A Quantitative Analysis of the Impact of Arbitrary Blockchain Content on Bitcoin

Blockchains primarily enable credible accounting of digital events, e.g., money transfers in cryptocurrencies. However, beyond this original purpose, blockchains also irrevocably record arbitrary data, ranging from short messages to pictures. This does not come without risk for users as each participant has to locally replicate the complete blockchain, particularly including potentially harmful content. We provide the first systematic analysis of the benefits and threats of arbitrary blockchain content. Our analysis shows that certain content, e.g., illegal pornography, can render the mere possession of a blockchain illegal. Based on these insights, we conduct a thorough quantitative and qualitative analysis of unintended content on Bitcoin’s blockchain. Although most data originates from benign extensions to Bitcoin’s protocol, our analysis reveals more than 1600 files on the blockchain, over 99% of which are texts or images. Among these files there is clearly objectionable content such as links to child pornography, which is distributed to all Bitcoin participants. With our analysis, we thus highlight the importance for future blockchain designs to address the possibility of unintended data insertion and protect blockchain users accordingly.

[1]  Jude C. Nelson,et al.  Blockstack : A New Decentralized Internet , 2017 .

[2]  Ian Clarke,et al.  Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[3]  Jan Rüth,et al.  Maintaining integrity and reputation in content offloading , 2016, 2016 12th Annual Conference on Wireless On-demand Network Systems and Services (WONS).

[4]  Ernesto Damiani,et al.  A reputation-based approach for choosing reliable resources in peer-to-peer networks , 2002, CCS '02.

[5]  Lorrie Faith Cranor,et al.  Publius: A Robust, Tamper-Evident, Censorship-Resistant, and Source-Anonymous Web Publishing System , 2000, USENIX Security Symposium.

[6]  Samantha H. Scheller A Picture Is Worth a Thousand Words: The Legal Implications of Revenge Porn , 2015 .

[7]  Adi Shamir,et al.  Quantitative Analysis of the Full Bitcoin Transaction Graph , 2013, Financial Cryptography.

[8]  David M. Douglas,et al.  Doxing: a conceptual analysis , 2016, Ethics and Information Technology.

[9]  Emin Gün Sirer,et al.  Experience with an Object Reputation System for Peer-to-Peer Filesharing , 2006, NSDI.

[10]  Jeremy Clark,et al.  CommitCoin: Carbon Dating Commitments with Bitcoin , 2011, IACR Cryptol. ePrint Arch..

[11]  Klaus Wehrle,et al.  POSTER: I Don't Want That Content! On the Risks of Exploiting Bitcoin's Blockchain as a Content Store , 2016, CCS.

[12]  Massimo Bartoletti,et al.  An Analysis of Bitcoin OP_RETURN Metadata , 2017, Financial Cryptography Workshops.

[13]  Daniel Davis Wood,et al.  ETHEREUM: A SECURE DECENTRALISED GENERALISED TRANSACTION LEDGER , 2014 .

[14]  Fergal Reid,et al.  An Analysis of Anonymity in the Bitcoin System , 2011, PASSAT 2011.

[15]  M. Zeilinger Digital Art as ‘Monetised Graphics’: Enforcing Intellectual Property on the Blockchain , 2016, Philosophy & Technology.

[16]  Ethan Heilman,et al.  Eclipse Attacks on Bitcoin's Peer-to-Peer Network , 2015, USENIX Security Symposium.

[17]  Lisa Lynch The Leak Heard Round the World? Cablegate in the Evolving Global Mediascape , 2013 .

[18]  John B Bellinger,et al.  Freedom of Speech: The Great Divide and the Common Ground between the United States and the Rest of the World , 2012 .

[19]  Stefano Zanero,et al.  BitIodine: Extracting Intelligence from the Bitcoin Network , 2014, Financial Cryptography.

[20]  J. Hirst,et al.  Section 2 , 2007, Developing Self and Self-Concepts in Early Childhood Education and Beyond.

[21]  Matteo Marsili,et al.  The Interrupted Power Law and the Size of Shadow Banking , 2013, PloS one.

[22]  Laura Ricci,et al.  Uncovering the Bitcoin Blockchain: An Analysis of the Full Users Graph , 2016, 2016 IEEE International Conference on Data Science and Advanced Analytics (DSAA).

[23]  Srdjan Capkun,et al.  μchain: How to Forget without Hard Forks , 2017, IACR Cryptol. ePrint Arch..

[24]  Karl Aberer,et al.  Managing trust in a peer-2-peer information system , 2001, CIKM '01.

[25]  Ersin Uzun,et al.  A reputation-based trust management system for P2P networks , 2004, IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid 2004..

[26]  Giuseppe Ateniese,et al.  Redactable Blockchain – or – Rewriting History in Bitcoin and Friends , 2017, 2017 IEEE European Symposium on Security and Privacy (EuroS&P).

[27]  Tadayoshi Kohno,et al.  Cryptographic Currencies from a Tech-Policy Perspective: Policy Issues and Technical Directions , 2015, Financial Cryptography Workshops.

[28]  Randall Peerenboom,et al.  Assessing Human Rights in China: Why the Double Standard? , 2005 .

[29]  Stefan Katzenbeisser,et al.  Structure and Anonymity of the Bitcoin Transaction Graph , 2013, Future Internet.

[30]  Emin Gün Sirer,et al.  Majority Is Not Enough: Bitcoin Mining Is Vulnerable , 2013, Financial Cryptography.

[31]  Michael S. Kester,et al.  Bitcoin Transaction Graph Analysis , 2015, ArXiv.

[32]  Srinivas Devadas,et al.  Catena: Efficient Non-equivocation via Bitcoin , 2017, 2017 IEEE Symposium on Security and Privacy (SP).

[33]  István Csabai,et al.  Do the Rich Get Richer? An Empirical Analysis of the Bitcoin Transaction Network , 2013, PloS one.

[34]  S A R A H M E I K L E J O H N,et al.  A Fistful of Bitcoins Characterizing Payments Among Men with No Names , 2013 .

[35]  Miguel Castro,et al.  Farsite: federated, available, and reliable storage for an incompletely trusted environment , 2002, OPSR.

[36]  Mostafa H. Ammar,et al.  A reputation system for peer-to-peer networks , 2003, NOSSDAV '03.

[37]  Satoshi Nakamoto Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .

[38]  Klaus Wehrle,et al.  Secure and anonymous decentralized Bitcoin mixing , 2018, Future Gener. Comput. Syst..

[39]  Greg Taylor,et al.  Concepts of Intention in German Criminal Law , 2004 .

[40]  Klaus Wehrle,et al.  myneData: Towards a Trusted and User-controlled Ecosystem for Sharing Personal Data , 2017, GI-Jahrestagung.

[41]  Roman Yampolskiy,et al.  Bitcoin Message: Data Insertion on a Proof-of-Work Cryptocurrency System , 2015, 2015 International Conference on Cyberworlds (CW).

[42]  Klaus Wehrle,et al.  CoinParty: Secure Multi-Party Mixing of Bitcoins , 2015, CODASPY.