Opinion: Dr. Casey Ford, researcher of technologies
Web3 threw himself at a wave of decentralization. The applications used (DAPP) increased by 74% in 2024, and individual wallets by 485%, when the total value (TVL) is closed in decentralized finances (DEFI) with a record of $ 214 billion in a record level. The industry also goes straight to the condition if it does not wake up.
Because Elon Musk was teasing in the placement of the US treasury on blockchain, though poorly thought out, the troughs rotate when the crypto is deregulated. But when they do this, it is web3 ready for “protection [user] Data ”, how do the Deputy Musk undertake? If not, we are all on the edge of the global data security crisis.
The crisis boils down to sensitivity in the heart of the digital world: the supervision of metadata of all existing networks, even decentralized Web3. AI technologies are currently in the foundation of supervision systems and serve as acceleration. Anonymity networks offer an exit from this condition. But he must start with metadata security around the world.
Metadata is a new supervision limit
Metadata is an overlooked raw material for AI supervision. Compared to the data from the charging, the metadata is light, and therefore easy to process. AI systems stand out best here. An aggregated metadata can reveal much more than encrypted content: behavioral patterns, contact networks, personal desires and, ultimately predictability. And it is legally encrypted by unprotected in an encrypted manner Communication is now in some regions.
While metadata are part of all digital assets, metadata, which leaks from the encrypted E2E movement, expose us and what we do: IPS, time signatures, packet size, encryption formats, and even portfolio specifications. All this is fully legible for opponents supervising the network. Blockchain transactions are no exception.
Goldina of detailed records of everything we do can emerge from digital piles of rubbish. Metadata is our digital unconsciousness and can be obtained what machines can collect them for profit.
Blockchain boundaries
Protection of metadata transactions was a reflection of blockchain technology. Krypto does not offer anonymity Despite the reactionary of the Industry Association with illegal trade. Offers NicknameThe ability to keep tokens in the wallet with the selected name.
Last: How to tokenize real Bitcoin resources
Harry Halpin and Ania Piotrowska have was diagnosed Situation:
“[T]Public nature of the Bitcoin transaction book […] It means that everyone can observe the flow of coins. [P]Seudonym addresses do not provide any significant level of anonymity, because everyone can collect the addresses of the contractor of any transaction and reproduce the transaction chain. “
Because all chain transactions are public, anyone who runs a full node can have a panoptic sight of chain activity. In addition, metadata such as IP addresses attached to the nicknames of wallets can be used to identify people’s location and identity, if tracking technologies are sufficiently sophisticated.
This is the basic problem of metadata supervision in blockchain economics: supervisory systems can effectively remove our financial movement through any talented side.
Knowledge is also uncertainty
Knowledge is not only power, as the saying says. It is also the basis on which we are used and deprived of power. There are at least three general risk of metadata in Web3.
-
Fraud: Financial uncertainty and supervision are internally related. The most serious hacks, thefts or fraud depend on cumulative knowledge about the goal: their resources, transaction history and who they are. DAPPRADAR estimates a loss of $ 1.3 billion due to “hacks and feats”, such as phishing attacks in 2024.
-
Leaks: Wallets that allow access to decentralized tokenomy are based on leaky centralized infrastructure. Studies DAPPS and wallets have shown the dissemination of IP leaks: “The existing portfolio infrastructure is not paid for the privacy of users. The sites abuse the portfolios of fingerprint users online, and DAPP and wallets leaks the user’s portfolio address to third pages. “Pseudonymism is pointless, if the identity and patterns of human transactions can be easily revealed with metadata.
-
Chain consensus: Chain consensus is a potential point of attack. One example is the latest Celestia initiative to add a layer of anonymity to darken validation metadata against specific attacks that strive to disturb the consensus of the chain in the sampling process of the availability of Celestia data (DAS).
WEB3 protection by anonymity
As the web3 increases, the amount of metadata with people offered to newly reinforced supervision systems.
Apart from VPN
The Virtual Private Network (VPN) technology is currently in decades. Lack of progress is shocking, and most VPN remains in the same centralized and reserved infrastructure. Networks such as Tor and Dandelion have entered as decentralized solutions. However, they are still exposed to the supervision of global opponents capable of “time analysis” by controlling the entrance and output nodes. Even more advanced tools are needed.
Noise networks
All supervision is looking for designs in a full noise network. By further darkening of communication patterns and metadata, such as IPS from metadata generated by movement, possible attack vectors can be significantly reduced, and metadata patterns can be fallen into nonsense.
Anonymous networks appeared for anonymous sensitive traffic, such as communication or cryptographic transactions through noise: covering, darkening and mixing data. In the same spirit, other VPN, such as Mullvad, introduced programs such as Daita (defense against AI movement analysis), which aims to add “distortions” to its VPN network.
Climbing codes
Regardless of whether he defends people against the murder in tomorrow’s wars of drones, or securing their Onchain transactions, new anonymity networks are needed to write codes of what makes us all to the sights: metadata our lives online leave the footsteps.
The condition of the capture is already here. Machine learning nourishes our data. Instead of leaving people’s details, web3 systems and anonymity can make sure that what ends in AI teeth is effectively rubbish.
Opinion: Dr. Casey Ford, researcher of technologies.
This article is used for general information purposes and should not be and should not be treated as legal or investment advice. The views, thoughts and opinions expressed here are themselves and do not necessarily reflect or represent the views and opinions of Cointelegraph.