Skip to main content

Showing 1–4 of 4 results for author: Pustogarov, I

Searching in archive cs. Search in all archives.
.
  1. arXiv:1709.06837  [pdf, other

    cs.NI

    Towards Better Understanding of Bitcoin Unreachable Peers

    Authors: Liang Wang, Ivan Pustogarov

    Abstract: The bitcoin peer-to-peer network has drawn significant attention from researchers, but so far has mostly focused on publicly visible portions of the network, i.e., publicly reachable peers. This mostly ignores the hidden parts of the network: unreachable Bitcoin peers behind NATs and firewalls. In this paper, we characterize Bitcoin peers that might be behind NATs or firewalls from different persp… ▽ More

    Submitted 20 September, 2017; originally announced September 2017.

    Comments: 7 pages, 10 figures, 8 tables

  2. arXiv:1410.6079  [pdf, other

    cs.CR

    Bitcoin over Tor isn't a good idea

    Authors: Alex Biryukov, Ivan Pustogarov

    Abstract: Bitcoin is a decentralized P2P digital currency in which coins are generated by a distributed set of miners and transaction are broadcasted via a peer-to-peer network. While Bitcoin provides some level of anonymity (or rather pseudonymity) by encouraging the users to have any number of random-looking Bitcoin addresses, recent research shows that this level of anonymity is rather low. This encourag… ▽ More

    Submitted 7 January, 2015; v1 submitted 22 October, 2014; originally announced October 2014.

    Comments: 11 pages, 4 figures, 4 tables

  3. arXiv:1405.7418  [pdf, other

    cs.CR

    Deanonymisation of clients in Bitcoin P2P network

    Authors: Alex Biryukov, Dmitry Khovratovich, Ivan Pustogarov

    Abstract: Bitcoin is a digital currency which relies on a distributed set of miners to mint coins and on a peer-to-peer network to broadcast transactions. The identities of Bitcoin users are hidden behind pseudonyms (public keys) which are recommended to be changed frequently in order to increase transaction unlinkability. We present an efficient method to deanonymize Bitcoin users, which allows to link u… ▽ More

    Submitted 5 July, 2014; v1 submitted 28 May, 2014; originally announced May 2014.

    Comments: 15 pages, 12 figures

  4. arXiv:1308.6768  [pdf, other

    cs.CR

    Content and popularity analysis of Tor hidden services

    Authors: Alex Biryukov, Ivan Pustogarov, Fabrice Thill, Ralf-Philipp Weinmann

    Abstract: Tor hidden services allow running Internet services while protecting the location of the servers. Their main purpose is to enable freedom of speech even in situations in which powerful adversaries try to suppress it. However, providing location privacy and client anonymity also makes Tor hidden services an attractive platform for every kind of imaginable shady service. The ease with which Tor hidd… ▽ More

    Submitted 17 November, 2014; v1 submitted 30 August, 2013; originally announced August 2013.

    Comments: 6 pages, 3 figures, 2 tables

    MSC Class: C.2.0; K.6.5