[]
BTC$83,8301.36%ETH$1,919.061.13%USDT$1.000.02%XRP$2.413.99%BNB$593.502.46%SOL$132.935.74%USDC$1.000.00%ADA$0.742.28%DOGE$0.171.83%TRX$0.22-0.78%STETH$1,917.451.29%WBTC$83,7241.37%PI$1.44-8.43%LINK$13.88-0.31%LEO$9.55-2.10%XLM$0.27-1.84%WSTETH$2,297.891.26%USDS$1.00-0.00%HBAR$0.190.48%AVAX$18.57-1.46%SHIB$0.000012802.07%SUI$2.345.96%TON$2.944.00%LTC$92.492.79%BCH$344.423.81%DOT$4.295.39%OM$6.422.88%USDE$1.000.02%WETH$1,920.31.16%BGB$4.402.01%BSC-USD$1.000.28%HYPE$14.465.97%WBT$28.390.62%WEETH$2,039.051.14%XMR$211.130.93%UNI$6.123.50%SUSDS$1.040.06%APT$5.332.62%DAI$1.00-0.02%NEAR$2.64-1.30%PEPE$0.000007070.05%ICP$5.712.00%OKB$45.868.90%ONDO$0.861.21%ETC$17.91-2.35%AAVE$174.314.60%GT$21.344.18%CBBTC$83,9271.36%MNT$0.731.15%TRUMP$11.911.13%CRO$0.080.65%TKX$28.033.85%TAO$255.333.43%VET$0.032.84%FDUSD$1.00-0.08%KAS$0.083.66%TIA$3.640.36%ATOM$4.4110.07%ENA$0.365.18%FIL$2.892.03%POL$0.22-0.10%FTN$3.99-0.01%ALGO$0.201.20%LBTC$84,1491.81%S$0.520.08%RENDER$3.194.70%ARB$0.362.84%IP$5.780.09%USDT$1.000.00%JUP$0.532.62%OP$0.870.58%KCS$11.120.91%FET$0.510.66%SOLVBTC$83,7701.74%BUIDL$1.000.00%WETH$1,920.871.67%QNT$77.941.75%MOVE$0.471.81%RSETH$1,992.051.11%NEXO$1.070.12%XDC$0.071.64%MKR$1,187.913.49%DEXE$17.440.43%SEI$0.201.83%IMX$0.565.84%INJ$10.063.82%STX$0.652.65%USD0$1.00-0.01%WLD$0.872.06%RETH$2,154.691.10%BNSOL$138.225.55%FLR$0.025.25%GRT$0.104.93%THETA$0.89-0.38%LDO$0.951.79%BONK$0.000010930.30%USDT$1.000.01%SOLVBTC.BBN$83,3502.33%METH$2,035.921.21%PYUSD$1.00-0.09%

Advertisement

Ethereum Researchers Warn Node Operators Can Be Deanonymized

Researchers are urging developers to explore solutions that can mitigate deanonymization attacks.
By: Samuel Haig • September 23, 2024
Ethereum Researchers Warn Node Operators Can Be Deanonymized

Ethereum researchers claim to have developed a technique for deanonymizing Ethereum validators that could expose the IP address of more than 15% of the network’s node operators.

On Sept. 21, Privacy Problems in the P2P Network and What They Tell Us, a paper co-authored by five researchers, was published to the Ethresearch forum. The paper asserts that messages exchanged between nodes on the Ethereum network are vulnerable to deanonymization by nodes acting as “silent observer[s]” on the network, meaning that third parties may be able to identify the IP address of validators.

“Ethereum’s P2P network is what allows validators to exchange important messages like blocks and attestations, which keeps the blockchain running,” the paper said. “Our deanonymization technique is simple, cost-effective, and capable of identifying over 15% of Ethereum’s validators with only three days of data.”

The technique was enabled by observing Ethereum’s attestation mechanism, which splits validators across 64 committees, assigns particular validators as attestation aggregators, and organizes aggregators across 64 subnets. Each node subscribes to only two subnets by default and maintains a connection with at least one peer in each subnet, allowing the researchers to trace the messages of aggregators to begin deanonymizing nodes.

“By deploying our logging client across four nodes over a period of three days, we were able to deanonymize more than 15% of Ethereum’s validators in the P2P network,” the paper said. “Our nodes were located in Frankfurt (FR), Seoul (SO), Virginia (VA), and Zurich (ZH). By deploying a greater number of nodes and running the measurement for longer, we presume this figure would increase.”

The paper also acknowledges the existence of three other methods for deanonymizing Ethereum peers by observing P2P messages. In June 2020, researchers developed a deanonymizing technique that maps validators to peers by observing which peer first broadcasts a block. A second method was described in August 2022 that analyzes attestation arrival times, while a third process focusing on subnet subscriptions was published in June 2024.

However, the latest paper claims to achieve more precise results using less data and network connections.

Attacks and mitigations

The researchers warn that the technique could be used by an existing block proposer to launch attacks against the following block proposer in a bid to propose extra blocks and earn additional fees. The attack could be extended to continuously target upcoming blocks, threatening to halt the network in the unlikely event that more than one-third of block proposals are missed.

Still, the paper discusses multiple ways to protect against deanonymization. These include promoting private peering agreements, promoting the adoption of privacy protocols such as Tor and Dandelion among validators, keeping block producers anonymized until they propose blocks, and increasing the number of subnets validators are subscribed to.

Advertisement

Get an edge in Crypto with our free daily newsletter

Know what matters in Crypto and Web3 with The Defiant Daily newsletter, Mon to Fri

90k+ Defiers informed every day. Unsubscribe anytime.