BitIodine: extracting intelligence from the Bitcoin network

Size: px
Start display at page:

Download "BitIodine: extracting intelligence from the Bitcoin network"

Transcription

1 BitIodine: extracting intelligence from the Bitcoin network Michele Spagnuolo

2 Bitcoin BitIodine

3 About Bitcoin Decentralized, global digital currency A global peer-to-peer network, across which transactions are broadcast Can support strong anonymity - implementations not strongly anonymous Recent clarification to US regulations - to be considered as foreign currency and not legal tender

4 Open money Open money trust-no-one currency/commodity that isn t subject to manipulation by central banks or corporations designed for security, founded on distributed cryptography crypto-currency Quanta sit vis in numeris... T. Struve, De Numeris, 1421

5 History Digital currency based in cryptography , Bitcoin whitepaper , by "Satoshi Nakamoto" (pseudonym) First client in January 2009 Open Source No single point of failure

6 Who uses Bitcoin? A lot of legitimate uses of Bitcoin

7 Why use Bitcoin? Speed and price No central authority No setup Better privacy No counterfeit, no chargebacks No account freezing Algorithmically known inflation

8 Trading goods for Bitcoin

9 Also accepting Bitcoin...

10 Who also uses Bitcoin? Top 20 categories $1.2M rev/month 220 categories, ranging from digital goods to various kinds of narcotics or prescription medicines

11 Some stats about Bitcoin As of June 1: 1 BTC is traded for USD (max: 266 USD on April 11, min: 50 USD on April 16) $1.5B market capitalization 30,000 BTC / 3.8M$ sent per hour Approximately 60,000 transactions per day

12 Key concepts Address Wallet Transaction Block Blockchain Mining / Generation

13 Address and Wallet An address is a string like 1MikiSPbrhCFk7S4wzZP7gQqhwWH866DCb generated by a Bitcoin client together with the private key needed to spend and redeem the coins sent to it. It is public, and can be posted everywhere in order to receive payments. A wallet is a file which stores addresses and the private keys needed to use them.

14 Transaction A record of coins moving from one or more addresses to one recipient address. It is saved in a block.

15 How spending works Several cryptographic technologies public key cryptography - ECDSA hashing algorithms - SHA-1, SHA-256,... Future proof - designed to be upgraded in a forward compatible way

16 A block is a list of transactions. Block Each block embeds new transactions that took place before it was created. A new block is generated, on average, every 10 minutes. The first generated block is called genesis block. Transactions are placed in blocks, which are linked by SHA-256 hashes.

17 Blockchain The blockchain is the linked list of all the blocks that have been generated since day one. A full copy of the blockchain contains every transaction ever executed, and is distributed on every client. For any block on the chain, there is only one path to the genesis block. Coming from the genesis block, however, there can be forks.

18 Mining / Generation Users on the Bitcoin network compete to generate a new valid block that satisfies a difficult requirement (block hash with N leading zero bytes) - this is done by brute force. The lucky solver is then rewarded a fixed number of bitcoins for cryptographically validating transactions on the network. The parameter N is automatically adjusted by the protocol (difficulty), making it scale with the number of miners and making sure that, statistically, one block is generated every 10 minutes.

19 Mining hardware Nowadays mining with GPUs is no longer profitable - FPGAs or ASICs.

20 Distributed consensus problem New blocks are linked to older blocks, forming a block chain that is constantly being extended. Miners may generate blocks at the same time or too close together. A participant choosing to extend an existing path in the block chain indicates a vote towards consensus on that path. The longer the path, the more computation was expended building it. Longest path = accepted chain Bitcoin offers a unique solution to the consensus problem in distributed systems since voting power is directly proportional to computing power.

21 BitIodine

22 Is Bitcoin anonymous? Yes Users don't need to set up accounts No ID required Cash-like Tor / VPN help No Every transaction is stored in the blockchain Analysis of the blockchain can correlate addresses

23 BitIodine a tool for analyzing and profiling the Bitcoin network

24 Transaction graph

25 User graph

26 Techniques for creating the User Graph Two main techniques: Multi-input transactions grouping Shadow address guessing (change)

27 Multi-input transactions When a transaction has multiple input addresses, we can safely assume that those addresses belong to the same wallet, thus to the same user. Assumption: owners don't share private keys. Caveat: web wallets - pools that would be "mistakenly" grouped as a single user.

28 Shadow addresses the entire value of an unspent output of a prior transaction must be spent and used as input for a new transaction input is destroyed, and change should be sent back to the user to improve anonymity, a "shadow" address is automatically created and used to collect back the "change"

29 Shadow addresses When a Bitcoin transaction has exactly two output addresses, O 1 and O 2, such that O 2 is a new address (i.e., an address that has never appeared before), and O 1 corresponds to an old address (an address that has appeared previously), we can assume that O 2 constitutes a shadow address for one of the input addresses of that transaction.

30 Transactions with two outputs are the vast majority " Transac/on'count'per'number'of'outputs' Number'of'transac/ons' " " " " " " " Why? One payee, one shadow address for change back " " 0" 1" 2" 3" 4" 5" 6" 7" 8" 9" 10"11"12"13"14"15"16"17"18"19"20"21"22"23"24"25"26"27"28"29"30"31"32"33"34"35"36"37"38"39"40"41"42"43"44"45"46"47"48"49"50" Number'of'outputs' Transac7on(volume(per(number(of(outputs( Volumes((BTC)( 1,400,000,000" 1,200,000,000" 1,000,000,000" 800,000,000" 600,000,000" 400,000,000" 200,000,000" 0" 1" 2" 3" 4" 5" 6" 7" 8" 9" 10"11"12"13"14"15"16"17"18"19"20"21"22"23"24"25"26"27"28"29"30"31"32"33"34"35"36"37"38"39"40"41"42"43"44"45"46"47"48"49"50" Number(of(outputs(

31 Shadow addresses The official bitcoin client tries to randomize the position of the change output, but code is flawed: File: wallet.cpp // Insert change txn at random position: Number of payees vector<ctxout>::iterator position = wtxnew.vout.begin()+getrandint(wtxnew.vout.size()); wtxnew.vout.insert(position, CTxOut(nChange, scriptchange)); size()+1 If just two outputs (one payee), GetRandInt(1) always returns 0. The change ends up always in the first output. If multiple outputs, change is never the last output. Still not fixed! (Recently fixed!)

32 Shadow addresses Given the bug in the official client, BitIodine checks transactions with exactly two outputs, and also checks that the first address was new at the time of the transaction. If it is, chances are it's a shadow address. It is a heuristic.

33 Evaluating heuristics Number of clusters Cluster size 6M 5M 4M 3M 2M 1M 0M 5,331,657 Heur. 1 2,175, ,494 Heur. 1+2 det. Heur. 1+2 relaxed Coverage % 54.5% Heur. 1 39% 87.1% 50% 99.7% Heur. 1+2 det. Heur. 1+2 relaxed Heur Heur. 1+2 det. Heur. 1+2 relaxed Transaction coverage Addresses clustered Average Median

34 The Classifier: labels for addresses

35 The Classifier: labels for users

36 Example: classifying address and owner Classify an address we found in IRC chat logs of channel #bitcoin-otc Borrowed money from other Bitcoin-OTC users

37 Zero-balance address, exhausted in 84 transactions, belonging to user xisalty on BitcoinTalk forum and user xisalty-otc on Bitcoin-OTC. The owner is a known scammer! Every address belonging to the user is empty, 4.5% are One- Time-Addresses, 2.3% are zombies.

38 A real-world case: investigating the Silk Road Identify the addresses owned by the Silk Road Investigate the activity of the addresses

39 A real-world case: investigating the Silk Road One of the bitcoin addresses that moved most funds on the network during 2012 is: 1DkyBEKt5S2GDtv7aQw6rQepAvnsRyHoYM

40 A real-world case: investigating the Silk Road Using the Mt.Gox scraper, we find that: On July 17, 2012 this address had a balance of 517,825 BTC On the same day Bitcoin looked on the verge of breaking 10 USD/BTC At 02:00 AM, someone sold 10,000 BTC at 9 USD/ BTC, driving the price down At 02:29, two large withdrawals of respectively 20,000 BTC and 60,000 BTC were made from this address one after the other, and included in a block at 02:32.

41 A real-world case: investigating the Silk Road Using the Mt.Gox scraper, we find that: Mt.Gox, at the time, needed 6 confirmations in order to allow the user to spend deposited bitcoins. 6 confirmations matured with block at height , relayed at 02:47:24 AM At 02:52 and 02:53, someone sold approximately 15,000 BTC at market price in several batches, causing the price to drop below 7.5 USD/BTC.

42 A real-world case: investigating the Silk Road

43 A real-world case: investigating the Silk Road Sign up to the Silk Road Deposit BTC to a one-time deposit address The coins are mixed: the deposit address is provably in the same wallet as more than 25,000 other addresses

44 A real-world case: investigating the Silk Road Find a connection between the addresses in the mixer and the large 1Dky... address The mixer is a cluster active since June 18, more than 80,000 inputs/outputs Follow the flow of coins!

45 A real-world case: investigating the Silk Road Multi-hop connection found: the 1Dky... address belongs to the Silk Road.

46 Conclusions We present BitIodine We test it on real-world use cases we are able to get valuable information we get insights on the Silk Road Plans for the future add user-friendly front-end to the framework

47 Thank you.

An Analysis of the Bitcoin Electronic Cash System

An Analysis of the Bitcoin Electronic Cash System An Analysis of the Bitcoin Electronic Cash System Danielle Drainville University of Waterloo December 21, 2012 1 Abstract In a world that relies heavily on technology, privacy is sought by many. Privacy,

More information

Using the Bitcoin Blockchain for secure, independently verifiable, electronic votes. Pierre Noizat - July 2014

Using the Bitcoin Blockchain for secure, independently verifiable, electronic votes. Pierre Noizat - July 2014 Using the Bitcoin Blockchain for secure, independently verifiable, electronic votes. Pierre Noizat - July 2014 The problem with proprietary voting systems Existing electronic voting systems all suffer

More information

Orwell. From Bitcoin to secure Domain Name System

Orwell. From Bitcoin to secure Domain Name System Orwell. From Bitcoin to secure Domain Name System Michał Jabczyński, Michał Szychowiak Poznań University of Technology Piotrowo 2, 60-965 Poznań, Poland {Michal.Jabczynski, Michal.Szychowiak}@put.poznan.pl

More information

Cryptographic aspects of Bitcoin

Cryptographic aspects of Bitcoin Cryptographic aspects of Bitcoin Stefan Dziembowski University of Warsaw Digital vs. paper currencies Paper: Digital: 16fab13fc6890 Very useful if is also digital. A tradi@onal ways of paying digitally

More information

Distributed Public Key Infrastructure via the Blockchain. Sean Pearl smp1697@cs.rit.edu April 28, 2015

Distributed Public Key Infrastructure via the Blockchain. Sean Pearl smp1697@cs.rit.edu April 28, 2015 Distributed Public Key Infrastructure via the Blockchain Sean Pearl smp1697@cs.rit.edu April 28, 2015 Overview Motivation: Electronic Money Example TTP: PayPal Bitcoin (BTC) Background Structure Other

More information

A Visual Interactive Realtime EXplorer for Bitcoin!

A Visual Interactive Realtime EXplorer for Bitcoin! Scuola Politecnica e delle Scienze di Base Corso di Laurea Magistrale in Ingegneria Informatica Tesi di Laurea Magistrale in sistemi distribuiti A Visual Interactive Realtime EXplorer for Bitcoin Anno

More information

Virtual Currencies and their Relevance to Digital Forensics PRESTON MILLER

Virtual Currencies and their Relevance to Digital Forensics PRESTON MILLER Virtual Currencies and their Relevance to Digital Forensics PRESTON MILLER 1 Presentation Overview Virtual Currency Cryptocurrency Bitcoin Basics: Obtaining, Usage, and History Digital Forensics Relevance

More information

Bitcoin Miner Optimization

Bitcoin Miner Optimization Bitcoin Miner Optimization Nicolas T. Courtois - University College London, UK Bitcoin Mining Bottom Line Bitcoin Mining = a high tech race to determine who will own the currency of the 21 century 2 Nicolas

More information

Bitcoin Thief Tutorial

Bitcoin Thief Tutorial The complete Bitcoin Thief Tutorial SESSION ID: HTA-R02 Uri Rivner Head of Cyber Strategy BioCatch Etay Maor PMM Cyber Trusteer, an IBM Company The first few things you should know about Bitcoin Most people

More information

CoinAMI Coin-Application Mediator Interface

CoinAMI Coin-Application Mediator Interface Bilkent University Department of Computer Engineering CoinAMI Coin-Application Mediator Interface Supervisor Can Alkan Members Ahmet Kerim Şenol Alper Gündoğdu Halil İbrahim Özercan Muhammed Yusuf Özkaya

More information

Christoph Sorge. February 12th, 2014 Bitcoin minisymposium at KNAW

Christoph Sorge. February 12th, 2014 Bitcoin minisymposium at KNAW Bitcoin s Peer-to-Peer network Christoph Sorge February 12th, 2014 Bitcoin minisymposium at KNAW Clipart source: http://openclipart.org, users Machovka and Keistutis Department of Computer Science What

More information

An Analysis of Anonymity in Bitcoin Using P2P Network Traffic

An Analysis of Anonymity in Bitcoin Using P2P Network Traffic An Analysis of Anonymity in Bitcoin Using P2P Network Traffic Philip Koshy, Diana Koshy, and Patrick McDaniel Pennsylvania State University, University Park, PA 16802, USA Abstract. Over the last 4 years,

More information

AsicBoost A Speedup for Bitcoin Mining

AsicBoost A Speedup for Bitcoin Mining AsicBoost A Speedup for Bitcoin Mining Dr. Timo Hanke March 31, 2016 (rev. 5) Abstract. AsicBoost is a method to speed up Bitcoin mining by a factor of approximately 20%. The performance gain is achieved

More information

Bitcoin: Concepts, Practice, and Research Directions

Bitcoin: Concepts, Practice, and Research Directions Bitcoin: Concepts, Practice, and Research Directions Ittay Eyal, Emin Gün Sirer Computer Science, Cornell University DISC Bitcoin Tutorial, October 2014 Barter Gold Fiat 2 Barter Gold Fiat Bitcoin 2008:

More information

Peershare does not require any changes to the Peercoin blockchain or protocol (no hard fork).

Peershare does not require any changes to the Peercoin blockchain or protocol (no hard fork). Issue decentralized securities using Peershare The shutdown of BTC Trading Corp and Litecoin Global has caused me to consider if there is a way for businesses to manage publicly held shares in a decentralized

More information

More information >>> HERE <<<

More information >>> HERE <<< More information >>> HERE http://urlzz.org/bitcoinwa/pdx/ftpl1585/ Tags: review bitcoin wealth alliance, ## download, buy

More information

Blocks & Chains Decentralized Exchange

Blocks & Chains Decentralized Exchange Blocks & Chains Decentralized Exchange A Peershare for exchanging cryptoassets by Jordan Lee with contributions from Tom Joad and Michael Witrant (aka sigmike) The arrival of a decentralized exchange has

More information

A Fistful of Bitcoins: Characterizing Payments Among Men with No Names

A Fistful of Bitcoins: Characterizing Payments Among Men with No Names A Fistful of Bitcoins: Characterizing Payments Among Men with No Names Sarah Meiklejohn Marjori Pomarole Grant Jordan Kirill Levchenko Damon McCoy Geoffrey M. Voelker Stefan Savage University of California,

More information

Finance and Economics Discussion Series Divisions of Research & Statistics and Monetary Affairs Federal Reserve Board, Washington, D.C.

Finance and Economics Discussion Series Divisions of Research & Statistics and Monetary Affairs Federal Reserve Board, Washington, D.C. Finance and Economics Discussion Series Divisions of Research & Statistics and Monetary Affairs Federal Reserve Board, Washington, D.C. Bitcoin: Technical Background and Data Analysis Anton Badev and Matthew

More information

How to Send Stealth Text From Your Cell Phone

How to Send Stealth Text From Your Cell Phone anonymous secure decentralized SMS stealthtext transactions WHITEPAPER STATE OF THE ART 2/8 WHAT IS STEALTHTEXT? stealthtext is a way to send stealthcoin privately and securely using SMS texting. stealthtext

More information

MOMENTUM - A MEMORY-HARD PROOF-OF-WORK VIA FINDING BIRTHDAY COLLISIONS. DANIEL LARIMER dlarimer@invictus-innovations.com Invictus Innovations, Inc

MOMENTUM - A MEMORY-HARD PROOF-OF-WORK VIA FINDING BIRTHDAY COLLISIONS. DANIEL LARIMER dlarimer@invictus-innovations.com Invictus Innovations, Inc MOMENTUM - A MEMORY-HARD PROOF-OF-WORK VIA FINDING BIRTHDAY COLLISIONS DANIEL LARIMER dlarimer@invictus-innovations.com Invictus Innovations, Inc ABSTRACT. We introduce the concept of memory-hard proof-of-work

More information

Bitcoin: A Peer-to-Peer Electronic Cash System

Bitcoin: A Peer-to-Peer Electronic Cash System Bitcoin: A Peer-to-Peer Electronic Cash System Satoshi Nakamoto satoshin@gmx.com www.bitcoin.org Abstract. A purely peer-to-peer version of electronic cash would allow online payments to be sent directly

More information

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)

Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure) Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.

More information

Payment systems. Tuomas Aura CSE-C3400 Information security. Aalto University, autumn 2015

Payment systems. Tuomas Aura CSE-C3400 Information security. Aalto University, autumn 2015 Payment systems Tuomas Aura CSE-C3400 Information security Aalto University, autumn 2015 Outline 1. Card payment 2. (Anonymous digital cash) 3. Bitcoin 2 CARD PAYMENT 3 Bank cards Credit or debit card

More information

BitIodine: Extracting Intelligence from the Bitcoin Network

BitIodine: Extracting Intelligence from the Bitcoin Network BitIodine: Extracting Intelligence from the Bitcoin Network Michele Spagnuolo, Federico Maggi, and Stefano Zanero NECSTLab, DEIB, Politecnico di Milano, Italy michele.spagnuolo@mail.polimi.it, federico.maggi@polimi.it,

More information

BACK OFFICE MANUAL. Version 1.2 - Benjamin Bommhardt DRAGLET GMBH Bergsonstraße 154 81245 München - Germany

BACK OFFICE MANUAL. Version 1.2 - Benjamin Bommhardt DRAGLET GMBH Bergsonstraße 154 81245 München - Germany BACK OFFICE MANUAL Version 1.2 - Benjamin Bommhardt DRAGLET GMBH Bergsonstraße 154 81245 München - Germany Contents Introduction... 3 Overview of cxadmin... 4 Dashboard... 4 Customer overview... 5 Markets...

More information

scalability for Bitcoin Jeremy Clark Concordia Institute for Information Systems Engineering

scalability for Bitcoin Jeremy Clark Concordia Institute for Information Systems Engineering user scalability for Bitcoin Jeremy Clark Concordia Institute for Information Systems Engineering Time Stamping Prediction Markets Anonymity Solvency Usability History & SoK Time Stamping Prediction Markets

More information

Electronic Payments. EITN40 - Advanced Web Security

Electronic Payments. EITN40 - Advanced Web Security Electronic Payments EITN40 - Advanced Web Security 1 Card transactions Card-Present Smart Cards Card-Not-Present SET 3D Secure Untraceable E-Cash Micropayments Payword Electronic Lottery Tickets Peppercoin

More information

msigna Getting Started

msigna Getting Started msigna Getting Started Thank you for deciding to try msigna, the most powerful secure cryptocoin storage solution available. We think you will enjoy using msigna as it is, but it is still a product under

More information

Bitcoin and Beyond: The Possibilities and Pitfalls of Virtual Currencies

Bitcoin and Beyond: The Possibilities and Pitfalls of Virtual Currencies Bitcoin and Beyond: The Possibilities and Pitfalls of Virtual Currencies David Andolfatto* Vice President Federal Reserve Bank of St. Louis March 31, 2014 *The views and opinions expressed here are my

More information

Quantitative Analysis of the Full Bitcoin Transaction Graph

Quantitative Analysis of the Full Bitcoin Transaction Graph Quantitative Analysis of the Full Bitcoin Transaction Graph Dorit Ron and Adi Shamir Department of Computer Science and Applied Mathematics, The Weizmann Institute of Science, Israel {dorit.ron,adi.shamir}@weizmann.ac.il

More information

The World of Emerging Payment Systems A Brief Introduction

The World of Emerging Payment Systems A Brief Introduction The World of Emerging Payment Systems A Brief Introduction Joseph M. Vincent Director of Regulatory & Legal Affairs Washington State Department of Financial Institutions Presentation to Financial Management

More information

2. Elections We define an electronic vote as a chain of digital signatures. Each owner transfers the vote to the candidate or legislation by digitally

2. Elections We define an electronic vote as a chain of digital signatures. Each owner transfers the vote to the candidate or legislation by digitally Abstract A purely peer to peer version of electronic vote would allow online votes to be sent directly from one party to another without going through a central voting register. Digital signatures provide

More information

Introduction to Bitcoin Mining

Introduction to Bitcoin Mining A Guide For Gamers, Geeks, and Everyone Else by David R. Sterry If you find this ebook useful and would like to see it extended, send donations to 1i2mRogbNByFLxuhD7HtjxDut8GDPnmYj For the most recent

More information

Cryptocurrency and Bitcoin: A possible foundation of future currency why it has value, what is its history and its future outlook.

Cryptocurrency and Bitcoin: A possible foundation of future currency why it has value, what is its history and its future outlook. B.Sc. Essay in Business Cryptocurrency and Bitcoin: A possible foundation of future currency why it has value, what is its history and its future outlook. Sindri Leó Árnason Leiðbeinandi: Guðrún Johnsen

More information

COINSPARK ASSET ISSUE AGREEMENT. Issuer An example retailer Legal name of the issuer.

COINSPARK ASSET ISSUE AGREEMENT. Issuer An example retailer Legal name of the issuer. COINSPARK ASSET ISSUE AGREEMENT ISSUE DETAILS Variable Name Value Explanation CoinSpark Asset Coupons for CoinSpark Asset Demonstration Full display name of the CoinSpark Asset. Issuer An example retailer

More information

Bitcoin and blockchain from a consumer protection perspective. Dr. Evripides Rizos, European University Cyprus

Bitcoin and blockchain from a consumer protection perspective. Dr. Evripides Rizos, European University Cyprus Bitcoin and blockchain from a consumer protection perspective BITCOINS AND CONSUMER RIGHTS DIRECTIVE (CRD) Is payment with bitcoins an obstacle to the consumer s right to withdraw? Art. 9 16 Consumer Rights

More information

Strategies for a Successful E2E Systems Integration Test. Fiona Charles Let s Test May 9, 2012

Strategies for a Successful E2E Systems Integration Test. Fiona Charles Let s Test May 9, 2012 Strategies for a Successful E2E Systems Integration Test Fiona Charles Let s Test May 9, 2012 This session Describes key project management strategies I have used to manage large- scale Systems Integration

More information

Bitcoin: Regulations and Legal Risks for a New Virtual Currency

Bitcoin: Regulations and Legal Risks for a New Virtual Currency Bitcoin: Regulations and Legal Risks for a New Virtual Currency Presented by: John Casey and Adam Holbrook Copyright 2014 by K&L Gates LLP. All rights reserved. GOALS Learn to speak the Bitcoin language:

More information

Threats to Bitcoin Software

Threats to Bitcoin Software Threats to Bitcoin Software Christian H Kateraas Master of Science in Informatics Submission date: May 2014 Supervisor: Magnus Lie Hetland, IDI Norwegian University of Science and Technology Department

More information

Sia: Simple Decentralized Storage

Sia: Simple Decentralized Storage Sia: Simple Decentralized Storage David Vorick Nebulous Inc. david@nebulouslabs.com Luke Champine Nebulous Inc. luke@nebulouslabs.com November 29, 2014 Abstract The authors introduce Sia, a platform for

More information

The Dark Web. Steven M. Bellovin March 21, 2016 1

The Dark Web. Steven M. Bellovin March 21, 2016 1 The Dark Web Steven M. Bellovin March 21, 2016 1 Tor and the Dark Web There are ways to use the Internet (almost) untraceably This can be used for good purposes or bad purposes Two technologies are necessary,

More information

Security Mechanisms in Bitcoin

Security Mechanisms in Bitcoin Security Mechanisms in Bitcoin Henrik Lovén Joakim Valberg Email: {henlo585, joava054}@student.liu.se Supervisor: Ulf Kargén, {ulf.kargen@liu.se} Project Report for Information Security Course Linköpings

More information

Essays on Bitcoin. By Alex Kroeger With Advisor Professor Tim Fuerst. Abstract:

Essays on Bitcoin. By Alex Kroeger With Advisor Professor Tim Fuerst. Abstract: Essays on Bitcoin By Alex Kroeger With Advisor Professor Tim Fuerst Abstract: The following paper analyzes two distinct topics related to the virtual currency bitcoin. The first is an empirical test of

More information

3. Any medium of exchange (including commodity money) must: a. be easily standardized. b. be widely accepted. c. be divisible. d. be easy to carry.

3. Any medium of exchange (including commodity money) must: a. be easily standardized. b. be widely accepted. c. be divisible. d. be easy to carry. What is Money? This lecture examines the functions of money, the evolution of the payments system, and how money is measured. Functions of Money A. Medium of Exchange 1. Money is any item that is generally

More information

Filecoin: A Cryptocurrency Operated File Storage Network

Filecoin: A Cryptocurrency Operated File Storage Network Filecoin: A Cryptocurrency Operated File Storage Network 1e96a1b27a6cb85df68d728cf3695b0c46dbd44d filecoin.io July 15, 2014 Abstract Filecoin is a distributed electronic currency similar to Bitcoin. Unlike

More information

The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries

The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries The Economics of Bitcoin Mining, or Bitcoin in the Presence of Adversaries Joshua A. Kroll, Ian C. Davey, and Edward W. Felten Princeton University Abstract The Bitcoin digital currency depends for its

More information

Profit-Driven Abuses of Virtual Currencies

Profit-Driven Abuses of Virtual Currencies Profit-Driven Abuses of Virtual Currencies Danny Yuxing Huang Department of Computer Science and Engineering University of California, San Diego dhuang@cs.ucsd.edu ABSTRACT This paper traces the rise of

More information

Innovations in payment technologies and the emergence of digital currencies

Innovations in payment technologies and the emergence of digital currencies 1 Quarterly Bulletin 2014 Q3 Innovations in payment technologies and the emergence of digital currencies By Robleh Ali of the Bank s Financial Market Infrastructure Directorate, John Barrdear of the Bank

More information

SecureCom Mobile s mission is to help people keep their private communication private.

SecureCom Mobile s mission is to help people keep their private communication private. About SecureCom Mobile SecureCom Mobile s mission is to help people keep their private communication private. We believe people have a right to share ideas with each other, confident that only the intended

More information

A Protocol for Microtransactions

A Protocol for Microtransactions A Protocol for Microtransactions Using Bitcoin With a Medieval Money Contract Jarl Fransson, Strawpay AB September 24, 2015, ver. 1.2 Abstract This document presents the Stroem payment system which offers

More information

May 2013 Report. Vircurex

May 2013 Report. Vircurex May 2013 Report Vircurex Page 2 Summary The month of May, our first 3 months of operation, has seen the following main events: March to April total collected trading fees of ~500BTC Addition of further

More information

Bitmessage: A Peer to Peer Message Authentication and Delivery System

Bitmessage: A Peer to Peer Message Authentication and Delivery System Bitmessage: A Peer to Peer Message Authentication and Delivery System Jonathan Warren jonathan@bitmessage.org www.bitmessage.org November 27, 2012 Abstract. We propose a system that allows users to securely

More information

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Using etoken for SSL Web Authentication. SSL V3.0 Overview Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents

More information

The Impact of Computer Engineering 1. The Impact of Computer Engineering Oakland University Andrew Nassif 11/21/2015

The Impact of Computer Engineering 1. The Impact of Computer Engineering Oakland University Andrew Nassif 11/21/2015 The Impact of Computer Engineering 1 The Impact of Computer Engineering Oakland University Andrew Nassif 11/21/2015 The Impact of Computer Engineering 2 Introduction My research project included: Talking

More information

The Bitcoin Backbone Protocol: Analysis and Applications

The Bitcoin Backbone Protocol: Analysis and Applications The Bitcoin Backbone Protocol: Analysis and Applications Juan A. Garay Yahoo Labs garay@yahoo-inc.com Aggelos Kiayias University of Athens aggelos@di.uoa.gr Nikos Leonardos LIAFA, Université Paris Diderot

More information

BITCOIN INVESTMENT TRUST A Delaware Trust OTC MARKETS GROUP INFORMATION AND DISCLOSURE STATEMENT

BITCOIN INVESTMENT TRUST A Delaware Trust OTC MARKETS GROUP INFORMATION AND DISCLOSURE STATEMENT BITCOIN INVESTMENT TRUST A Delaware Trust Sponsored by Grayscale Investments, LLC 636 Avenue of the Americas New York, New York 10011 Telephone: (212) 668-6682 Facsimile: (917) 677-8691 Primary Standard

More information

VIRTUAL CURRENCIES. Emerging Regulatory, Law Enforcement, and Consumer Protection Challenges

VIRTUAL CURRENCIES. Emerging Regulatory, Law Enforcement, and Consumer Protection Challenges United States Government Accountability Office Report to the Committee on Homeland Security and Governmental Affairs, U.S. Senate May 2014 VIRTUAL CURRENCIES Emerging Regulatory, Law Enforcement, and Consumer

More information

Advanced File Integrity Monitoring for IT Security, Integrity and Compliance: What you need to know

Advanced File Integrity Monitoring for IT Security, Integrity and Compliance: What you need to know Whitepaper Advanced File Integrity Monitoring for IT Security, Integrity and Compliance: What you need to know Phone (0) 161 914 7798 www.distology.com info@distology.com detecting the unknown Integrity

More information

State-Sponsored Cryptocurrency: Adapting the best of Bitcoin s Innovation to the Payments Ecosystem

State-Sponsored Cryptocurrency: Adapting the best of Bitcoin s Innovation to the Payments Ecosystem State-Sponsored Cryptocurrency: Adapting the best of Bitcoin s Innovation to the Payments Ecosystem The Bitcoin Buzz Bitcoin, the most popular virtual currency in the market today, continues to draw significant

More information

Bit Chat: A Peer-to-Peer Instant Messenger

Bit Chat: A Peer-to-Peer Instant Messenger Bit Chat: A Peer-to-Peer Instant Messenger Shreyas Zare shreyas@technitium.com https://technitium.com December 20, 2015 Abstract. Bit Chat is a peer-to-peer instant messaging concept, allowing one-to-one

More information

Blockchain, Throughput, and Big Data Trent McConaghy

Blockchain, Throughput, and Big Data Trent McConaghy Blockchain, Throughput, and Big Data Trent McConaghy Bitcoin Startups Berlin Oct 28, 2014 Conclusion Outline Throughput numbers Big data Consensus algorithms ACID Blockchain Big data? Throughput numbers

More information

sveriges riksbank economic review 2014:2 Björn Segendorf holds a Ph.D. in economics and works at the Riksbank s Financial Stability Department.

sveriges riksbank economic review 2014:2 Björn Segendorf holds a Ph.D. in economics and works at the Riksbank s Financial Stability Department. What is Bitcoin? Björn Segendorf* Björn Segendorf holds a Ph.D. in economics and works at the Riksbank s Financial Stability Department. Bitcoin is a so-called virtual currency that has been devised for

More information

The Australian Digital Currency Commerce Association. Submission to the Financial System Inquiry

The Australian Digital Currency Commerce Association. Submission to the Financial System Inquiry The Australian Digital Currency Commerce Association Submission to the Financial System Inquiry Digital currencies and Bitcoin A proposed self-regulatory model for Australia 29 August 2014 www.gtlaw.com.au

More information

Bitcoin: Assessing the Tax Implications Associated with the IRS s Notice Deeming Virtual Currencies Property

Bitcoin: Assessing the Tax Implications Associated with the IRS s Notice Deeming Virtual Currencies Property 2014-2015 DEVELOPMENTS IN BANKING LAW 451 VI. Bitcoin: Assessing the Tax Implications Associated with the IRS s Notice Deeming Virtual Currencies Property A. Introduction Recently, there has been considerable

More information

ARE BITCOINS MONEY? An Undergraduate Research Scholars Thesis BENJAMIN NADEAU

ARE BITCOINS MONEY? An Undergraduate Research Scholars Thesis BENJAMIN NADEAU ARE BITCOINS MONEY? An Undergraduate Research Scholars Thesis by BENJAMIN NADEAU Submitted to Honors and Undergraduate Research Texas A&M University in partial fulfillment of the requirements for the designation

More information

Mobile Wallet Platform. Next generation mobile wallet solution

Mobile Wallet Platform. Next generation mobile wallet solution Mobile Wallet Platform Next generation mobile wallet solution Introduction to mwallet / Mobile Wallet Mobile Wallet Account is just like a Bank Account User s money lies with the Mobile Wallet Operator

More information

Dani Brunstein Intel Israel November 2014

Dani Brunstein Intel Israel November 2014 Dani Brunstein Intel Israel November 2014 Agenda Mutual Introduction, Target and Disclaimer Quick intro on cryptocurrencies and Bitcoin Rate of global acceptance Understanding the Why Disruptive Market

More information

DRAFT P2P TRADING OF BITCOIN PAGE 1

DRAFT P2P TRADING OF BITCOIN PAGE 1 Creating a Peer to Peer System for Buying and Selling Bitcoin Online DRAFT.1 By Rizwan Virk, 2013 riz@alum.mit.edu Table of Contents Introduction... 2 Overview of the Problem... 3 Parts of a Transaction....

More information

GADGETCOIN (GDC): SECURE SMART CONTRACTS FOR DECENTRALISED INTERNET-OF-THINGS DEVICES

GADGETCOIN (GDC): SECURE SMART CONTRACTS FOR DECENTRALISED INTERNET-OF-THINGS DEVICES GADGETCOIN (GDC): SECURE SMART CONTRACTS FOR DECENTRALISED INTERNET-OF-THINGS DEVICES developers@gadgetcoin.org Contents Abstract... 3 Background... 3 Security... 3 Data Control... 4 Standards... 4 Payment

More information

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus

COMP-530 Cryptographic Systems Security *Requires Programming Background. University of Nicosia, Cyprus COMP-530 Cryptographic Systems Security *Requires Programming Background University of Nicosia, Cyprus Course Code Course Title ECTS Credits COMP-530 Cryptographic Systems 10 Security Department Semester

More information

Building an Anonymous Public Storage Utility Wesley Leggette Cleversafe

Building an Anonymous Public Storage Utility Wesley Leggette Cleversafe Building an Anonymous Public Storage Utility Wesley Leggette Cleversafe Utility Storage r Many different target audiences r Business r Content distribution r Off-site backup r Archival r Consumer r Content

More information

Office of the State Bank Commissioner Guidance Document MT 2014-01

Office of the State Bank Commissioner Guidance Document MT 2014-01 Office of the State Bank Commissioner Guidance Document MT 2014-01 Date: June 6, 2014 Regulatory Treatment of Virtual Currencies Under the Kansas Money Transmitter Act Purpose The purpose of this guidance

More information

Engaging title in Green Descriptive element in Blue 2 lines if needed

Engaging title in Green Descriptive element in Blue 2 lines if needed Blockchain Disrupting the Financial Services Industry? Engaging title in Green Descriptive element in Blue 2 lines if needed Second line optional lorem ipsum B Subhead lorem ipsum, date quatueriure One

More information

bi on Solution white paper

bi on Solution white paper bi on Solution white paper Billon Solution Overview Despite concerted efforts for years, cash has not yet been eliminated. Mostly because not everyone has a bank account and debit card - an estimated 2.5

More information

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

SY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped

More information

Why buy when you can rent? Bribery attacks on Bitcoin-style consensus

Why buy when you can rent? Bribery attacks on Bitcoin-style consensus Why buy when you can rent? Bribery attacks on Bitcoin-style consensus Joseph Bonneau Stanford University & Electronic Frontier Foundation Abstract. The Bitcoin cryptocurrency introduced a novel distributed

More information

IoT Babelchain. Proof of Understanding. How Machines learn to communicate

IoT Babelchain. Proof of Understanding. How Machines learn to communicate IoT Babelchain Proof of Understanding How Machines learn to communicate Benedikt Herudek (benedikt.herudek@gmail.com) April2016 Linux Foundation Open IoT Abstract Having Machines talk to each other is

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure

More information

StartPeeps.com The Start Of A New Social Era

StartPeeps.com The Start Of A New Social Era StartPeeps.com The Start Of A New Social Era Introduction Something is wrong with the internet today. Companies like Facebook, Google, Ebay, Paypal and numerous others make billions of dollars every month.

More information

FEEDBACK BASED REPUTATION ON TOP OF THE

FEEDBACK BASED REPUTATION ON TOP OF THE FEEDBACK BASED REPUTATION ON TOP OF THE BITCOIN BLOCKCHAIN Davide Carboni Information Society Department, CRS4, Loc. Piscina Manna, Pula, Italy dcarboni@crs4.it ABSTRACT The ability to assess the reputation

More information

Retirement Plan and IRA Investment in Bitcoin and Other Cryptocurrencies

Retirement Plan and IRA Investment in Bitcoin and Other Cryptocurrencies Retirement Plan and IRA Investment in Bitcoin and Other Cryptocurrencies February 27, 2014 Arthur H. Kohn, Cleary Gottlieb Steen & Hamilton LLP Howard Pianko, Seyfarth Shaw LLP Antonis Polemitis, Ledra

More information

DECENT Whitepaper. Matej Michalko m@decent.ch Josef Sevcik josef@decent.ch. November 2015 v 0.0.2

DECENT Whitepaper. Matej Michalko m@decent.ch Josef Sevcik josef@decent.ch. November 2015 v 0.0.2 DECENT Whitepaper Matej Michalko m@decent.ch Josef Sevcik josef@decent.ch November 2015 v 0.0.2 Table of Contents 1. Introduction 2. The Blokchain Era 3. Manipulation and Freedom of Speech 4. Historical

More information

Merchant Pack. 2013, 2014 Prypto

Merchant Pack. 2013, 2014 Prypto Merchant Pack 2013, 2014 Prypto Contents Contents... 2 What is Prypto?... Error! Bookmark not defined. Business Opportunity... 3 Current Solutions... 3 B2C Opportunity... Error! Bookmark not defined. B2B

More information

Centrally Banked Cryptocurrencies

Centrally Banked Cryptocurrencies Centrally Banked Cryptocurrencies George Danezis University College London g.danezis@ucl.ac.uk Sarah Meiklejohn University College London s.meiklejohn@ucl.ac.uk Abstract Current cryptocurrencies, starting

More information

Credit Card Market Study Interim Report: Annex 4 Switching Analysis

Credit Card Market Study Interim Report: Annex 4 Switching Analysis MS14/6.2: Annex 4 Market Study Interim Report: Annex 4 November 2015 This annex describes data analysis we carried out to improve our understanding of switching and shopping around behaviour in the UK

More information

A Security Review of an Anonymous Peer-to-Peer File Transfer Protocol

A Security Review of an Anonymous Peer-to-Peer File Transfer Protocol A Security Review of an Anonymous Peer-to-Peer File Transfer Protocol Bryan Lipinski, Patrick MacAlpine [lipinski,patmac]@rice.edu Abstract This paper examines the overall security of AP3 [2] (Anonymous

More information

E-money Niche market that might be expanding

E-money Niche market that might be expanding Banking & Technology Snapshot Digital economy and structural change May 11, 212 Author Meta Zähres +49 69 91-31444 meta.zaehres@db.com Editor Bernhard Speyer Deutsche Bank AG DB Research Frankfurt am Main

More information

Simulation and Risk Analysis

Simulation and Risk Analysis Simulation and Risk Analysis Using Analytic Solver Platform REVIEW BASED ON MANAGEMENT SCIENCE What We ll Cover Today Introduction Frontline Systems Session Ι Beta Training Program Goals Overview of Analytic

More information

For your consideration Senate Economics References Committee - inquiry into digital currency

For your consideration Senate Economics References Committee - inquiry into digital currency Committee Secretary Senate Economics Committee PO Box 6100 Parliament House CANBERRA ACT 2600 Reply to: GPO Box 9977 MELBOURNE VIC 3001 Contact officer: Jonathan Woodger Phone: 13 28 69 Fax: 03 9285 1943

More information

Namecoin as alternative to the Domain Name System

Namecoin as alternative to the Domain Name System Namecoin as alternative to the Domain Name System Xander Lammertink Author, UvA System and Network Engineering xander.lammertink@os3.nl Marco Davids Supervisor, SIDN Labs Abstract: This paper researches

More information

Framework of e-commerce

Framework of e-commerce Framework of e-commerce Alka Arora Lecturer, Department of CSE/IT, Amritsar College of Engg.& Tech,Amritsar.143 001, Punjab, India, E-mail :alka_411 @rediffmail.com. Abstract This paper provides a detailed

More information

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT

Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code

More information

Risks and Challenges Associated with Bitcoin Transaction Monitoring for AML

Risks and Challenges Associated with Bitcoin Transaction Monitoring for AML August 2015 Risks and Challenges Associated with Bitcoin Transaction Monitoring for AML Olivia Greene, Senior Consultant Risk Advisory Why does Bitcoin present such an emergent risk to law enforcement

More information

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24

CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24 Introduction to Computer Networks Lecture24 Network security (continued) Key distribution Secure Shell Overview Authentication Practical issues Firewalls Denial of Service Attacks Definition Examples Key

More information

Designing a Secure Client-Server System Master of Science Thesis in the Programme Software Engineering & Technology

Designing a Secure Client-Server System Master of Science Thesis in the Programme Software Engineering & Technology Designing a Secure Client-Server System Master of Science Thesis in the Programme Software Engineering & Technology FREDRIK ANDERSSON Department of Computer Science and Engineering CHALMERS UNIVERSITY

More information

Digital Cash. is not a check, credit card or a debit card. They leave audit trails. can be sent through computer networks.

Digital Cash. is not a check, credit card or a debit card. They leave audit trails. can be sent through computer networks. Digital Cash is not a check, credit card or a debit card. They leave audit trails. is anonymous and untraceable. can be sent through computer networks. can be used off-line (not connected to a bank). is

More information

There s No Free Lunch, Even Using Bitcoin: Tracking the Popularity and Profits of Virtual Currency Scams

There s No Free Lunch, Even Using Bitcoin: Tracking the Popularity and Profits of Virtual Currency Scams 1 There s No Free Lunch, Even Using Bitcoin: Tracking the Popularity and Profits of Virtual Currency Scams Marie Vasek and Tyler Moore Computer Science and Engineering Department Southern Methodist University,

More information

FORWARD: Standards-and-Guidelines-Process.pdf. 1 http://www.nist.gov/public_affairs/releases/upload/vcat-report-on-nist-cryptographic-

FORWARD: Standards-and-Guidelines-Process.pdf. 1 http://www.nist.gov/public_affairs/releases/upload/vcat-report-on-nist-cryptographic- NIST Cryptographic Standards and Guidelines: A Report to the NIST Visiting Committee on Advanced Technology Regarding Recommendations to Improve NIST s Approach FORWARD: In July 2014, the National Institute

More information

Computer Algorithms. NP-Complete Problems. CISC 4080 Yanjun Li

Computer Algorithms. NP-Complete Problems. CISC 4080 Yanjun Li Computer Algorithms NP-Complete Problems NP-completeness The quest for efficient algorithms is about finding clever ways to bypass the process of exhaustive search, using clues from the input in order

More information