>> (p.1)
    Author Topic: Breaking Mixing Services  (Read 1919 times)
    This is a self-moderated topic. If you do not want to be moderated by the person who started this topic, create a new topic.
    madu (OP)
    Copper Member
    Newbie
    *
    Offline Offline

    Activity: 11
    Merit: 325


    View Profile
    March 05, 2019, 09:30:35 PM
    Last edit: March 16, 2019, 03:13:12 PM by madu
    Merited by ABCbits (100), hugeblack (55), LoyceV (42), dbshck (18), Welsh (10), 1miau (10), vapourminer (4), suchmoon (4), Abiky (4), DarkStar_ (4), DdmrDdmr (3), Halab (3), joniboini (3), BitMaxz (2), Husna QA (2), bones261 (2), Synchronice (2), mocacinno (1), klarki (1), Lucius (1), jojo69 (1), HeRetiK (1), Pmalek (1), mk4 (1), LeGaulois (1), o_e_l_e_o (1), m2017 (1), AdolfinWolf (1), vv181 (1), RapTarX (1), Naster (1), Farul (1)
     #1

    Hey,
    more than a year ago I wrote my bachelor thesis about mixing services/anonymous bitcoin transactions (yes, bitcoin is pseudonymous).
    I found some trivial bugs (timing attacks, leakages, xss, ...) through which nearly all relevant centralized bitcoin mixing services could be broken. Based on outgoing mixing transactions (transactions sent by the mixer) I was able to identify the correct incoming transactions sent by customers (vice versa).
    My thesis is quite easy to understand and the bugs are also trivial, however, at the time of writing, I did not find any specific work related to these problems.

    The most important conclusion of my work is, that even though a mixing service/a mixing algorithm might seem to be reliable at the moment, through a single leak/implementation fault, an attacker could be able to deanonymize any past transaction which has been processed by the mixing services. Even though the leak/implementation fault gets fixed by the service, every transaction which has been processed prior to the fix is irreversible vulnerable.

    bitmixer.io & coinmixer.se are offline now, however its still possible to use the bugs I describe in my thesis to reverse nearly all transactions which have ever been processed by these services.
    In my thesis, I attacked coinmixer.se (at the time of writing it was the biggest centralized mixing service), however - except chipmixer.com1 - every other centralized mixing service I checked could be broken in a similar fashion.


    If there is interest in this topic, I can publish further information (source-codes, examples, ..) on this topic and attacks.


    Link to my thesis (python source inside): https://www.dropbox.com/s/3yapwyfz72tvswh/BA_mixing_services.pdf?dl=0

    Author: Felix Maduakor
    Email: felix.maduakor@rub.de

    1 Chipmixer was the only centralized mixing service which I did not break fully. However, I did not put much work into checking this mixing service.
Page 1
Viewing Page: 1