Post
Topic
Board Bitcoin Discussion
Re: What if you bought some of those stolen Mt Gox Bitcoins?
by
AnonyMint
on 01/03/2014, 03:15:06 UTC
Ok so you know the address of a stolen bitcoin, now tell me how you plan to identify the person who owns the address?
There is no anonymity in Bitcoin against powerful entities:

There might not be any anonymity,  but that still doesn't help you prove that a specified person owns the private key associated with a newly generated Bitcoin address,  whose only transaction so far was to receive some coins.

Unless the person shows you the private/public key; for all you know,  the Bitcoin address was a DUMMY address, and the coins are essentially destroyed --- since there is no known public/private key pair in existence  that would have the address that the coins were transferred to.

Incorrect. You had to transmit your public key to the sender who sent you BTC.

Edit: actually the public key is hashed and not public until you spend. But unless it was sent encrypted to the sender, this could be intercepted. And frankly most of the time you are not obtaining coins from such a covert sender. When you buy on an exchange, the authorities can get this information.

Also once you spend your coins then your public key is revealed. If you can't spend your coins without revealing your identity, then what is your point?

Actually you are correct that I could display my public key in some way that doesn't connect it to my IP, e.g. at software download website, and the sender could send me coin and since the public key is hashed on the blockchain, no one would know I received it except for the sender and myself.

However, as I pointed out, as soon as you spend it, your public key is revealed.

And when you send you spend transaction, that is when your IP address can be correlated.

Also note my understanding is that a decentralized mixer such as CoinJoin would have to reveal your public key to all the parties since they all need to sign. And a centralized mixer would know your public key, so if that service was a honeypot, then it is revealed in that way.