Received: from sog-mx-3.v43.ch3.sourceforge.com ([172.29.43.193] helo=mx.sourceforge.net) by sfs-ml-2.v29.ch3.sourceforge.com with esmtp (Exim 4.76) (envelope-from ) id 1XuE8f-00040Q-Vd for bitcoin-development@lists.sourceforge.net; Fri, 28 Nov 2014 05:30:42 +0000 Received-SPF: pass (sog-mx-3.v43.ch3.sourceforge.com: domain of gmail.com designates 209.85.213.171 as permitted sender) client-ip=209.85.213.171; envelope-from=gmaxwell@gmail.com; helo=mail-ig0-f171.google.com; Received: from mail-ig0-f171.google.com ([209.85.213.171]) by sog-mx-3.v43.ch3.sourceforge.com with esmtps (TLSv1:RC4-SHA:128) (Exim 4.76) id 1XuE8c-0001US-7G for bitcoin-development@lists.sourceforge.net; Fri, 28 Nov 2014 05:30:41 +0000 Received: by mail-ig0-f171.google.com with SMTP id z20so5370400igj.10 for ; Thu, 27 Nov 2014 21:30:33 -0800 (PST) MIME-Version: 1.0 X-Received: by 10.50.66.179 with SMTP id g19mr31189623igt.8.1417152632957; Thu, 27 Nov 2014 21:30:32 -0800 (PST) Received: by 10.107.18.65 with HTTP; Thu, 27 Nov 2014 21:30:32 -0800 (PST) In-Reply-To: References: Date: Fri, 28 Nov 2014 05:30:32 +0000 Message-ID: From: Gregory Maxwell To: Mistr Bigs Content-Type: text/plain; charset=UTF-8 X-Spam-Score: -1.6 (-) X-Spam-Report: Spam Filtering performed by mx.sourceforge.net. See http://spamassassin.org/tag/ for more details. -1.5 SPF_CHECK_PASS SPF reports sender host as permitted sender for sender-domain 0.0 FREEMAIL_FROM Sender email is commonly abused enduser mail provider (gmaxwell[at]gmail.com) -0.0 SPF_PASS SPF: sender matches SPF record -0.1 DKIM_VALID_AU Message has a valid DKIM or DK signature from author's domain 0.1 DKIM_SIGNED Message has a DKIM or DK signature, not necessarily valid -0.1 DKIM_VALID Message has at least one valid DKIM or DK signature X-Headers-End: 1XuE8c-0001US-7G Cc: Bitcoin Development Subject: Re: [Bitcoin-development] Deanonymisation of clients in Bitcoin P2P network paper X-BeenThere: bitcoin-development@lists.sourceforge.net X-Mailman-Version: 2.1.9 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 28 Nov 2014 05:30:42 -0000 On Fri, Nov 28, 2014 at 12:45 AM, Mistr Bigs wrote: > That's what I was trying to say... The researchers are deanonymizing > transactions from non-Tor connected hosts. So why are we talking about Tor > limitations in response to this? Shouldn't we be discussing how to address > the issues in Bitcoin proper? Because if the user does not use tor or an analogous infrastructure (e.g. something else reimplementing tor's functionality) the user can be deanonymized in many different ways. At the end of the day, if I'm listening widely to the network, and your host is regularly the first to hand me your transactions then I can draw reasonably reliable conclusions... and this is true even if there is a complete absence of identifiable characteristics otherwise. And, on the flip side if the host is persistently behind tor, even with some watermarkable behaviour, their privacy is protected. So making sure that hosts can continually use tor (or similar systems) should be the higher priority. (And, of course, not reimplementing tor leverages the millions of dollars of investment and dozens of subject matter experts working on that system).