Percolation framework reveals limits of privacy in conspiracy, dark web, and blockchain networks
Abstract We consider the limits of privacy based on the knowledge of interactions in anonymous networks. In many anonymous networks, such as blockchain cryptocurrencies, dark web message boards, and other illicit networks, nodes are anonymous to outsiders, however the existence of a link between ind...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
SpringerOpen
2023-05-01
|
Series: | EPJ Data Science |
Subjects: | |
Online Access: | https://doi.org/10.1140/epjds/s13688-023-00392-8 |
_version_ | 1797811658224041984 |
---|---|
author | Louis M. Shekhtman Alon Sela Shlomo Havlin |
author_facet | Louis M. Shekhtman Alon Sela Shlomo Havlin |
author_sort | Louis M. Shekhtman |
collection | DOAJ |
description | Abstract We consider the limits of privacy based on the knowledge of interactions in anonymous networks. In many anonymous networks, such as blockchain cryptocurrencies, dark web message boards, and other illicit networks, nodes are anonymous to outsiders, however the existence of a link between individuals is observable. For example, in blockchains, transactions between anonymous accounts are published openly. Here we consider what happens if one or more individuals in such a network are deanonymized by an outside investigator. These compromised individuals could then potentially leak information about others with whom they interacted, leading to a cascade of nodes’ identities being revealed. We map this scenario to percolation and analyze its consequences on three real anonymous networks—(1) a blockchain transaction network, (2) interactions on the dark web, and (3) a political conspiracy network. We quantify, for different likelihoods of individuals possessing information on their neighbors, p, the fraction of accounts that can be identified in each network. We then estimate the minimum and most probable number of steps to a desired anonymous node, a measure of the effort to deanonymize that node. In all three networks, we find that it is possible to deanonymize a significant fraction of the network ( > 50 % $>50\%$ ) within less than 5 steps for values of p > 0.4 $p>0.4$ . We show how existing measures and approaches from percolation theory can help investigators quantify the chances of deanonymizing individuals, as well as how users can maintain privacy. |
first_indexed | 2024-03-13T07:25:54Z |
format | Article |
id | doaj.art-f90654cf4d3c4c16bc27f8d134088b29 |
institution | Directory Open Access Journal |
issn | 2193-1127 |
language | English |
last_indexed | 2024-03-13T07:25:54Z |
publishDate | 2023-05-01 |
publisher | SpringerOpen |
record_format | Article |
series | EPJ Data Science |
spelling | doaj.art-f90654cf4d3c4c16bc27f8d134088b292023-06-04T11:23:36ZengSpringerOpenEPJ Data Science2193-11272023-05-0112111410.1140/epjds/s13688-023-00392-8Percolation framework reveals limits of privacy in conspiracy, dark web, and blockchain networksLouis M. Shekhtman0Alon Sela1Shlomo Havlin2Network Science Institute, Northeastern UniversityDepartment of Industrial Engineering, Ariel UniversityDepartment of Physics, Bar-Ilan UniversityAbstract We consider the limits of privacy based on the knowledge of interactions in anonymous networks. In many anonymous networks, such as blockchain cryptocurrencies, dark web message boards, and other illicit networks, nodes are anonymous to outsiders, however the existence of a link between individuals is observable. For example, in blockchains, transactions between anonymous accounts are published openly. Here we consider what happens if one or more individuals in such a network are deanonymized by an outside investigator. These compromised individuals could then potentially leak information about others with whom they interacted, leading to a cascade of nodes’ identities being revealed. We map this scenario to percolation and analyze its consequences on three real anonymous networks—(1) a blockchain transaction network, (2) interactions on the dark web, and (3) a political conspiracy network. We quantify, for different likelihoods of individuals possessing information on their neighbors, p, the fraction of accounts that can be identified in each network. We then estimate the minimum and most probable number of steps to a desired anonymous node, a measure of the effort to deanonymize that node. In all three networks, we find that it is possible to deanonymize a significant fraction of the network ( > 50 % $>50\%$ ) within less than 5 steps for values of p > 0.4 $p>0.4$ . We show how existing measures and approaches from percolation theory can help investigators quantify the chances of deanonymizing individuals, as well as how users can maintain privacy.https://doi.org/10.1140/epjds/s13688-023-00392-8PrivacyPercolationDark WebBlockchainSocial networks |
spellingShingle | Louis M. Shekhtman Alon Sela Shlomo Havlin Percolation framework reveals limits of privacy in conspiracy, dark web, and blockchain networks EPJ Data Science Privacy Percolation Dark Web Blockchain Social networks |
title | Percolation framework reveals limits of privacy in conspiracy, dark web, and blockchain networks |
title_full | Percolation framework reveals limits of privacy in conspiracy, dark web, and blockchain networks |
title_fullStr | Percolation framework reveals limits of privacy in conspiracy, dark web, and blockchain networks |
title_full_unstemmed | Percolation framework reveals limits of privacy in conspiracy, dark web, and blockchain networks |
title_short | Percolation framework reveals limits of privacy in conspiracy, dark web, and blockchain networks |
title_sort | percolation framework reveals limits of privacy in conspiracy dark web and blockchain networks |
topic | Privacy Percolation Dark Web Blockchain Social networks |
url | https://doi.org/10.1140/epjds/s13688-023-00392-8 |
work_keys_str_mv | AT louismshekhtman percolationframeworkrevealslimitsofprivacyinconspiracydarkwebandblockchainnetworks AT alonsela percolationframeworkrevealslimitsofprivacyinconspiracydarkwebandblockchainnetworks AT shlomohavlin percolationframeworkrevealslimitsofprivacyinconspiracydarkwebandblockchainnetworks |