Abstract
This paper analyzes the supply and demand for Bitcoin-based Ponzi schemes. There are a variety of these types of scams: from long cons such as Bitcoin Savings & Trust to overnight doubling schemes that do not take off. We investigate what makes some Ponzi schemes successful and others less so. By scouring 11 424 threads on bitcointalk.org, we identify 1 780 distinct scams. Of these, half lasted a week or less. Using survival analysis, we identify factors that affect scam persistence. One approach that appears to elongate the life of the scam is when the scammer interacts a lot with their victims, such as by posting more than a quarter of the comments in the related thread. By contrast, we also find that scams are shorter-lived when the scammers register their account on the same day that they post about their scam. Surprisingly, more daily posts by victims is associated with the scam ending sooner.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
Notes
- 1.
- 2.
This list was curated by bitcointalk user mem here: https://bitcointalk.org/index.php?topic=75883.0.
References
Bartoletti, M., Carta, S., Cimoli, T., Saia, R.: Dissecting Ponzi schemes on Ethereum: identification, analysis, and impact. arXiv preprint arXiv:1703.03779 (2017)
Bohr, J., Bashir, M.: Who uses Bitcoin? an exploration of the Bitcoin community. In: Twelfth Annual International Conference on Privacy, Security and Trust, pp. 94–101. IEEE (2014)
Drew, J., Moore, T.: Automatic identification of replicated criminal websites using combined clustering. In: International Workshop on Cyber Crime, pp. 116–123. IEEE (2014)
Fleder, M., Kester, M.S., Pillai, S.: Bitcoin transaction graph analysis. arXiv preprint arXiv:1502.01657 (2015)
Liao, K., Zhao, Z., Doupé, A., Ahn, G.-J.: Behind closed doors: measurement and analysis of a CryptoLocker ransoms in Bitcoin. In: Eleventh APWG eCrime Researcher’s Summit, June 2016
Maurer, B., Nelms, T.C., Swartz, L.: “When perhaps the real problem is money itself!”: the practical materiality of Bitcoin. Soc. Semiot. 23(2), 261–277 (2013)
Moore, T., Han, J., Clayton, R.: The postmodern ponzi scheme: empirical analysis of high-yield investment programs. In: Keromytis, A.D. (ed.) FC 2012. LNCS, vol. 7397, pp. 41–56. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-32946-3_4
Neisius, J., Clayton, R.: Orchestrated crime: the high yield investment fraud ecosystem. In: Proceedings of the Eighth APWG eCrime Researcher’s Summit, Birmingham, AL, September 2014
Resnick, P., Kuwabara, K., Zeckhauser, R., Friedman, E.: Reputation systems. Commun. ACM 43(12), 45–48 (2000)
Shen, W., Hu, Y.J., Ulmer, J.R.: Competing for attention: an empirical study of online reviewers’ strategic behavior. MIS Quart. 39(3), 683–696 (2015)
Soska, K., Christin, N.: Measuring the longitudinal evolution of the online anonymous marketplace ecosystem. In: USENIX Security Symposium, pp. 33–48 (2015)
Vasek, M., Moore, T.: There’s no free lunch, even using bitcoin: tracking the popularity and profits of virtual currency scams. In: Böhme, R., Okamoto, T. (eds.) FC 2015. LNCS, vol. 8975, pp. 44–61. Springer, Heidelberg (2015). https://doi.org/10.1007/978-3-662-47854-7_4
Vasek, M., Thornton, M., Moore, T.: Empirical analysis of denial-of-service attacks in the bitcoin ecosystem. In: Böhme, R., Brenner, M., Moore, T., Smith, M. (eds.) FC 2014. LNCS, vol. 8438, pp. 57–71. Springer, Heidelberg (2014). https://doi.org/10.1007/978-3-662-44774-1_5
Xie, P., Chen, H., Hu, Y.J.: Network structure and predictive power of social media for the Bitcoin market (2017). https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2894089
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 International Financial Cryptography Association
About this paper
Cite this paper
Vasek, M., Moore, T. (2019). Analyzing the Bitcoin Ponzi Scheme Ecosystem. In: Zohar, A., et al. Financial Cryptography and Data Security. FC 2018. Lecture Notes in Computer Science(), vol 10958. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-58820-8_8
Download citation
DOI: https://doi.org/10.1007/978-3-662-58820-8_8
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-58819-2
Online ISBN: 978-3-662-58820-8
eBook Packages: Computer ScienceComputer Science (R0)