One of the most prominent and widely-used blockchain privacy solutions are zero-knowledge proof (ZKP) mixers operating on top of smart contract-enabled blockchains. ZKP mixers typically advertise their level of privacy through a so-called anonymity set size, similar to k-anonymity, where a user hides among a set of $k$ other users. In reality, however, these anonymity set claims are mostly inaccurate, as we find through empirical measurements of the currently most active ZKP mixers. We propose five heuristics that, in combination, can increase the probability that an adversary links a withdrawer to the correct depositor on average by 51.94% (108.63%) on the most popular Ethereum (ETH) and Binance Smart Chain (BSC) mixer, respectively. Our empirical evidence is hence also the first to suggest a differing privacy-predilection of users on ETH and BSC. We further identify 105 Decentralized Finance (DeFi) attackers leveraging ZKP mixers as the initial funds and to deposit attack revenue (e.g., from phishing scams, hacking centralized exchanges, and blockchain project attacks). State-of-the-art mixers are moreover tightly intertwined with the growing DeFi ecosystem by offering ``anonymity mining'' (AM) incentives, i.e., mixer users receive monetary rewards for mixing coins. However, contrary to the claims of related work, we find that AM does not always contribute to improving the quality of an anonymity set size of a mixer, because AM tends to attract privacy-ignorant users naively reusing addresses.
翻译:最突出和广泛使用的连锁隐私解决方案之一是零知识证明(ZKP)混合器,在智能合同带动的连锁链上操作。 ZKP搅拌器通常通过所谓的匿名套装尺寸来宣传其隐私程度,类似于k-匿名套装尺寸,用户在一组美元的其他用户中隐藏着类似k-anonomity。但在现实中,这些匿名套装要求大多是不准确的,正如我们通过对目前最活跃的 ZKP混拌器的实证测量所发现的那样。我们提出了五种混合混合法,这五种混合法结合起来,可以增加一个竞争者以51.94%(108.63%)的平均速度将提取者与正确的存储器连接起来的可能性,在最受欢迎的 Etheemum (ETH) 和 Binance Smart 链(BSC) 混杂体尺寸上,我们的实证证据也首次表明用户的隐私差异。我们进一步确定了105种分散金融(Defi) 袭击者利用混合调制的混合调控股器将ZKP搅拌器用作初始资金和存款收入(例如,从存储调调调取的调制的离子) 等等的调调调调调和调和调制质量用户的调和调制, 等调制的调制的调制的调和调和制的调制的调和制的调制的调制的调制的调制的调制的平质) 。