantly uses bitcoin to buy and sell goods and
services, whereas some legal users also use bitcoin for investment (as a
Does smaller store of value) and speculation
sized transaction
§ $1,000,000 § Number of
in Bitcoin websites
§ $180,000 in operating in TOR
cash, gold, which have been
silver and closed (among
drugs which Silk Road,
Agora and
Evolution)
62
How?
63
§ Explore the Bitcoin blockchain § Search addresses, transactions § Analyse nearly every active
§ Check bitcoin addresses and and wallet ID domain and IP address on the
investigate if they have been § Investigate if a specific transaction Internet.
reported as scam. and/or wallet is linked with a public § Learn how this data can inform risk
§ View, monitor and search bitcoin exchange assessments, help profile
ownership and wallet balance by § Determine the entire addresses attackers, guide online fraud
name, bitcoin address, email linked with a specific wallet investigations, and map cyber
address, url or keyword. activity to attacker infrastructure.
§ Check a BTC address to find
connected websites or owner
profiles.
6. Further readings
66
Selected readings
§ Jonas David Nick, Data-Driven De-Anonymization in Bitcoin, 2015
https://www.research-collection.ethz.ch/bitstream/handle/20.500.11850/155286/eth-48205-
01.pdf?sequence=1&isAllowed=y
§ Sean Foley, Jonathan R. Karlsen, Talis J. Punins, Sex, Drugs, and Bitcoin: How Much Illegal Activity
Is Financed Through Cryptocurrencies?, 2018
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3102645
§ Malte Moser et al., An Empirical Analysis of Traceability in the Monero Blockchain, 2017
https://arxiv.org/pdf/1704.04299/
§ Martin Harrigan, Christoph Fretter, The Unreasonable Effectiveness of Address Clustering, 2016
https://ieeexplore.ieee.org/abstract/document/7816867
67
“
The supreme art of war
is to subdue the enemy
without fighting.
”
Sun Tzu – The Art of War
67
68
ip tools
68