yes you can attack both, what i meant and understood was that samurai has an option to mark dust funds to be “ignored” and not included in further transactions.
midva se tud tko razumeva ane?
yes you can attack both, what i meant and understood was that samurai has an option to mark dust funds to be “ignored” and not included in further transactions.
midva se tud tko razumeva ane?
Ja se, sam mi raje v DM piši, da ne bodo drugi zmedeni
The goal of a dusting attack is to deanonymize cryptocurrency users.
If the dusting attack is successful, the victim can be subject to phishing scams or cyber-extortion threats.
Dusting attacks work for both type-1 and type-2 wallets, but only if the dust is spent. If the dust is included in a transaction, an analysis of input and output addresses is performed to link the addresses to the user.
Samourai Wallet implemented a real-time alert for dust tracking as well as a “Do Not Spend” feature, which allows users to mark suspicious funds so that they are not included in future transactions.
The goal is to de-anonymize / identify the users behind specific cryptocurrency wallets.
If successful, victims are subject of elaborate phishing attempts, or cyber-extortion threats.
They work only if the person receiving the tiny payments then sends them on, they could potentially work with both types .
They added a do not spend feature to mark coins received rom unknown sources. This prevented the user from then sending them anywhere.
What is the goal of a dusting attack?
The goal is to eventually link the dusted addresses and wallets to their respective companies or individuals.
If a dusting attack is successful, how is the victim at risk?
Could be attacked through elaborated phishing attacks or cyber-extortion threats.
Do dusting attacks work for type-1 HD wallets, type-2, or both?
It works for both types.
What features did Samourai Wallet add to protect against dusting attacks?
Implemented a real-time alert for dust tracking as well as a “Do Not Spend” feature that lets users mark suspicious funds, so these are not included in future transactions.
It is basically a way to identify the identity behind an address by sending tiny amount of BTC which could then be tracked.
Her anonymity is exposed without her knowing. As a consequences this implies many other identity related attacks such as phishing.
Both.
Since a DA works when a « dusty » UTXO is « merged » in a transaction, if we tag these UTXO as non spendable the DA won’t work.
small amounts of cryptocurrency is sent to a victims wallet by the malicious party. The attacker then attempts to track the activity of those coins when used by the victim.
If the attackers are able to identify the person or organization that owns the affected wallet, the can attempt to extort or use phishing attacks.
Yes. They may work against anyone who actually sends the dust to another address.
implemented a real time alert for dust tracking as well as a do not spend feature when dust is identified.
Retrieving someones identity
By getting blackmailed for example
Could work for both
They made the dust tx unspendable
To deanonymize wallet owners.
The attackers might use the obtained information to target their phishing attempts more precisely.
The best way to protect against a DustAttack is to leave the DustTransactions unspent!
The Samourai Wallet let’s you mark UTXOs as “Do not spend!”. This prevents the Wallet from using these Dusty UTXOs in transactions.
What is the goal of a dusting attack?
The goal of a dusting attack is to link the dusted wallets to a specific individual or business.
If a dusting attack is successful, how is the victim at risk?
Do dusting attacks work for type-1 HD wallets, type-2, or both?
The victim is at risk of phising attacks or cyber extortion threats if the dusting attack is successful.
Dusting attacks work on both type of wallets, if a user spends that dust, they are at higher risk of being targeted.
What features did Samourai Wallet add to protect against dusting attacks?
Samourai wallet added a “Do Not Spend” feature that allows you to mark suspicious funds so they arent included in future transactions. Also if you don’t spend/move the dust to a different wallet then the attackers wont be able to make the connections they need to “deanonymize” the wallets.
To deanonymize the person or company behind each wallet.
If successful, the attackers may use this knowledge against their targets, either through elaborated phishing attacks or cyber-extortion threats
Both. Because when the dust coins are sent again, they can be tracked and linked to the receiver of the dust coins.
The Samourai Wallet team implemented a real-time alert for dust tracking as well as a “Do Not Spend” feature that lets users mark suspicious funds, so these are not included in future transactions.
Dusting Attacks - Reading Assignment
A. The goal of the attacker is to analyze blockchain transactions and deanonomize users. If successful, then to link dusted wallets to the deanonomized user, perpetrate cyber extortion threats, phish those users, or there may be no harm. Government research agencies, companies, research labs with various for profit and not for profit incentives may be attackers.
A. Yes, both.
A. "The Samourai Wallet team implemented a real-time alert for dust tracking as well as a “Do Not Spend” feature that lets users mark suspicious funds, so these are not included in future transactions.” - Binance Academy Anon Author
1. What is the goal of a dusting attack?
The goal of a dusting attack is to seed wallets with different UTXO’s whick can be tracked in an attempt to determine which wallets are controlled by the same person and deanonymize them.
2. If a dusting attack is successful, how is the victim at risk?
The information could be used to target high net worth individuals, or launch customized phishing attacks against them.
3. Do dusting attacks work for type-1 HD wallets, type-2, or both?
Both.
4. What features did Samourai Wallet add to protect against dusting attacks?
The wallet identified suspicious transactions, and allowed the owner to exclude those utxo’s from being spent.
What is the goal of a dusting attack? To determine which wallet addresses belong to the same crypto-wallet.
If a dusting attack is successful, how is the victim at risk? The victim is at risk to phishing attacks or cyber-extortion.
Do dusting attacks work for type-1 HD wallets, type-2, or both? Yes, but only if he recipient moves the dust.
What features did Samourai Wallet add to protect against dusting attacks? A real-time alert for dust tracking, along with a “do not spend feature” feature that allows for suspicious funds to be identified.