1 code implementation • 23 Jan 2018 • Husam Al Jawaheri, Mashael Al Sabah, Yazan Boshmaf, Aiman Erbad
We investigate the feasibility of deanonymizing users of Tor hidden services who rely on Bitcoin as a payment method by exploiting public information leaked from online social networks, the Blockchain, and onion websites.
Cryptography and Security