Epstein Files

EFTA00995508.pdf

dataset_9 pdf 95.8 KB Feb 3, 2026 2 pages
From: "jeffrey E." <jeevacation@grnail.com> To: Vincenzo Iozzo >, Joi Ito Subject: Re: de-anonymize tor/bitcoin Date: Sat, 23 Aug 2014 10:34:26 +0000 http://www.foxnews.corn/politics/2014/08/22/food-stamp-fraud-rampant-gao-rew_rt/ make food stamps a test bed for transparant cyryto? govt on our side On Sat, Aug 23, 2014 at 5:54 AM, Vincenzo Iozzo fl > wrote: Jeffrey, this stuff is a bit heavy but if you care for it here are a couple of links: I) One obvious technique to de-anonymize tor is to control the 'exit nodes', meaning the nodes that connect Tor to the Internet. If you control enough of them you can de-anonymize a lot of it. 2) A friend of mine (among other people), found ways to de-anonymize a lot of the 'hidden services' (roughly the 'secret' websites inside tor) much more efficiently. I believe Tor fixed those flaws by now, but it's a pretty ingenious attack: http://www.ieee-securityrg/TC/SP2013/papers/4977a080.pdf The bottom line there is that with roughly Silk you can realistically de-anonymize any hidden service on tor. You do that by 'pretending' to be one of the servers handing out the addresses of the hidden services 3) The third option is to just attack the machine(s) of the 'bad guys', this is for instance what the FBI did a while ago against a network oh pedophiles: http:/Avww.reddit.corn/r/onions/comments/1jmrta/founder_of the_freedom_hosting_arrested_held/ This option is targeted but it always works. The trick there was to attack the computer and then have the computer connect to a non-tor website, by doing that they could get the IP address and de-anonymize the user. Of course once you have control over the machine you can do much more that that, but they sticked to that As for bitcoin itself, I believe I sent you the Bitlodine paper. Another very good one is this: http://cseweb.ucsd.edut-smeiklejohn/files/imc13.pdf Now some of these approaches are probabilistic, (3) is not. But I guess my point is: if you *really* want to figure out what somebody is doing on tor/bitcoin you can do it given enough resources. Not that it matters too much, but well please note The information contained in this communication is confidential, may be attorney-client privileged, may constitute inside information, and is intended only for the use of the addressee. It is the property of JEE Unauthorized use, disclosure or copying of this communication or any part thereof is strictly prohibited and may be unlawful. If you have received this communication in error, please notify us immediately by return e-mail or by e-mail to jeevacation®gmail.com, and EFTA00995508 destroy this communication and all copies thereof, including all attachments. copyright -all rights reserved EFTA00995509

Entities

0 total entities mentioned

No entities found in this document

Document Metadata

Document ID
d30f7430-023b-48a6-b3ad-df063831ec47
Storage Key
dataset_9/EFTA00995508.pdf
Content Hash
b2cf5d5d352756f73a803822b171222b
Created
Feb 3, 2026