Skip to main content

The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 9603))

Abstract

We present the first large-scale survey to investigate how users experience the Bitcoin ecosystem in terms of security, privacy and anonymity. We surveyed 990 Bitcoin users to determine Bitcoin management strategies and identified how users deploy security measures to protect their keys and bitcoins. We found that about 46% of our participants use web-hosted solutions to manage at least some of their bitcoins, and about half of them use exclusively such solutions. We also found that many users do not use all security capabilities of their selected Bitcoin management tool and have significant misconceptions on how to remain anonymous and protect their privacy in the Bitcoin network. Also, 22% of our participants have already lost money due to security breaches or self-induced errors. To get a deeper understanding, we conducted qualitative interviews to explain some of the observed phenomena.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    More precisely a Merkle-Tree Hash over those transactions, for details see the specifications [4, 5, 17].

  2. 2.

    bitcoin.org.

  3. 3.

    https://www.soscisurvey.de/.

  4. 4.

    https://bitcointalk.org/index.php?topic=1114149.0.

  5. 5.

    http://sourceforge.net/p/bitcoin/mailman/bitcoin-list/?viewmonth=201507.

  6. 6.

    https://twitter.com/bit_use.

  7. 7.

    http://bitcoin-austria.at/.

  8. 8.

    We purchased our 6.3965 BTC at https://coinfinity.co/.

  9. 9.

    https://blockchain.info/address/12yeU5ymM67SL5UWVSwErAgwVwwaTd1Nma.

  10. 10.

    http://www.coindesk.com/new-coindesk-report-reveals-who-really-uses-bitcoin/.

  11. 11.

    https://bitcoinarmory.com/.

  12. 12.

    https://www.kraken.com/.

  13. 13.

    https://www.casascius.com/.

  14. 14.

    https://mycelium.com/.

  15. 15.

    https://en.bitcoin.it/wiki/Wallet.

References

  1. Biryukov, A., Khovratovich, D., Pustogarov, I.: Deanonymisation of clients in Bitcoin P2P network. CoRR, abs/1405.7418 (2014)

    Google Scholar 

  2. Baur, A.W., Bühler, J., Bick, M., Bonorden, C.S.: Cryptocurrencies as a disruption? Empirical findings on user adoption and future potential of bitcoin and co. In: Janssen, M., Mäntymäki, M., Hidders, J., Klievink, B., Lamersdorf, W., Loenen, B., Zuiderwijk, A. (eds.) I3E 2015. LNCS, vol. 9373, pp. 63–80. Springer, Cham (2015). doi:10.1007/978-3-319-25013-7_6

    Chapter  Google Scholar 

  3. Biryukov, A., Pustogarov, I.: Bitcoin over Tor isn’t a good idea. arXiv preprint arXiv:1410.6079 (2014)

  4. Bitcoin Community: Bitcoin developer guide, October 2014. Accessed 14 Oct 2014

    Google Scholar 

  5. Bitcoin Community: Bitcoin protocol specification, October 2014. Accessed 14 Oct 2014

    Google Scholar 

  6. Blockchain.info: Bitcoin currency statistics, April 2014. Accessed 05 Apr 2014

    Google Scholar 

  7. Bonneau, J., Miller, A., Clark, J., Narayanan, A., Kroll, J.A., Felten, E.W.: SoK: research perspectives and challenges for Bitcoin and cryptocurrencies (2015)

    Google Scholar 

  8. Eskandari, S., Barrera, D., Stobert, E., Clark, J.: A first look at the usability of Bitcoin key management. In: Workshop on Usable Security (USEC) (2015)

    Google Scholar 

  9. Reid, F., Harrigan, M.: An analysis of anonymity in the Bitcoin system. In: 2011 IEEE International Conference on Privacy, Security, Risk, and Trust, and IEEE International Conference on Social Computing (2011)

    Google Scholar 

  10. Garay, J., Kiayias, A., Leonardos, N.: The Bitcoin backbone protocol: analysis and applications. In: Oswald, E., Fischlin, M. (eds.) EUROCRYPT 2015. LNCS, vol. 9057, pp. 281–310. Springer, Heidelberg (2015). doi:10.1007/978-3-662-46803-6_10

    Google Scholar 

  11. Garfinkel, S.L., Margrave, D., Schiller, J.I., Nordlander, E., Miller, R.C.: How to make secure email easier to use. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 701–710. ACM (2005)

    Google Scholar 

  12. Garfinkel, S.L., Miller, R.C.: Johnny 2: a user test of key continuity management with S/MIME and outlook express. In: Proceedings of the 2005 Symposium on Usable Privacy and Security, pp. 13–24. ACM (2005)

    Google Scholar 

  13. Gaw, S., Felten, E.W., Fernandez-Kelly, P.: Secrecy, flagging, and paranoia: adoption criteria in encrypted email. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 591–600. ACM (2006)

    Google Scholar 

  14. Gervais, A., Ritzdorf, H., Karame, G.O., Capkun, S.: Tampering with the delivery of blocks and transactions in Bitcoin. Technical report, Cryptology ePrint Archive, Report 2015/578 (2015). http://eprint.iacr.org

  15. Goldfeder, S., Gennaro, R., Kalodner, H., Bonneau, J., Kroll, J., Felten, E.W., Narayanan, A.: Securing Bitcoin wallets via a new DSA/ECDSA threshold signature scheme. Accessed 09 June 2015

    Google Scholar 

  16. Heilman, E., Kendler, A., Zohar, A., Goldberg, S.: Eclipse attacks on Bitcoin’s peer-to-peer network. In: 24th USENIX Security Symposium (USENIX Security 15), Washington, D.C., pp. 129–144. USENIX Association, August 2015

    Google Scholar 

  17. Okupski, K.: Bitcoin protocol specification, October 2014. Accessed 14 Oct 2014

    Google Scholar 

  18. Lazar, J., Feng, J.H., Hochheiser, H.: Research Methods in Human-Computer Interaction. Wiley, Hoboken (2010)

    Google Scholar 

  19. Moore, T., Christin, N.: Beware the middleman: empirical analysis of Bitcoin-exchange risk. In: Sadeghi, A.-R. (ed.) FC 2013. LNCS, vol. 7859, pp. 25–33. Springer, Heidelberg (2013). doi:10.1007/978-3-642-39884-1_3

    Chapter  Google Scholar 

  20. Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system, December 2008

    Google Scholar 

  21. NIST: FIPS 180–4: Secure Hash Standard (SHS), March 2012

    Google Scholar 

  22. Sheng, S., Broderick, L., Koranda, C.A., Hyland, J.J.: Why Johnny still can’t encrypt: evaluating the usability of email encryption software. In: Symposium on Usable Privacy and Security (2006)

    Google Scholar 

  23. Wharton, C., Rieman, J., Lewis, C., Polson, P.: The cognitive walkthrough method: a practitioner’s guide. In: Usability Inspection Methods, pp. 105–140. Wiley (1994)

    Google Scholar 

  24. Whitten, A., Tygar, J.D.: Why Johnny can’t encrypt: a usability evaluation of PGP 5.0. In: Usenix Security, vol. 1999 (1999)

    Google Scholar 

Download references

Acknowledgements

This research was funded by COMET K1, FFG – Austrian Research Promotion Agency and by FFG Bridge Early Stage 846573 A2Bit. We would also like to thank Martin Mulazzani, Artemios G. Voyiatzis and Matthew Smith for their useful comments and feedback. Furthermore, we would like to thank Elizabeth Stobert for her valuable feedback and for her help in recruiting participants.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Katharina Krombholz .

Editor information

Editors and Affiliations

Appendices

A CMT Categorization

In this section we discuss the term Coin Management Tool and provide a methodology to categorize CMTs according to the degree of control and verifiability a user can exercise with his respective client. The proposed scheme is tailored to Bitcoin-like cryptocurrencies, but explicitly designed in an utmost generic way so that it can be applied to other derived cryptocurrencies as long as they are not fundamentally different in their design. Our approach used the evaluation framework from [8] as a starting point. A categorization according to our scheme allows users to quickly distinguish clients according to their underlying security model and hence allows users to make an informed decision on the level of confidence and trust they can put into an individual client.

1.1 A.1 Definitions

When Bitcoin was in its infancy bitcoind was the only available Bitcoin client which performed all required tasks: mining management, P2P network communication and blockchain management, key management and virtual asset management. With the increased popularity of Bitcoin and cryptocurrencies in general, more and more software was developed which focused on a subset of individual tasks of the original implementation. Moreover, the design of Bitcoin allows users to use it even if they do not run mining software or a full P2P client (full node). As a result there exists software with varying feature sets where the handling of public-private key pairs is the most sensitive and hence the most common core feature. A Bitcoin wallet was originally defined as a collection of private keysFootnote 15. Since this definition is very narrow, we introduced the broader definition of a Coin Management Tool (CMT) to account for the other areas without whom most cryptocurrencies would not work. Especially the network and blockchain layer of Bitcoin and other cryptocurrencies is not only important for the integrity of the system as a whole, but has a significant impact on the security and privacy of each and every end user.

1.2 A.2 Categorization

To categorize CMTs, we first identified critical CMT tasks which are directly related to security and privacy issues. This covers aspects regarding key management like generating keys/addresses and signing transactions, as well as P2P network communication and blockchain management like handling connections as well as verifying and storing the blockchain. These core tasks can be used to divide CMTs into five different categories. A client can be in more than one category depending on its configuration.

  • cat. 0: A client which runs on a user-controlled device and is able to perform key management operations, but cannot perform any P2P network communication. Therefore, it is not a stand-alone solution. This includes some dedicated hardware clients/wallets and cold-storage clients which require a second online device for transaction processing.

  • cat. I: A client which runs on a user-controlled device and performs all P2P network communication and blockchain verification related tasks, keeps a copy of the full blockchain, is able to perform all key management related operations and executes the mining algorithm. In other words, this is a client which can perform all required tasks to operate a cryptographic currency (e.g., the Bitcoin core implementation bitcoind when the option setgenerate true is set).

  • cat. II: A client which runs on a user-controlled device and performs all P2P tasks related to network communication and blockchain verification, keeps a copy of the full blockchain and is able to perform all key management related operations. This type of client is sometimes referred to as thick-client or full-node.

  • cat. III: A client which runs on a user-controlled device and performs certain P2P tasks related to network communication and blockchain verification but does not keep a copy of the full blockchain, although, it is able to perform all key- management-related operations. This type of client is sometimes referred to as thin-client or mobile-client/wallet and includes so-called SPV-clients/wallets (Simplified Payment Verification) e.g., Electrum.

  • cat. IV: A client which does not run on a user-controlled device and where all tasks are performed by a trusted third party on behalf of the user. This type of client is sometimes referred to as hosted- or web-client/wallet. Thereby it is not relevant if the key management is handled in the browser (e.g., via JavaScript) since this would require the user to download (and verify) the script code from the website of the third party every time he/she wants to use it.

B Interview Questions

Questions with answer options as “( )” are multiple choice checkboxes whereas answer possibilities marked alphabetical e.g. “a)” are single selections.

1.1 B.1 BTC Demographics

 

Q1 :

Please input which year you started using Bitcoin:

a) 2009 b) 2010 c) 2011 d) 2012 e) 2013 f) 2014 g) 2015

Q2 :

Select which main features are responsible for you using Bitcoin (multiple selections possible):

( ) The opportunity of financial gain

( ) Curiosity

( ) Anonymous nature

( ) Decentralized nature

( ) A friend/colleague suggested to me to start using Bitcoin

( ) The possibility to internationally transfer money with relatively low fee

( ) The possibility to accept bitcoins for my services or for my products

( ) Other:

Q3 :

What is the estimated sum of bitcoins you are holding?

a) I hold approximately b) I do not want to specify

Q4 :

Please provide what services or products you pay for with bitcoins (multiple selections possible):

( ) Bars, restaurants

( ) Bitcoin gift cards

( ) Donations, tipping

( ) Drugs

( ) Gambling sites

( ) Hotels, travel

( ) Online marketplaces and auctions

( ) Online shopping (Newegg, ...)

( ) Altcoin (e.g. Litecoin, ...)

( ) Physical stores that accept bitcoins

( ) Underground marketplaces

( ) Virtual goods (webhosting, online newspapers, ...)

( ) Medium for currency exchange

( ) Other:

Q5 :

What do you think are the most likely risks associated with Bitcoin?

Q6 :

Please select the crypto currencies you are holding or using besides Bitcoin (multiple selections possible):

( ) I do not use other crypto currencies

( ) BanxShares

( ) BitShares

( ) BlackCoin

( ) Bytecoin

( ) Counterparty

( ) Dash

( ) Dogecoin

( ) Litecoin

( ) MaidSafeCoin

( ) MonaCoin

( ) Monero

( ) Namecoin

( ) Nxt

( ) Peercoin

( ) Primecoin

( ) Ripple

( ) Startcoin

( ) Stellar

( ) SuperNET

( ) Vertcoin

( ) YbCoin

( ) Other

Q7 :

Select the Bitcoin exchanges you have used in the past or you are using on regularly (multiple selections possible):

( ) None

( ) BanxIO

( ) Bitcoin Exchange Thailand

( ) Bittrex

( ) Bitcoin Indonesia

( ) bitcoin.de

( ) Bitfinex

( ) Bitstamp

( ) BitX South Africa

( ) BTC-e

( ) BTC38

( ) BTCChina

( ) CCEDK

( ) Cryptsy

( ) Gatecoin

( ) hibtc

( ) Kraken

( ) Mt. Gox

( ) OKCoin

( ) Poloniex

( ) QuadrigaCX

( ) The Rock Trading

( ) VirWox

( ) Other:

Q8 :

What do you think are the greatest benefits of Bitcoin?

Q9 :

How often do you perform Bitcoin transactions?

a) At least once a day b) At least once a week c) At least once a month d) At least once every six months e) At least once a year f) Less than once a year

 

1.2 B.2 BTC Wallets

 

Q10 :

Please tick which wallets you are \({<}{\text {b}}{>}\)currently\({<}\text {/b}{>}\) using (multiple selections possible):

( ) Airbitz

( ) Armory

( ) Bitcoin Core

( ) Bitcoin Wallet (Schildbach Wallet)

( ) BitGo

( ) Bither

( ) breadwallet

( ) Circle

( ) Coinapult

( ) Coinbase

( ) Coinkite

( ) Coinomi

( ) Electrum

( ) Green Address

( ) Hive

( ) Ledger Nano

( ) mSIGNA

( ) MultiBit

( ) Mycelium

( ) Ninki

( ) TREZOR

( ) Xapo

( ) Not in list

Q11 :

Why did you choose to use multiple wallets to manage your bitcoins?

 

1.3 B.3 Wallet Usage

For every selected wallet in Q10 we asked the following questions.  

Q12 :

Why did you choose \(\langle \)wallet-name\(\rangle \) to manage your Bitcoins?

Q13 :

How many bitcoins do you have approximately in this wallet?

a) I hold approximately \(\langle \)textfield\(\rangle \) bitcoins. b) I do not want to specify

Q14 :

Is this wallet password protected?

a) Yes b) No c) I do not care d) I do not know

Q15 :

Is this wallet encrypted?

a) Yes b) No c) I do not care d) I do not know

Q16 :

Is this wallet backed up?

a) Yes b) No c) I do not know

 

1.4 B.4 BTC Mining

 

Q17 :

Are you currently mining bitcoins?

a) Yes, since b) No, but I have mined from-to c) No, I have never mined bitcoins

Q18 :

How many bitcoins have you mined in total?

a) I mined approximately b) I do not want to specify

Q19 :

Do you or have you participated in mining pools?

a) Yes b) No

Q20 :

Please tick the names of the mining pools you have or are participating in (multiple mentions possible):

( ) 21 Inc.

( ) AntPool

( ) Bitcoin Affiliate Network

( ) BitFury

( ) BitMinter

( ) Bitsolo

( ) BTCChina Pool

( ) BTC Guild

( ) BTC Nuggets

( ) BW.COM

( ) EclipseMC

( ) Eligius

( ) F2Pool

( ) GHash.IO

( ) Kano CKPool

( ) KnCMiner

( ) MegaBigPower

( ) P2Pool

( ) Slush

( ) Telco 214

( ) Other:

 

1.5 B.5 BTC Server

 

Q21 :

Do you run a full Bitcoin server that is reachable for others from the Internet?

a) Yes b) No

Q22 :

Please provide some reasons on why you operate a full Bitcoin server (multiple selections possible):

( ) Fast transaction propagation

( ) Double-spending detection

( ) Network analysis

( ) Support the Bitcoin network

( ) Other

 

1.6 B.6 BTC Security Risks

 

Q23 :

How would you estimate the risk of monetary loss for Bitcoin compared to credit cards?

(7 Point Likert-Scale from “High” to “Low”)

Q24 :

How high do you think is the risk of becoming a victim of a successful double spending attack?

(7 Point Likert-Scale from “High” to “Low”)

Q25 :

How high or low would you estimate the risk for malware that steals your Bitcoins?

(7 Point Likert-Scale from “High” to “Low”)

Q26 :

How would you estimate the risk of monetary theft in case the device with your wallet gets lost or stolen?

(7 Point Likert-Scale from “High” to “Low”)

Q27 :

How would you estimate the risk of de-anonymization?

(7 Point Likert-Scale from “High” to “Low”)

Q28 :

How high do you think the risk of cryptographic flaws is?

(7 Point Likert-Scale from “High” to “Low”)

Q29 :

How high do you think is the risk of security vulnerabilities in hosted/web wallets or Exchange services?

(7 Point Likert-Scale from “High” to “Low”)

Q30 :

How high do you think is the risk of key loss due to a device failure?

(7 Point Likert-Scale from “High” to “Low”)

Q31 :

How high do you think is the risk that the Bitcoin network is temporarily not available?

(7 Point Likert-Scale from “High” to “Low”)

Q32 :

How high do you think is the risk of a centralization of mining?

(7 Point Likert-Scale from “High” to “Low”)

Q33 :

How high do you think is the risk of a strong fluctuation in the Bitcoin exchange rate (e.g. BTC to USD and vice versa)?

(7 Point Likert-Scale from “High” to “Low”)

 

1.7 B.7 BTC Anonymity

 

Q34 :

Do you think that Bitcoin usage is anonymous?

a) Yes, Bitcoin is fully anonymous b) No, Bitcoin is not anonymous c) Not per se, but it can be used in an anonymous manner

Q35 :

Do you think it is possible to follow your transactions?

a) Yes b) No

Q36 :

Have you ever used Bitcoin over \(\text {Tor}{<}\text {b}\) title = “Tor is free software and an open network that helps you defend against traffic analysis, a form of network surveillance that threatens personal freedom and privacy, confidential business activities and relationships, and state security. More info at www.torproject.org”?

a) Yes b) No

Q37 :

Do you take additional steps to ensure your privacy using Bitcoin?

a) Yes b) No

 

1.8 B.8 BTC Security Breaches

 

Q38 :

Have you ever lost your bitcoins or Bitcoin keys?

a) Yes b) No

Q39 :

Please select the reason for your key/Bitcoin loss (multiple selections possible):

( ) Hardware failure (e.g. hard drive broke, etc.)

( ) Software failure (e.g. keyfile corruption, etc.)

( ) Self induced event (e.g. hard drive formatted, physical device lost, etc.)

( ) Malicious event (e.g. malware, hacker, etc.)

( ) Other

Q40 :

Have you been able to recover your keys?

a) Yes, b) No,

Q41 :

How many bitcoins did you loose due to this incident?

a) bitcoins b) I do not want to specify

Q42 :

Please select the security incidents you have been affected by (multiple selections possible):

( ) None

( ) Mt. Gox incident

( ) Silk Road bust

( ) inputs.io hack

( ) Pony botnet malware

( ) Pyramid schemes/HYIPS (High yield investment programs)

( ) Mining hardware scams (Labcoin, Active Mining Corporation, Ice Drill, AsicMiningEquipment.com Dragon-Miner.com, ...)

( ) Mining pool scams

( ) Scam wallets

( ) Bitcoin exchange scam

( ) Other:

Q43 :

How did you deal with the incident?

Q44 :

What was the approximate value of your lost bitcoins in USD?

a) USD b) I do not want to specify c) I do not know

 

1.9 B.9 Demographics

 

Q45 :

Please provide your age:

Q45 :

Please provide your gender:

a) Female b) Male c) Do not want to specify

Q46 :

Please select your highest completed level of education:

a) Did Not Complete High School b) High School/GED c) Some College d) Bachelor’s Degree e) Master’s Degree f) Advanced Graduate work or Ph.D. g) Not Sure

Q47 :

Do you work or study in a computer science related field?

a) Yes b) No

Q48 :

How would you describe yourself in terms of privacy behaviour?

A continouos slider between “I am not concerned about my privacy” and “I would describe myself as a privacy fundamentalist”

 

1.10 B.10 End

 

Q49 :

You can enter your Bitcoin address in the textfield below. Please make sure that your address is correct in order to receive your incentive.

Q49 :

This is the place where you can provide suggestions, complaints or any other information we may have forgotten to ask in the questionnaire.

 

C Address Signature

figure a

D Reference link issue

We had a problem in our implementation of this last page of the survey which also showed the link to the survey containing a random reference which should identify this particular participant in our rewarding scheme. If the CAPTCHA was not solved successfully the side reloads itself and would also calculate and show a different reference link. The references link will only be stored and linked to this particular participant if the CAPTCHA is entered correctly. Therefore, all users which just copied the first link and then entered a wrong CAPTCHA distributed a link we where not able to attribute correctly at the end of the survey.

Rights and permissions

Reprints and permissions

Copyright information

© 2017 International Financial Cryptography Association

About this paper

Cite this paper

Krombholz, K., Judmayer, A., Gusenbauer, M., Weippl, E. (2017). The Other Side of the Coin: User Experiences with Bitcoin Security and Privacy. In: Grossklags, J., Preneel, B. (eds) Financial Cryptography and Data Security. FC 2016. Lecture Notes in Computer Science(), vol 9603. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-54970-4_33

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-54970-4_33

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-54969-8

  • Online ISBN: 978-3-662-54970-4

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics