[et_pb_section bb_built=”1″][et_pb_row][et_pb_column type=”4_4″][et_pb_text _builder_version=”3.13.1″]

According to Ehrenhofer: Although it is usually said that transactions made with cryptocurrencies can be anonymous, there is a trail of information that can lead researchers or attackers to obtain the IP address of the users of these networks.

The analysis of IP metadata is not something new, and has tried to resolve using the privacy features of Tor, particularly in the case of Bitcoin Core. In this case, the metadata is handled privately with the browser, raising the level of anonymity of the person who executes the transactions.

It is much more important to hide information in the layer of the block chain, since this information is accessible to all the time. Meanwhile, the information leaked in the transmission of your transaction is only revealed to a few selected individuals, and only the attackers (independent, ISP, nation-states) or researchers will record this information. If I make a payment in person in a cafe with bitcoin or another transparent cryptocurrency, Tor will not help me hide my balance from the merchant. Taking this into account, Ehrenhofer was in charge of showing the number of nodes that must be controlled by the attackers to have the possibility of seizing the metadata of the users, both in Monero, cryptocurrency focused on privacy, and in Bitcoin. Monero has approximately 3,200 nodes and, since the monerod is connected to 8 nodes by default, an attacker only needs to seize at least 1 out of every 8 connections, and can obtain a considerable amount of information with a relatively small amount.

In the case of Bitcoin, which currently has almost 10,000 nodes, and since the Bitcoin Core client, the most widely deployed in this chain, also makes 8 outgoing connections by default, an attacker would have to control about 1,000 nodes to connect to half of all the nodes directly and collect the metadata. In both cases, an attacker or group of attackers that could compromise just over 10% of the nodes in the network would have direct access to the metadata managed by at least half of the network, so that it could track and establish directional links IP between users and their transactions. This could lead to full identification of these users.

However, this was a theoretical exercise by Ehrenhofer, who pointed out that server hosting companies like Amazon and Digital Ocean probably control a notable percentage of all the nodes in the network, so they could be a target for an attack of this nature. In addition, he warned that this type of attack becomes especially powerful when the attackers control around 20% or more of the total number of nodes in the network, although the investment of resources that should be made could minimize this possibility.

Source: www.criptonoticias.com

Make your best investment now, with the cryptocurrency of the immortals “iCashweb”.

[/et_pb_text][/et_pb_column][/et_pb_row][/et_pb_section]