An inquiry into money laundering tools in the Bitcoin ecosystem
- 1 September 2013
- conference paper
- conference paper
- Published by Institute of Electrical and Electronics Engineers (IEEE)
Abstract
We provide a first systematic account of opportunities and limitations of anti-money laundering (AML) in Bitcoin, a decentralized cryptographic currency proliferating on the Internet. Our starting point is the observation that Bitcoin attracts criminal activity as many say it is an anonymous transaction system. While this claim does not stand up to scrutiny, several services offering increased transaction anonymization have emerged in the Bitcoin ecosystem - such as Bitcoin Fog, BitLaundry, and the Send Shared functionality of Blockchain.info. Some of these services routinely handle the equivalent of 6-digit dollar amounts. In a series of experiments, we use reverse-engineering methods to understand the mode of operation and try to trace anonymized transactions back to our probe accounts. While Bitcoin Fog and Blockchain.info successfully anonymize our test transactions, we can link the input and output transactions of BitLaundry. Against the backdrop of these findings, it appears unlikely that a Know-Your-Customer principle can be enforced in the Bitcoin system. Hence, we sketch alternative AML strategies accounting for imperfect knowledge of true identities but exploiting public information in the transaction graph, and discuss the implications for Bitcoin as a decentralized currency.Keywords
This publication has 21 references indexed in Scilit:
- Structure and Anonymity of the Bitcoin Transaction GraphFuture Internet, 2013
- Evaluating User Privacy in BitcoinLecture Notes in Computer Science, 2013
- Quantitative Analysis of the Full Bitcoin Transaction GraphLecture Notes in Computer Science, 2013
- Fast unfolding of communities in large networksJournal of Statistical Mechanics: Theory and Experiment, 2008
- Attacking Unlinkability: The Importance of ContextPublished by Springer Science and Business Media LLC ,2007
- Towards Measuring AnonymityLecture Notes in Computer Science, 2003
- Towards an Information Theoretic Metric for AnonymityLecture Notes in Computer Science, 2003
- The Sybil AttackLecture Notes in Computer Science, 2002
- Untraceable Electronic CashLecture Notes in Computer Science, 1990
- Untraceable electronic mail, return addresses, and digital pseudonymsCommunications of the ACM, 1981