Mysterious entity may be collecting BTC users' IP addresses — Bitcoin developer

2 years ago

An chartless idiosyncratic oregon radical whitethorn beryllium collecting the IP addresses of Bitcoin (BTC) users and linking them to their BTC addresses, violating the privateness of these users, according to a blog station from pseudonymous Bitcoin app developer 0xB10C. The entity has been progressive since March 2018, and its IP addresses person shown up connected respective nationalist posts from Bitcoin node operators implicit the past respective years.

0xB10C is the developer of respective Bitcoin analytics websites, including Mempool.observer and Transactionfee.info. They person besides been awarded a Bitcoin developer assistance from Brink.dev successful the past.

An entity I telephone LinkingLion, progressive since 2018 and connected a Monero banlist, is opening connections to galore clearnet Bitcoin nodes. Its presumably attempting to nexus transactions to node IPs. Maybe a concatenation investigation institution trying to heighten its product?https://t.co/W4PDoln3p3

— 0xB10C (@0xB10C) March 28, 2023

0xB10C calls the entity “LinkingLion” due to the fact that the IP addresses associated with it walk done LionLink network's colocation information center. However, ARIN and RIPE registry accusation uncover that this institution is astir apt not the originator of the messages, according to 0xB10C.

The entity uses a scope of 812 antithetic IP addresses to unfastened connections with Bitcoin afloat nodes that are disposable connected the web (also called “listening nodes”). Once it opens a connection, the entity asks the node which mentation of the Bitcoin bundle it is using. However, erstwhile the node responds with a mentation fig and connection stating that it has understood the request, the entity closes its transportation astir 85% of the clip without responding.

According to the post, this behaviour whitethorn bespeak that the entity is trying to find if a peculiar node tin beryllium reached astatine a peculiar IP address.

While this behaviour isn’t needfully a origin for concern, it’s what the entity does the different 15% of the clip that whitethorn beryllium a concern. 0xB10C stated that astir 15% of the time, LinkingLion doesn’t adjacent the transportation immediately. Instead, they either perceive for inventory messages that incorporate transactions oregon nonstop a petition for an code and perceive for some inventory and code messages. They past adjacent the transportation wrong 10 minutes.

This behaviour would usually bespeak that the idiosyncratic is simply a node trying to update its transcript of the blockchain. However, LinkingLion ne'er requests blocks oregon transactions, which implies that they indispensable beryllium pursuing immoderate different purpose, the station said.

Related: Zero-knowledge proofs are coming to Bitcoin

0xB10C stated that LinkingLion mightiness beryllium signaling the timing of transactions to find which node archetypal received a transaction, which tin past beryllium utilized to find the IP code associated with a peculiar Bitcoin address, arsenic they explained:

Connections that implicit the mentation handshake and enactment connected larn astir our node’s inventory, similar transactions and blocks. The timing information, i.e., erstwhile a node announces its caller inventory, is particularly relevant. The entity is apt to archetypal learns astir our caller wallet transaction from us. As the entity is connected to galore listening nodes, it tin usage that accusation to nexus broadcast transactions to IP addresses.

To assistance support the assemblage from this privateness threat, 0xB10C has produced an open-source prohibition database that nodes tin instrumentality to prohibition LinkingLion from connecting to them. However, helium besides warned that the entity could get astir this prohibition database by changing the IP addresses it uses to connect. In 0xB10C’s view, the lone imperishable solution to the occupation is to alteration the transaction logic wrong Bitcoin Core, which developers person truthful acold been incapable to do.

The vulnerability exposed successful the station seems to chiefly impact users moving their ain Bitcoin nodes. 0xB10C did not accidental whether it besides affects mean users relying connected Electrum oregon different Bitcoin wallets that link to third-party nodes, nor did they accidental whether users tin support against the onslaught utilizing a virtual backstage network. Cointelegraph has reached retired to 0xB10C connected LinkedIn to get answers to these questions but was incapable to scope them by the clip of publication.

Privacy has been a continuing interest for Bitcoin and crypto users implicit the years. Although Bitcoin addresses are pseudonymous, their transaction histories are wholly public. Bitcoin pedagogue Andreas Antonopoulos has argued that Bitcoin will ne'er beryllium genuinely private. But Breeze Wallet has attempted to improve privateness connected the web by utilizing offchain transactions and cryptographic puzzles.

View source