{"id":21523,"date":"2018-08-29T14:33:42","date_gmt":"2018-08-29T14:33:42","guid":{"rendered":"http:\/\/ci027cfe62a0042697"},"modified":"2025-01-28T16:22:34","modified_gmt":"2025-01-28T16:22:34","slug":"anatomy-anonymity-how-dandelion-could-make-bitcoin-more-private","status":"publish","type":"post","link":"https:\/\/bitcoinmagazine.com\/culture\/anatomy-anonymity-how-dandelion-could-make-bitcoin-more-private","title":{"rendered":"The Anatomy of Anonymity: How Dandelion Could Make Bitcoin More Private"},"content":{"rendered":"<div id=\"bsf_rt_marker\"><\/div><figure><img decoding=\"async\" src=\"https:\/\/bitcoinmagazine.com\/wp-content\/uploads\/2024\/11\/the-anatomy-of-anonymity-how-dandelion-could-make-bitcoin-more-private.jpg\" title=\"\"><\/figure>\n<p>Many people know bitcoin as an anonymous digital currency, one whose privacy features prime it for concealed payments in sketchy recesses of the internet\u2019s dark web.<\/p>\n<p>These same people would likely be surprised to learn that bitcoin is far from anonymous. More pseudonymous than anything, its underlying technology, the blockchain, actually features a number of technical windows through which users could peep another user\u2019s identity. These interested parties, be they analytics companies, governments or anyone with sufficient IT knowledge, can use peer-to-peer network analysis to link a Bitcoin public address to an IP address, allowing them to learn who owns a wallet and who they\u2019re sending their funds to.<\/p>\n<p>In tracing transactions and public addresses back to their users\u2019 IP addresses, these \u201cspies,\u201d also known as \u201cadversaries,\u201d are effectively deanonymizing users. An obvious breach of privacy, the Bitcoin community has long wrestled with solutions to neutralize this problem.<\/p>\n<p>Entering the conversation is Dandelion, a <a href=\"https:\/\/github.com\/gfanti\/bips\/blob\/master\/bip-dandelion.mediawiki\" target=\"_blank\" rel=\"noopener\">protocol<\/a> developed by Giulia Fanti along with Shaileshh Bojja Venkatakrishnan, Surya Bakshi, Bradley Denby, Shruti Bhargava, Andrew Miller and Pramod Viswanath, researchers at Carnegie Mellon, MIT and the University of Illinois. If theory can hold up in application, Dandelion would effectively neutralize the peer-to-peer analysis that plays a significant role in compromising user identity.<\/p>\n<h3>The Problem <\/h3>\n<p>Whenever someone sends a transaction on Bitcoin\u2019s network, typically, that transaction is broadcasted to multiple nodes until it is picked up by a miner and included in a block. <\/p>\n<p>This broadcasting process is known as diffusion. It begins when the source node, the node that creates the transaction, transmits it to other nodes on the network. Once this node broadcasts the transaction, each of the other nodes that make up the network continues to independently diffuse the transaction by sending it to others with exponential delays.<\/p>\n<p><a href=\"https:\/\/www.youtube.com\/watch?v=XORDEX-RrAI&amp;feature=youtu.be&amp;t=7h34m35s\" target=\"_blank\" rel=\"noopener\">Presenting Dandelion<\/a> at the Building on Bitcoin conference in Lisbon, Portugal, Giulia Fanti explained that the source node\u2019s IP address can often be discerned because \u201cdiffusion is susceptible to detection.\u201d When collaborating spy nodes receive a transaction, they can engage in peer-to-peer network analysis to retrace its steps through the network.<\/p>\n<p>Basically, by observing the timing of each broadcast and examining the structure of relays, spies can trace \u2014 with a high probability that isn\u2019t necessarily foolproof \u2014 a transaction back to its source node. From here, the spy has high odds of gleaning the IP address of the transaction sender.<\/p>\n<h3>Dandelion\u2019s Solution<\/h3>\n<p>Dandelion aims to abstract the transaction relaying process to make it more complicated for adversaries to trace transactions. This would, in essence, make it nearly impossible to follow the breadcrumb trail that broadcast timings and relay structures lead back to the source node that originally transmitted the transaction.<\/p>\n<p>To achieve this, Dandelion sends the transaction on a random path through a variable number of nodes before the transaction is diffused across the whole network. The random pathway is known as the stem phase of the protocol, as transactions relayed in the stage are shared only between one another, transmitting from one node to the next. The diffusion phase is known as the \u201cfluff phase,\u201d as the transaction is broadcasted to multiple nodes to be spread across the network (visually and in effect, both of these processes replicate a Dandelion\u2019s anatomy, hence the terminology).<\/p>\n<figure><img decoding=\"async\" src=\"https:\/\/bitcoinmagazine.com\/wp-content\/uploads\/2025\/01\/216_image-placeholder-title.png\" title=\"\"><\/figure>\n<p><em>Screenshot of the Dandelion structure as illustrated in Fanti\u2019s talk.<\/em><\/p>\n<p>In the stem phase, each node randomly decides to either continue the stem phase by relaying the broadcast to another node or diffuse the transaction to the rest of the network. If passed on, the next node again randomly decides whether to pass the transaction on or diffuse it. The transaction is passed along, one by one, until one node triggers the diffusion process.<\/p>\n<p>Adding the first transaction phase before diffusion is meant to provide an added layer of anonymity to the transaction broadcasting process. If the network passes the transaction to multiple potential source nodes before diffusion, this should, in theory, obfuscate where a broadcast came from, thereby making it exceedingly difficult to definitively trace a transaction back to its source.<\/p>\n<h3>Dandelion\u2019s Growth <\/h3>\n<p>Dandelion\u2019s proposal is considered to be a feasible step toward solving Bitcoin\u2019s anonymity question that doesn\u2019t involve overhauling its code entirely to outfit it with the kind of peer-to-peer network obfuscation tools a coin like Monero is developing, for example.<\/p>\n<p>The team is often asked why it won\u2019t implement the same onion routing that Monero is focusing on. Fanti admitted in her talk that \u201cMonero is addressing the exact same problem [Dandelion] is trying to solve,\u201d but qualified this by stating that \u201cimplementing this is actually really time intensive,\u201d as the Monero development team has been working on it since 2014.<\/p>\n<p>Focusing instead on its own ground-up approach, Dandelion has come some way since it was first introduced in 2017. After a peer review of its code found some glaring holes, the team revamped their efforts and re-released <a href=\"https:\/\/arxiv.org\/pdf\/1805.11060.pdf\" target=\"_blank\" rel=\"noopener\">a new white paper<\/a> with an updated method (known as Dandelion++) in May of 2018.<\/p>\n<p>It\u2019s expected that Dandelion will be implemented into a future Bitcoin Core update, though it will not be ready for the forthcoming 0.17.0 release.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If it works, Dandelion could effectively neutralize the peer-to-peer analysis that plays a significant role in compromising user identity.<\/p>\n","protected":false},"author":3468,"featured_media":21524,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[33],"tags":[623,2219,101,73],"class_list":{"0":"post-21523","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-culture","8":"tag-anonymity","9":"tag-dandelion","10":"tag-p2p","11":"tag-privacy"},"author_data":{"id":3468,"name":"Aaron Van Wirdum And Colin Harper","nicename":"aaron-van-wirdum-and-colin-harper","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/88b6c65a7515990786b1c04473e15469e5b0d0fffef947ed629a60854e1cb426?s=96&d=robohash&r=g"},"featured_image_url":"https:\/\/bitcoinmagazine.com\/wp-content\/uploads\/2024\/11\/the-anatomy-of-anonymity-how-dandelion-could-make-bitcoin-more-private.jpg","_links":{"self":[{"href":"https:\/\/bitcoinmagazine.com\/wp-json\/wp\/v2\/posts\/21523","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bitcoinmagazine.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/bitcoinmagazine.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/bitcoinmagazine.com\/wp-json\/wp\/v2\/users\/3468"}],"replies":[{"embeddable":true,"href":"https:\/\/bitcoinmagazine.com\/wp-json\/wp\/v2\/comments?post=21523"}],"version-history":[{"count":0,"href":"https:\/\/bitcoinmagazine.com\/wp-json\/wp\/v2\/posts\/21523\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/bitcoinmagazine.com\/wp-json\/wp\/v2\/media\/21524"}],"wp:attachment":[{"href":"https:\/\/bitcoinmagazine.com\/wp-json\/wp\/v2\/media?parent=21523"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/bitcoinmagazine.com\/wp-json\/wp\/v2\/categories?post=21523"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/bitcoinmagazine.com\/wp-json\/wp\/v2\/tags?post=21523"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}