1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
|
Received: from sog-mx-4.v43.ch3.sourceforge.com ([172.29.43.194]
helo=mx.sourceforge.net)
by sfs-ml-2.v29.ch3.sourceforge.com with esmtp (Exim 4.76)
(envelope-from <jeanpaulkogelman@me.com>) id 1XtXKP-0004bS-RW
for bitcoin-development@lists.sourceforge.net;
Wed, 26 Nov 2014 07:47:57 +0000
Received-SPF: pass (sog-mx-4.v43.ch3.sourceforge.com: domain of me.com
designates 17.172.220.236 as permitted sender)
client-ip=17.172.220.236; envelope-from=jeanpaulkogelman@me.com;
helo=st11p02mm-asmtp001.mac.com;
Received: from st11p02mm-asmtpout001.mac.com ([17.172.220.236]
helo=st11p02mm-asmtp001.mac.com)
by sog-mx-4.v43.ch3.sourceforge.com with esmtps (TLSv1:AES128-SHA:128)
(Exim 4.76) id 1XtXKO-0003dU-FL
for bitcoin-development@lists.sourceforge.net;
Wed, 26 Nov 2014 07:47:57 +0000
Received: from [10.0.1.115] ([216.19.182.8]) by st11p02mm-asmtp001.mac.com
(Oracle Communications Messaging Server 7.0.5.33.0 64bit (built Aug 27
2014))
with ESMTPSA id <0NFM00IQ4YZFED30@st11p02mm-asmtp001.mac.com> for
bitcoin-development@lists.sourceforge.net; Wed,
26 Nov 2014 07:47:41 +0000 (GMT)
X-Proofpoint-Virus-Version: vendor=fsecure
engine=2.50.10432:5.13.68,1.0.28,0.0.0000
definitions=2014-11-26_03:2014-11-25, 2014-11-26,
1970-01-01 signatures=0
X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 spamscore=0
suspectscore=0 phishscore=0 adultscore=0 bulkscore=0 classifier=spam
adjust=0
reason=mlx scancount=1 engine=7.0.1-1408290000
definitions=main-1411260081
From: Jean-Paul Kogelman <jeanpaulkogelman@me.com>
Content-type: multipart/alternative;
boundary="Apple-Mail=_5EC110A6-B662-4F52-99F3-F3F677E33C47"
Message-id: <4E783164-B2DC-45BC-946C-8EA191F31193@me.com>
Date: Tue, 25 Nov 2014 23:47:39 -0800
To: Bitcoin Development <bitcoin-development@lists.sourceforge.net>
MIME-version: 1.0 (Mac OS X Mail 8.1 \(1993\))
X-Mailer: Apple Mail (2.1993)
X-Spam-Score: -0.5 (/)
X-Spam-Report: Spam Filtering performed by mx.sourceforge.net.
See http://spamassassin.org/tag/ for more details.
-1.5 SPF_CHECK_PASS SPF reports sender host as permitted sender for
sender-domain
-0.0 SPF_PASS SPF: sender matches SPF record
1.0 HTML_MESSAGE BODY: HTML included in message
X-Headers-End: 1XtXKO-0003dU-FL
Subject: [Bitcoin-development] Deanonymisation of clients in Bitcoin P2P
network paper
X-BeenThere: bitcoin-development@lists.sourceforge.net
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: <bitcoin-development.lists.sourceforge.net>
List-Unsubscribe: <https://lists.sourceforge.net/lists/listinfo/bitcoin-development>,
<mailto:bitcoin-development-request@lists.sourceforge.net?subject=unsubscribe>
List-Archive: <http://sourceforge.net/mailarchive/forum.php?forum_name=bitcoin-development>
List-Post: <mailto:bitcoin-development@lists.sourceforge.net>
List-Help: <mailto:bitcoin-development-request@lists.sourceforge.net?subject=help>
List-Subscribe: <https://lists.sourceforge.net/lists/listinfo/bitcoin-development>,
<mailto:bitcoin-development-request@lists.sourceforge.net?subject=subscribe>
X-List-Received-Date: Wed, 26 Nov 2014 07:47:57 -0000
--Apple-Mail=_5EC110A6-B662-4F52-99F3-F3F677E33C47
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
charset=us-ascii
This paper was just posted on reddit that describes how an attacker can =
de-anonymize clients on the bitcoin network. It mentions that the core =
devs were contacted prior to publication. I was just wondering, how many =
of these issues have already been addressed?
Paper (University of Luxembourg):
http://orbilu.uni.lu/handle/10993/18679 =
<http://orbilu.uni.lu/handle/10993/18679>
Kind regards,
Jean-Paul=
--Apple-Mail=_5EC110A6-B662-4F52-99F3-F3F677E33C47
Content-Transfer-Encoding: 7bit
Content-Type: text/html;
charset=us-ascii
<html><head><meta http-equiv="Content-Type" content="text/html charset=us-ascii"></head><body style="word-wrap: break-word; -webkit-nbsp-mode: space; -webkit-line-break: after-white-space;" class=""><div class="">This paper was just posted on reddit that describes how an attacker can de-anonymize clients on the bitcoin network. It mentions that the core devs were contacted prior to publication. I was just wondering, how many of these issues have already been addressed?</div><div class=""><br class=""></div><div class=""><br class=""></div><div class="">Paper (University of Luxembourg):</div><div class=""><a href="http://orbilu.uni.lu/handle/10993/18679" class="">http://orbilu.uni.lu/handle/10993/18679</a></div><div class=""><br class=""></div><div class=""><br class=""></div><div class="">Kind regards,</div><div class=""><br class=""></div><div class="">Jean-Paul</div></body></html>
--Apple-Mail=_5EC110A6-B662-4F52-99F3-F3F677E33C47--
|