{"id":16562,"date":"2024-08-30T18:00:00","date_gmt":"2024-08-30T15:00:00","guid":{"rendered":"https:\/\/forklog.com\/en\/the-end-of-anonymity-who-tracks-crypto-transactions-how-and-why\/"},"modified":"2024-08-30T18:00:00","modified_gmt":"2024-08-30T15:00:00","slug":"the-end-of-anonymity-who-tracks-crypto-transactions-how-and-why","status":"publish","type":"post","link":"https:\/\/forklog.com\/en\/the-end-of-anonymity-who-tracks-crypto-transactions-how-and-why\/","title":{"rendered":"The end of anonymity: who tracks crypto transactions, how, and why"},"content":{"rendered":"<p>The decentralised world is no longer as autonomous as it was a decade ago. Trends point to tighter regulation, closer identification of users and even individual wallets. In parallel, transaction-tracking tools are evolving\u2014useful to some for crafting trading strategies, to others for exposing illicit activity, and to a third group for manipulating markets.<\/p>\n<p>ForkLog spoke with Grigory Osipov, director of investigations at \u201cSHARD\u201d, about how analytics systems work, where they help\u2014and where they harm.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Who tracks cryptocurrencies\u2014and why<\/strong><\/h2>\n<p>Pro-government analytics firms (Chainalysis, Crystal, Elliptic, TRM Labs) monitor cryptocurrencies, declaring clear and benign aims: preventing the use of digital assets to launder illicit proceeds.<\/p>\n<p>Yet such activity can be bent to manipulation and abuse. Any service that, for one reason or another, has been used to move fiat through crypto while bypassing US\u2011regulated exchanges risks landing on the watchlist of the American firm Chainalysis.<\/p>\n<p>At the same time, many genuinely useful analytics services have emerged, offering insight into asset flows\u2014for instance, movements by <a href=\"https:\/\/forklog.com\/en\/news\/cryptoquant-observes-generational-shift-among-bitcoin-whales\">\u201cwhale\u201d addresses<\/a>.<\/p>\n<p>Tracking is also used for investment, focusing on exchange metrics and market trends. A simple example is copy trading: analysing and mirroring the actions of large players, studying their portfolios to inform one\u2019s own strategy.<\/p>\n<h2 class=\"wp-block-heading\"><strong>The problem of transaction anonymity<\/strong><\/h2>\n<p>Questions of crypto tracking sit alongside those of user privacy. On the one hand, anonymous transactions confer freedom and safety, helping avoid unnecessary oversight and interference by third parties.<\/p>\n<p>On the other, state agencies seek to prevent illicit use of crypto. They push policies that require users to disclose information about their wallets, including mandatory <span data-descr=\"Anti-money laundering\" class=\"old_tooltip\">AML<\/span>\/<span data-descr=\"Know your customer\" class=\"old_tooltip\">KYC<\/span> procedures for centralised services. Such rules significantly constrain privacy, a stark contrast to the days when it was easy to stay under the radar.<\/p>\n<p>Anonymity in payments, then, is a balance between protecting private life and safeguarding society.<\/p>\n<h2 class=\"wp-block-heading\"><strong>What is cryptocurrency label<\/strong>ling<\/h2>\n<p>Although transactions on public blockchains are open, transparent and immutable, the identities of people or organisations behind specific addresses are not recorded. That preserves the confidentiality of operations while keeping deal structures transparent.<\/p>\n<p>As cryptocurrencies appeared, analytics firms began studying asset flows over long periods and from multiple angles. They use advanced visualisation tools and maintain carefully assembled databases mapping addresses to specific services and even individuals. This information is called labelling.<\/p>\n<p>Knowing a few addresses belonging to a given service, analytics systems can infer an entire group of wallets used by it\u2014sometimes numbering in the thousands. The value of such systems depends heavily on the quality and accuracy of the labelling, which can contain inaccuracies and errors.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Types of cryptocurrency labelling<\/strong><\/h2>\n<p>Depending on the entities involved, labelling can cover exchanges, crypto funds, mining pools, bridges and other segments. Of particular importance is \u201ccriminal\u201d labelling, which links addresses to darknet markets, casinos and mixers, as well as ransomware, hackers and financial pyramids.<\/p>\n<p>Ties between analytics systems and government agencies have turned these tools into instruments of market manipulation. If a blockchain address is flagged as linked to criminal activity, it effectively blocks cashing out through centralised venues that comply with anti\u2011money\u2011laundering rules.<\/p>\n<p>Beyond labelling, these systems classify addresses by risk levels based on their characteristics. Addresses can be \u201ccoloured\u201d according to alleged illicit activity or sanctions evasion. A key factor in such risk scoring is the presence of \u201ccriminal\u201d labelling.<\/p>\n<h2 class=\"wp-block-heading\"><strong>Ways to track cryptocurrency movements<\/strong><\/h2>\n<p>Alongside the big analytics suites, there are free or freemium services (Whale Alert, Cryptocurrency Alerting, BTC-parsing). They track a limited set of metrics\u2014for example, only whale transactions.<\/p>\n<p>The main methods include:<\/p>\n<ol class=\"wp-block-list\">\n<li><strong>Monitoring wallets that move large sums.<\/strong> Whale activity can be tracked via block explorers (Etherscan, Solscan and BscScan), which let users view transaction histories and balances for specific wallets\u2014surfacing significant fund movements. On 25 July 2024, an anonymous holder of 750 BTC stirred after 11 years of dormancy: the <span data-descr=\"1a6ZnTkz9bJDAQNvPeQWTeKGu2DFivbac\" class=\"old_tooltip\">address<\/span> moved the funds to a <span data-descr=\"bc1qcfv449necddl4utlje3m5r8e903377wq2fzglq\" class=\"old_tooltip\">new address<\/span> for storage. The previous activity on the first address was on 4 June 2013, when bitcoin traded at $120. An analysis of the deposit chain to the address via SHARD\u2019s tooling suggests the funds are not entirely clean: they show activity on darknet markets, and part of the money came from addresses of the shuttered BTC\u2011e exchange. The transaction may indicate that new market participants have gained access to stolen funds and plan to move them soon amid bitcoin\u2019s rising price. It may also have been done for security, moving coins from the old Legacy (P2PKH) format to the more modern, less vulnerable SegWit (P2WPKH) format.<\/li>\n<li><strong>Analysing transaction structure and on-chain volumes.<\/strong> Sudden surges in transaction volume or large transfers can signal whale activity. Trading terminals and charting platforms help visualise such patterns, allowing traders to anticipate potential market moves.<\/li>\n<li><strong>Monitoring exchange activity.<\/strong> Whales often trade on major venues. Order\u2011book flows and block trades can be watched on exchanges and via specialist dashboards. These data are useful for building strategies and forecasting market trends.<\/li>\n<li><strong>Tracking crypto portfolios.<\/strong> Trackers such as CoinStats and Blockpit let investors monitor all their assets in one place, offering a view of market trends and the performance of specific coins. They can aggregate data from multiple exchanges and wallets to provide a comprehensive picture of a user\u2019s holdings.<\/li>\n<li><strong>Advanced crypto\u2011analytics tools<\/strong>\u2014cluster analysis, heuristic analysis and other methods\u2014offer deeper insight into links between entities or groups on the network to tackle complex tasks.<\/li>\n<\/ol>\n<p>For example, on 11 August 2024 on Ethereum, 0.8776 ETH was sent from one address to another, while the fee totalled 34.62 ETH (~$87,500 at publication)\u2014nearly 35 times the amount sent. Such an operation is possible only with a manually set fee and only in wallets that allow that option. The sender\u2019s address is itself a validator on the Ethereum network.<\/p>\n<p>Immediately after the high\u2011fee transaction, the sender received a transfer from a phishing address that closely resembles the destination address at the beginning and end. There may be some link between the events, as the gap between the transactions was just a minute.<\/p>\n<p>As for refunding the overpaid fee, the funds went to the validator\u2019s address. Such funds are often returned to the unlucky sender for reputational reasons.<\/p>\n<p>With blockchain\u2011analytics methods and tools, one can investigate cases, gather data for informed trading decisions, and analyse competitors and counterparties.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The decentralised world is no longer as autonomous as it was a decade ago. Trends point to tighter regulation, closer identification of users and even individual wallets. In parallel, transaction-tracking tools are evolving\u2014useful to some for crafting trading strategies, to others for exposing illicit activity, and to a third group for manipulating markets. ForkLog spoke [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":16561,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"select":"","news_style_id":"","cryptorium_level":"","_short_excerpt_text":"","creation_source":"","_metatest_mainpost_news_update":false,"footnotes":""},"categories":[1144],"tags":[1292,1323,1256],"class_list":["post-16562","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-longreads","tag-aml-kyc","tag-investigations","tag-privacy-and-personal-data"],"aioseo_notices":[],"amp_enabled":true,"views":"50","promo_type":"","layout_type":"","short_excerpt":"","is_update":"","_links":{"self":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/16562","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/comments?post=16562"}],"version-history":[{"count":0,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/posts\/16562\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media\/16561"}],"wp:attachment":[{"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/media?parent=16562"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/categories?post=16562"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/forklog.com\/en\/wp-json\/wp\/v2\/tags?post=16562"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}