top | item 7369874

(no title)

MiWDesktopHack | 12 years ago

The leaked data set contains:

  * screenshot of the back office application
  * OSX and Windows back office application binaries
  * btc_xfer_total_summary.txt
  * CV-Mark_Karpeles_20100325.pdf
  * home_addresses.txt
  * trades_summary.txt
  * btc_xfer_report.csv containing every deposit and withdraw 
  * mtgox_balances containing the balances of all user wallets
  * trades.zip containing monthly csv files of all trades within mtgox & coinlab between 2011-04 to 2013-11
  * trades csvs have fields:  
  Trade_Id	Date	User_Id	User	User_Id_Hash	 
  Japan	Type	Currency  Bitcoins	Money	
  Money_Rate	Money_JPY	
  Money_Fee	Money_Fee_Rate	Money_Fee_JPY	 
  Bitcoin_Fee	Bitcoin_Fee_JPY	User_Country	User_State
From this data you could reconstruct every trade within the site, and identify the address from transaction values.

This dataset could lead to loss of anonymity to a significant number of people in the cryptocurrency world.

discuss

order

Phlarp|12 years ago

If what you say is true and this data is sufficient to recreate and de-anonymize the trades on gox against withdrawals from their addresses shouldn't we be able to see if coins were actually stolen through tx malleability?