HomeCoinsBitcoinThe Spiral Scroll: Wallet Clustering Basics

The Spiral Scroll: Wallet Clustering Basics

-


The Bitcoin transaction graph has various observable patterns, with wallet clustering of highest importance. Some of these patterns have been studied and used to link coins from the same wallet, both in theory and practice.

Every transaction consists of a list of inputs (where the sats are taken from) and outputs (where the input sats are distributed). Inputs refer to the outputs of previous transactions, such as connecting transactions. Outputs lock some amount of bitcoin with certain spending conditions (i.e., the “address,” public key, or output script). Linking coins means identifying the entity that controls the keys to a collection of transaction outputs, spent or unspent.

Section 10 of the Bitcoin white paper, “Privacy,” briefly discusses linking:

“A new key pair should be used for each transaction to keep them from being linked to a common owner.”

When the same public key controls more than one coin, these coins are trivially linked since only one entity is supposed to know the private key.

However, address reuse is not the only concern. The paper continues:

“Some linking is still unavoidable with multi-input transactions, which necessarily reveal that their inputs were owned by the same owner.”

This is often referred to as the “common input ownership heuristic,” CIOH, or the “multi-input heuristic.” It’s only a heuristic because, unlike the implication in the quote above, counterexamples exist. Although it isn’t always true, it often is.

Over the years, more sophisticated methods for clustering have been developed, for example, telling apart change outputs from payments or using larger structures in the transaction graph than just individual transactions. Some of these have been described in academic work, while others remain proprietary. Improved methods can link to more coins or avoid so-called “cluster collapse,” where coins belonging to different users are incorrectly connected. Commercial offerings often benefit from additional sources of information, such as KYC data; they don’t necessarily depend on just the privacy leaks that occur in the Bitcoin protocol, but clustering is still the central theme.

This motivates an adversarial framing of privacy, where a deanonymization attack attempts to assign coins to clusters. From this perspective, defending privacy means making it more difficult for the adversary to succeed in correctly assigning coins to clusters. The most notable examples involve collaborative transaction construction, whether it is overtly difficult to guess, as in CoinJoin, or covertly as in PayJoin, or perhaps most prominently, just a part of how the software works as with Lightning node transactions. In all cases, the simplistic assumption of common ownership breaks down, necessitating a more nuanced analysis.

The adversarial framing also makes it explicit that different adversaries have different capabilities, with the appropriate adversarial model depending on the user’s threat model: Are you more worried about surveillance by an oppressive government or snooping by your transactions’ counterparties?

Originally published on the Spiral Substack.



Source link

News source: The Spiral Scroll: Wallet Clustering Basics
Read the full article and more directly from the source!

Enjoying our initiative? Support us with a BTC donation:
BTC Wallet: bc1q0faa2d4j9ezn29uuf7c57znsm5ueqwwfqw9gde

LATEST POSTS

How The IMF Prevents Global Bitcoin Adoption (And Why They Do It)

The Global Pattern In recent years the IMF has: Successfully pressured El Salvador to (de facto) drop Bitcoin as legal tender, and rollback other Bitcoin policies Successfully...

Trump Punts on Crypto Divestment, Says If US Didn’t Have Bitcoin ‘China Would’

President Donald Trump dodged a question about his willingness to divest from his personal crypto ventures Friday, maintaining that he was interested in crypto...

Will Circle and Tether Soon Face Thousands of Stablecoin Competitors? Unlikely, Says Moody’s

In brief Lawmakers and crypto industry leaders have argued stablecoins will redefine the U.S. economy once relevant legislation passes. A senior Moody's analyst doubts swarms...

Crypto Fueling Weapons Programs for Sanctioned States: FATF

In brief A new FATF report claims that crypto use by sanctioned states has grown exponentially. Stolen virtual assets, including $1.5B from ByBit, have funded North...

Most Popular

spot_img