The Bisq DAO: On the Privacy Cost of Participation

The Bisq DAO is a core component of Bisq, a decentralized cryptocurrency exchange. The purpose of the Bisq DAO is to decentralize the governance and finance functions of the exchange. However, by interacting with the Bisq DAO, participants necessarily publish data to the Bitcoin blockchain and broadcast additional data to the Bisq peer-to-peer network. We examine the privacy cost to participants in sharing this data. Specifically, we use a novel address clustering heuristic to construct the one-to-many mappings from participants to addresses on the Bitcoin blockchain and augment the address clusters with data stored within the Bisq peer-to-peer network. We show that this technique aggregates activity performed by each participant: trading, voting, transfers, etc. We identify instances where participants are operating under multiple aliases, some of which are real-world names. We identify the dominant transactors and their role in a two-sided market. We conclude with suggestions to better protect the privacy of participants in the future.

[1]  Yazan Boshmaf,et al.  BlockTag: Design and applications of a tagging system for blockchain analysis , 2019, SEC.

[2]  Christoph Fretter,et al.  The Unreasonable Effectiveness of Address Clustering , 2016, 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld).

[3]  Friedhelm Victor,et al.  Address Clustering Heuristics for Ethereum , 2020, Financial Cryptography.

[4]  S A R A H M E I K L E J O H N,et al.  A Fistful of Bitcoins Characterizing Payments Among Men with No Names , 2013 .

[5]  Jie Chen,et al.  Anti-Money Laundering in Bitcoin: Experimenting with Graph Convolutional Networks for Financial Forensics , 2019, ArXiv.

[6]  Ethan Heilman,et al.  An Empirical Analysis of Traceability in the Monero Blockchain , 2017, Proc. Priv. Enhancing Technol..

[7]  Jonas David Nick,et al.  Data-Driven De-Anonymization in Bitcoin , 2015 .

[8]  Reinhard Diestel,et al.  Graph Theory , 1997 .

[9]  J. Borges,et al.  A TAXONOMY OF PRIVACY , 2006 .

[10]  Evolution of the Bitcoin Address Graph An Exploratory Longitudinal Study , 2017 .

[11]  Lindsay X. Lin Deconstructing Decentralized Exchanges , 2019 .

[12]  P. Tasca Token-Based Business Models , 2018, Disrupting Finance.

[13]  Jeffrey Quesnelle,et al.  On the linkability of Zcash transactions , 2017, ArXiv.

[14]  Friedhelm Victor,et al.  Measuring Ethereum-Based ERC20 Token Networks , 2019, Financial Cryptography.

[15]  Laura Ricci,et al.  Data-driven analysis of Bitcoin properties: exploiting the users graph , 2018, International Journal of Data Science and Analytics.

[16]  Laura Wynter,et al.  Characterizing Entities in the Bitcoin Blockchain , 2018, 2018 IEEE International Conference on Data Mining Workshops (ICDMW).

[17]  H. Adams,et al.  Uniswap v2 Core , 2020 .

[18]  Benjamin Fabian,et al.  Analyzing the Bitcoin Network: The First Four Years , 2016, Future Internet.

[19]  Maxim Panov,et al.  Automatic Bitcoin Address Clustering , 2017, 2017 16th IEEE International Conference on Machine Learning and Applications (ICMLA).

[20]  Damon McCoy,et al.  Tracking Ransomware End-to-end , 2018, 2018 IEEE Symposium on Security and Privacy (SP).

[21]  J. Harvey,et al.  Why Cryptocurrencies Want Privacy: A Review of Political Motivations and Branding Expressed in “Privacy Coin” Whitepapers , 2019, Journal of Political Marketing.

[22]  Yaniv Altshuler,et al.  Network Analysis of ERC20 Tokens Trading on Ethereum Blockchain , 2018 .