Jan. 31, 2022, 2:20 a.m. | Piyush Kumar Sharma, Devashish Gosain, Claudia Diaz

cs.CR updates on arXiv.org arxiv.org

Cryptocurrency systems can be subject to deanonymization attacks by
exploiting the network-level communication on their peer-to-peer network.
Adversaries who control a set of colluding node(s) within the peer-to-peer
network can observe transactions being exchanged and infer the parties
involved. Thus, various network anonymity schemes have been proposed to
mitigate this problem, with some solutions providing theoretical anonymity
guarantees.


In this work, we model such peer-to-peer network anonymity solutions and
evaluate their anonymity guarantees. To do so, we propose a novel …

anonymity cryptocurrencies network peer-to-peer

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Information Systems Security Officer (ISSO) (Remote within HR Virginia area)

@ OneZero Solutions | Portsmouth, VA, USA

Security Analyst

@ UNDP | Tripoli (LBY), Libya

Senior Incident Response Consultant

@ Google | United Kingdom

Product Manager II, Threat Intelligence, Google Cloud

@ Google | Austin, TX, USA; Reston, VA, USA

Cloud Security Analyst

@ Cloud Peritus | Bengaluru, India