March 8, 2023
3 min read
Bitcoin dust is such a small amount that there is no point to send it because it’s much less than the network fee for the transaction.
The scammers are figured out that users didn’t pay attention to these tiny amounts, so they began to send them a few Satoshi to increase the probability of identifying users.
Since Bitcoin is open and decentralized, anyone can create a wallet and connect to the network without providing any personal data, but all actions are transparent and you can easily trace the whole transaction history of a certain public address. For that reason, it turns out that Bitcoin is not entirely anonymous. This feature is used by some scammers in order to track users transactions and even reveal their identities for extortion purposes.
To fully keep their anonymity, some users utilize so-called HD (hierarchical deterministic) wallets which imply a lot of Bitcoin addresses for a certain wallet user. For example, 1 BTC can be sent and spread to 5 different addresses in different amounts, but all 5 addresses belong to the same person and he or she has 1 Bitcoin in the total amount.
Let’s see how the attack works on HD wallets, as ones are hard to track. After the dust gets to one either of the addresses, HD wallets can include this dust in the next transactions as Unspent Transaction Output (UTXO). Thus scammers can track further operations, it may allow them to identify the links between addresses and ultimately companies or person behind them.
The scammer sends the dust to some address and waits for its use in combination with other outputs, thus identify which addresses also belong to this user.
Commonly, cryptocurrency users keep their money partly in their own wallet and on exchange accounts. In this case, ultimately their personal data on the exchange service can be associated with their personal wallets by the dust attack. Initially, dust attacks were performed for Bitcoin users. In fact, all cryptos running on the public blockchain are prone to a dusting attack.
Bitcoins balance in your wallet represents the sum of “inputs” and unspent outputs. Thus, 1 bitcoin can represent the sum of 0.3, 0.2, 0.5 BTC or other smaller amounts up to the dust like 0.00000248 BTC.
If you can build the transaction outputs in your wallet, then this dust can be simply left and not used. But most services collect transactions from the nearest inputs and the user cannot control it. If the dust was not used as spent outputs, then the scammers cannot establish the connections between the addresses that they need to deanonymize the wallet owner.
So its not a big problem for cryptocurrency enthusiasts who don’t use they cryptos for malicious activities. But the scammers who send the dust spam across the network cause inconvenience to everyone else, because other users have to pay higher fees to avoid delays when their transactions are waiting for included in the block.
If you see the suspicious amount of received Satoshi’s and get messages like I know who you are, don’t respond to provocations. Frauds cant harm you if they don’t have access to your seed phrase and private keys.
No one will have access to your funds, if you use non-custodial wallets.
We are happy to provide you with the most convenient way to manage all of your cryptocurrency assets in one single interface of Atomic Wallet:
Discover how IOTA, an open-source distributed ledger, is transforming the Internet of Things ecosystem with its feeless data and value transfer protocol. Learn how IOTA's unique DAG technology sets it apart from other cryptocurrencies.
Discover how Conflux Network bridges communities and economies, providing a secure, stable, and predictable platform. Explore its unique Tree-Graph consensus protocol and its integrated economic-driven governance mechanisms.
Explore the potential of Curve DAO Token (CRV), the utility token for the DeFi protocol, operating on the Curve DEX. Learn about its role in the decentralized finance market and how it powers liquidity provision.