R.I.P.
π»
Ghosted
Tutela: An Open-Source Tool for Assessing User-Privacy on Ethereum and Tornado Cash
January 18, 2022 Β· Entered Twilight Β· π arXiv.org
Repo contents: .gitignore, NOTES.md, README.md, appspec.yml, data, init_env.sh, live, requirements.txt, scripts, src, webapp, whitepaper
Authors
Mike Wu, Will McTighe, Kaili Wang, Istvan A. Seres, Nick Bax, Manuel Puebla, Mariano Mendez, Federico Carrone, TomΓ‘s De Mattey, Herman O. Demaestri, Mariano Nicolini, Pedro Fontana
arXiv ID
2201.06811
Category
cs.CR: Cryptography & Security
Cross-listed
cs.LG
Citations
28
Venue
arXiv.org
Repository
https://github.com/TutelaLabs/tutela-app
β 131
Last Checked
1 month ago
Abstract
A common misconception among blockchain users is that pseudonymity guarantees privacy. The reality is almost the opposite. Every transaction one makes is recorded on a public ledger and reveals information about one's identity. Mixers, such as Tornado Cash, were developed to preserve privacy through "mixing" transactions with those of others in an anonymity pool, making it harder to link deposits and withdrawals from the pool. Unfortunately, it is still possible to reveal information about those in the anonymity pool if users are not careful. We introduce Tutela, an application built on expert heuristics to report the true anonymity of an Ethereum address. In particular, Tutela has three functionalities: first, it clusters together Ethereum addresses based on interaction history such that for an Ethereum address, we can identify other addresses likely owned by the same entity; second, it shows Ethereum users their potentially compromised transactions; third, Tutela computes the true size of the anonymity pool of each Tornado Cash mixer by excluding potentially compromised transactions. A public implementation of Tutela can be found at https://github.com/TutelaLabs/tutela-app. To use Tutela, visit https://www.tutela.xyz.
Community Contributions
Found the code? Know the venue? Think something is wrong? Let us know!
π Similar Papers
In the same crypt β Cryptography & Security
R.I.P.
π»
Ghosted
Membership Inference Attacks against Machine Learning Models
R.I.P.
π»
Ghosted
The Limitations of Deep Learning in Adversarial Settings
R.I.P.
π»
Ghosted
Practical Black-Box Attacks against Machine Learning
R.I.P.
π»
Ghosted
Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks
R.I.P.
π»
Ghosted