Dust attacks refer to a new type of malicious attack activity in which hackers and scammers will attempt to disrupt Bitcoin and cryptocurrency users by sending extremely small amounts of tokens to users' private wallets. Anonymity. Many Bitcoin insiders believe that their anonymity is well protected and that hackers cannot infiltrate their transactions. However, this is not the case.
In the world of cryptocurrency, "Dust" is a very small amount of currency or tokens that people can usually ignore. Take Bitcoin as an example. The smallest unit of Bitcoin is 1 satoshi (that is, 0.00000001 Bitcoin). Generally, we regard quantities less than a few hundred satoshis as dust.
In other words, dust is a small portion of transactions or amounts that are usually not worth trading because their transaction fees are often higher than their own value. Exchanges usually refer to those very small amounts of tokens that are "stuck" and cannot be traded as dust.
Most people don’t notice the dust in their wallets and rarely care about where it comes from. In the past, you could ignore the dust in your wallet, but now, with the emergence of dust attacks, you need to be vigilant.
Scammers have recently realized that Bitcoin users didn't care too much about the tiny amounts that appeared in their wallets, so they started sending small amounts of satoshis to wallet addresses, thereby "dusting" these addresses. The scammers then began to trace the funds and all transactions in the wallets that had been dusted, then connected these addresses, and finally determined the company or individual to which these wallet addresses belonged. This understanding was later used in phishing attacks or threats such as "I know who you are, pay me or I will reveal your identity." The dust attack was initially carried out against Bitcoin, but has since slowly infected cryptocurrencies on other popular blockchains as well.
In October 2018, the developers of the Bitcoin wallet Bamourai issued an announcement saying that their customers had been affected by a dust attack. The company then issued a tweet to alert their customers and explain ways they can protect themselves. To protect customers from dust attacks, the wallet now provides customers with real-time dust tracking alerts and offers a feature called "Do Not Spend" that will allow customers to flag those funds that are suspicious. Avoid using them in future transactions.
If dust funds are not moved, trackers cannot establish a connection with them, and the "de-anonymization" of the wallet or address owner cannot be completed. The Samourai wallet can currently automatically alert for transactions below 546 satoshis, which also provides protection to a certain extent. And the software will also adjust the minimum alarm limit based on market changes.
Because Bitcoin is open source and Decentralized, so anyone can create a wallet and join the network without providing any personal information. Although all Bitcoin transactions are publicly visible, it is never easy to find the identity behind an address or transaction, which is why Bitcoin is private to some extent (but also Not entirely private).
P2P transaction is a transaction method established between two parties without any intermediary, and this kind of transaction may maintain better anonymity. For Bitcoin users, perhaps the best way to protect privacy is to use a single wallet address only once.
However, most cryptocurrency experts and traders are using third-party exchanges and will eventually connect their private wallets to their exchange wallets, and this In this way, their personal information is naturally connected. Therefore, if you want to trade cryptocurrencies, it is especially important to choose an exchange that is reliable and secure.
So please remember that Bitcoin is not a completely anonymous cryptocurrency as most people think. In addition to the recent dust attacks, many companies, research centers, and government agencies are also conducting blockchain analysis to remove the anonymity of the blockchain.
Although Bit The coin blockchain is nearly impossible to crack, but wallets are the weak link in the entire crypto chain. Since users are reluctant to enter their personal information when creating a wallet, when a hacker steals their tokens, they have no way to prove that it was a theft, and even if they can prove that the tokens belong to them, then The end result is still to no avail.
In fact, for victims of Bitcoin theft cases, trying to track down the stolen Bitcoins is futile. When you hold Bitcoins in a private wallet (which only you have access to), you act as your own banking institution, and only you are responsible if your private keys are lost or the coins in your wallet are stolen.
The value of privacy is growing every day. Both those who want to hide information and ordinary people need privacy. And it’s even more important for cryptocurrency traders and investors.
In addition to dust and other deanonymizing attacks, you also need to beware of other rapidly emerging security threats in the encryption field, such as cryptojacking, ransomware, and phishing attacks wait.