The results show that it is possible to track mixed Bitcoins from the deposited Bitcoins using address taint analysis and the number of potential transaction outputs can be significantly reduced with the filtering criteria
This paper introduces a novel tracking method called address taint analysis that focuses on tainting at the address level
Governance of blockchain communities is an emerging phenomenon, and involves interplay between a variety of different ecosystem stakeholders (software developers, PoW miners, PoS voters, cryptocurrency exchanges and payment providers, node operators, casual users and die-hard hodlers). The rules of the protocol dictate the relative power and influence of these groups.
Cryptocurrency relies on Free Open Source Software (FOSS) principles and practices, and can only work on open source principles. The cryptocurrency movement should be understood as part of the FOSS movement, or its successor.
Users' choice of using custodial or self-managed wallets depends on their assessment of the risk of human error (making a mistake themselves) and risk of betrayal (risk of being betrayed by the custodial service).
Cryptocurrency users fundamentally balance three types of risks that might result in coin loss: (1) Risk of Human Error, (2) Risk of Betrayal, (3) Risk of Malicious Attacks.
The authors note how the accounting of transactions, a trust in immutable code and algorithms, and the leveraging of distributed crowds and publics around vast interoperable databases all relate to longstanding issues of importance for the field.
This paper constructs a typology of emerging blockchain applications, consider the domains in which they are applied, and identify distinguishing features of this new technology.
In this paper we survey a number of interesting applications of blockchain technology not related to cryptocurrencies. As a matter of fact, after an initial period of application to cryptocurrencies and to the financial world, blockchain technology has been successfully exploited in many other different scenarios, where its unique features allowed the definition of innovative and sometimes disruptive solutions. In particular, this paper takes into account the following application scenarios: end-to-end verifiable electronic voting, healthcare records management, identity management systems, access control systems, decentralized notary (with a focus on intellectual property protection) and supply chain management. For each of these, we firstly analyse the problem, the related requirements and the advantages the adoption of blockchain technology might bring. Then, we present a number of relevant solutions proposed in the literature both by academia and companies.