Tornado Cash is an Ethereum (ETH) mixer protocol that is used to improve transaction privacy by obscuring the on-chain link between the source and recipient of ether. Tornado Cash utilizes smart contracts that accept deposits made in ETH that are then withdrawn to other addresses. Since the withdrawal is made from the project’s smart contract liquidity pools, there is no way of knowing who the original sender is.
Tornado Cash generates a secret hash each time a user deposits assets. Their smart contracts then accept the deposit along with the hash, called a commitment. The commitment’s purpose is to identify the real sender and prove during the withdrawal process that the user in question owns the assets. By inputting the hash upon making the request, the user essentially confirms his identity while remaining anonymous on-chain to everyone else.
Greater anonymity in cryptocurrency payments became a priority when the FBI recovered Bitcoins from the Colonial Pipeline hackers. Before that it was theoretically possible but unproven that the public block-chain in Bitcoin could be traced to individuals. With Colonial it was proven possible. Since then hackers have been migrating to cryptocurrencies not using a public-block-chain but rather a private block-chain such as with Monero coin and now Tornado Cash. These cryptocurrencies provide the necessary anonymity to hide the identities of the users of the currency. This bodes well for privacy and bad for law enforcement.
While you’re likely not laundering cryptocurrency through Tornado Cash systems, you should be aware of the various threats that cryptocurrency investors face:
Additionally, these recommendations below will help you and your business stay secure with the various threats you may face on a day-to-day basis. All of the suggestions listed below can be gained by hiring CyberHoot’s vCISO services.
All of these recommendations are built into CyberHoot the product or CyberHoot’s vCISO Services. With CyberHoot you can govern, train, assess, and test your employees. Visit CyberHoot.com and sign up for our services today. At the very least continue to learn by enrolling in our monthly Cybersecurity newsletters to stay on top of current cybersecurity updates.
Sources:
Additional Reading:
Monero – The New Crypto For Hackers
Related Terms:
CyberHoot does have some other resources available for your use. Below are links to all of our resources, feel free to check them out whenever you like:
Note: If you’d like to subscribe to our newsletter, visit any link above (besides infographics) and enter your email address on the right-hand side of the page, and click ‘Send Me Newsletters’.
Discover and share the latest cybersecurity trends, tips and best practices – alongside new threats to watch out for.
Spoiler alert: If you’re still using “password123” or “iloveyou” for your login… it’s time for an...
Read moreStop tricking employees. Start training them. Take Control of Your Security Awareness Training with a Platform...
Read moreGet sharper eyes on human risks, with the positive approach that beats traditional phish testing.