This course explores the risks and vulnerabilities associated with using Bitcoin over Tor. By the end of the course, learners will understand the potential attack vectors that can compromise user anonymity and control information flows. The course covers topics such as isolating transactions, fingerprinting users, and proposing solutions to mitigate these risks. The intended audience for this course includes individuals interested in cybersecurity, privacy, and the intersection of cryptocurrency and anonymity. The teaching method involves presenting research findings and discussing potential threats and countermeasures in a concise 22-minute session.
Overview
Syllabus
Intro
Background
How to Isolate
How to Fingerprint
The Respond Problem
The Problem
Solutions
Taught by
IEEE Symposium on Security and Privacy