Bitcoin Security and Legal Concerns

Section VI: Bitcoin Framework

Army Cyber Institute

April 9, 2026

Agenda

  • Start with attack surfaces: ask what an adversary might try to achieve against Bitcoin and which parts of the system they would target.
  • Work through concrete examples: compare consensus, network, and incentive attacks, then study the 2010 overflow bug and the Bitcoin Gold 51% attack.
  • End with off-chain controls: examine how KYC and AML shape Bitcoin use through exchanges and custodians rather than through the protocol itself.

Why Attack Bitcoin?

  • Profit from fraud: spend the same coins twice or redirect newly created coins by reorganizing recent blocks.
  • Erode public trust: make the shared ledger appear unreliable or unsafe.
  • Impose policy control: censor transactions or monitor participants to advance state or institutional goals.
  • Cause strategic disruption: trigger instability or price dislocation to create economic or political leverage.

As we review these attacks, take a moment and assume an adversarial mindset and consider how an adversary can abuse weaknesses in bitcoin in unconventional ways.

What Can Consensus Attacks Achieve?

Recall the basic idea: a consensus attack tries to manipulate which version of recent ledger history honest nodes accept as the valid chain, which could possibly:

  • Spend the same coins twice: defraud merchants or trading platforms by reversing a recent payment.
  • Block selected transactions: delay or exclude chosen payments to enforce censorship.
  • Rewrite recent ledger history: perform short reorganizations that replace a few recent blocks.
  • Split the network: create conflicting versions of the ledger, causing confusion and loss of confidence.

Sybil Attacks

  • Attack premise: a Sybil attack on Bitcoin means surrounding the peer-to-peer network with many attacker-controlled nodes so a victim is more likely to connect to them.
  • Main practical goal: isolate one wallet, merchant, or full node in an eclipse attack, so the victim sees a distorted view of transactions and blocks.
  • How it works in Bitcoin: attackers try to fill peer tables, bias address gossip, or exploit restarts and weak peer diversity so the target reconnects mostly to attacker peers.
  • What it enables: delayed block and transaction relay, selective censorship, bad fee estimates, and support for follow-on attacks like double-spends against a specific target.
  • Why this is not a 51% attack: the attacker controls the victim’s network view, not global block production or the validity rules of Bitcoin itself.
  • Bitcoin’s defenses: outbound peer preference, subnet and address diversity, anchor and feeler connections, peer rotation, and denial-of-service penalties all raise the cost of maintaining fake identities at scale.

Partitioning Attacks

  • Attack premise: a partitioning attack tries to split nodes or miners into different network views so they stop learning about the same blocks at the same time.
  • Real-world mechanism: Internet routing incidents such as BGP hijacks and route leaks already happen in practice; research showed an AS-level attacker could exploit that infrastructure to isolate or delay Bitcoin traffic.
  • Why Bitcoin is exposed: mining and relay traffic are not spread evenly across the whole Internet, so a small number of routing choke points matter disproportionately.
  • What this can cause: slower block relay, wasted mining effort, temporary competing tips, and better conditions for targeted double-spend attempts.

PartitioningAttack cluster_a Region A cluster_b Region B A1 A1 A2 A2 A1->A2 A3 A3 A1->A3 A2->A3 B2 B2 A2->B2 limited route B1 B1 A3->B1 limited route B1->B2 B3 B3 B1->B3 B2->B3

Mitigations Against Eclipse/Partitioning

  • Diversify peers across ISPs, ASNs, and regions so one network domain cannot dominate what your node sees.
  • Prefer stable outbound peers and refresh connections over time instead of trusting a static or attacker-shaped peer set.
  • Limit concentration from the same subnet or hosting provider to make eclipse-style crowding harder.
  • For miners, exchanges, and other high-value operators, watch for routing anomalies and use redundant paths before trusting rapid settlement.

MitigationDiversity node0 Your node peer1 Peer Region A ASN 1 node0->peer1 peer2 Peer Region B ASN 2 node0->peer2 peer3 Peer Region C ASN 3 node0->peer3 isp1 ISP A node0->isp1 alternate path isp2 ISP B node0->isp2 alternate path

Timing & Latency Attacks

  • Attack premise: watch enough peers and infer the source from who relayed first.
  • First-spy heuristic: timestamp inv(tx) sightings and treat the earliest one as the best source guess.
  • What it reveals: a likely origin IP or network location that can be linked to a user or service.
  • Why it matters: research showed this can work in practice, and routing attackers can improve the view they observe.

sequenceDiagram
  participant U as User Node (Origin)
  participant P1 as Peer 1
  participant P2 as Peer 2 (Observer)
  participant N as Network Monitor
  U->>P1: inv(tx)
  P1-->>P2: inv(tx)
  P2-->>N: timestamp(tx seen)

“First-spy” correlates earliest sightings to infer origin

Mitigating Network Deanonymization

  • Goal: make it harder for observers to link a transaction to the node, IP address, or user who first created it.
  • Hide the apparent origin with Dandelion-style relay: send the transaction quietly along a short random path before broader broadcast.
  • Route through anonymity layers: use Tor or a VPN so the first peers you contact do not learn your real network address.
  • Add relay uncertainty: broad rebroadcasting by many peers makes the true origin harder to infer from timing alone.
  • Reduce on-chain linkability too: tools like CoinJoin help because network privacy is weaker if the transaction graph remains easy to trace.
  • Know the limits: these measures reduce, but do not eliminate, deanonymization; timing, amounts, and wallet behavior can still leak patterns.

Selfish Mining

  • Withhold found blocks and release them strategically to earn more than an honest miner with the same hash share.
  • In the original analysis, profitability begins above about 33% hash power with no relay edge, and can fall toward 25% with better fork-race wins.
  • Real-world comparison: Foundry USA calls itself the largest Bitcoin pool, and mempool research attributes about 28.7% of blocks over the last 24 months to Foundry USA.
  • That does not mean Foundry is selfish mining; it means pool concentration can drift into the same range discussed in the theory.

SelfishMining G0 Public chain Block h H1 Honest miners publish Block h+1 G0->H1 A1 Attacker finds Block h+1* G0->A1 A4 Publish private lead when ahead H1->A4 honest work risks being orphaned A2 Keep private and mine on hidden branch A1->A2 A3 Attacker finds Block h+2* A2->A3 A3->A4

Bitcoin Overflow Bug

  • August 15, 2010: block 74638 included a transaction that created about 184 billion BTC.
  • Root cause: an integer overflow in transaction validation let the outputs wrap around and appear valid.
  • Why it mattered: this directly violated Bitcoin’s fixed-supply rule and threatened trust in the system’s monetary integrity.
  • Why it was caught quickly: Bitcoin’s public ledger and open community made the anomaly visible almost immediately.

Emergency Response to the Overflow Bug

  • Developers released a patch within hours to reject the overflow transaction and close the validation flaw.
  • A software patch alone was not enough because the invalid coins were already recorded on-chain.
  • The network coordinated a rollback past block 74638, reorganizing onto a valid chain without the overflow transaction.
  • This is one of Bitcoin’s clearest examples of the community choosing security and rule integrity over strict immutability.

Implementation vs. Design

  • Bitcoin’s design rule was sound: total supply should remain capped.
  • The failure came from an implementation bug in the code that checked transaction outputs.
  • The lesson is broader than Bitcoin: secure designs still fail when the enforcing software is wrong.
  • Open-source review, audits, and fast disclosure are part of the security model, not afterthoughts.

Bitcoin Gold 51% Attack Discovery

Bitcoin Gold (BTG) is a 2017 Bitcoin fork that changed the mining algorithm in an effort to resist ASIC concentration, but it never approached Bitcoin’s hash rate or economic scale.

  • January 23-24, 2020: two deep reorganizations replaced about 29 blocks and enabled about 7,000 BTG in double-spends.
  • Some double-spends succeeded, but exchanges limited further losses by pausing activity and raising confirmation requirements.
  • Community analysis pointed to temporary majority hash control, likely rented on a much smaller Proof-of-Work network.
  • Why this matters for Bitcoin: BTG’s much lower hash rate made this plausible; doing the same on Bitcoin would be far costlier and easier to detect.
  • Key lesson: smaller PoW networks may not stop majority attacks outright, so services rely more on deep confirmations and fast monitoring.

Lessons: Small Community Risks

  • Hard forks often leave the new chain with much less hash power, liquidity, and ecosystem support.
  • Lower hash power makes majority attacks and deep reorganizations cheaper.
  • Concentrated mining means fewer independent defenders of the chain.
  • Trust depends on code, but also on the size and strength of the community securing it.

Hard fork vs. soft fork: A hard fork can split the chain if the community does not upgrade together. A soft fork tightens the rules without forcing the same kind of split. In Bitcoin, both only matter if enough miners, nodes, businesses, and users coordinate around the same rules.

Off-Chain Controls: KYC and AML

Bitcoin does not implement KYC or AML in the protocol; these are obligations imposed on regulated intermediaries around Bitcoin.

  • Know Your Customer (KYC) means identifying the customer and, where required, the beneficial owner before or during service.
  • Anti-Money Laundering (AML) means ongoing risk-based monitoring: recordkeeping, sanctions screening, suspicious-activity review, and required reporting.
  • Policy anchors include U.S. Bank Secrecy Act / FinCEN guidance and FATF standards for virtual-asset service providers.
  • Who is covered: exchanges, custodians, brokers, and payment processors; not a person simply holding keys and transacting peer-to-peer on Bitcoin.

How KYC/AML Apply to Bitcoin

  • Exchange onboarding links identity to Bitcoin activity: IDs, addresses, and account records connect real people to deposit and withdrawal flows.
  • Compliance teams monitor the ledger around those flows: they screen for sanctions exposure, risky counterparties, structuring, and suspicious patterns.
  • Blockchain analytics assist but do not replace judgment: clustering and risk scoring help, but firms still decide whether to freeze, delay, or report activity.
  • Bitcoin remains usable peer-to-peer, but converting to fiat or using custodial services pulls activity into the regulated perimeter.
  • Practical result: Bitcoin is pseudonymous on-chain, yet often identifiable at the on/off ramps where most users enter and exit.

Regulatory Pressure Beyond Bitcoin

  • Centralized digital money systems can be shut down outright: e-gold and Liberty Reserve show what happens when operators fail or evade AML/KYC obligations.
  • Privacy-enhancing assets face more exchange pressure because opaque transaction graphs make screening, traceability, and transfer-information compliance harder.
  • Bitcoin has generally remained listed because its public ledger, deep liquidity, and mature analytics/compliance tooling make it easier for exchanges to monitor flows than with strong privacy coins.
  • Big lesson: regulation often works by constraining gateways, liquidity, and access rather than by changing the protocol itself.

References

[1]
MIT Digital Currency Initiative, “51 Percent Attacks (Project Overview).” 2021. Available: https://www.dci.mit.edu/projects/51-percent-attacks
[2]
A. Narayanan, J. Bonneau, E. Felten, A. Miller, and S. Goldfeder, Bitcoin and Cryptocurrency Technologies. Princeton University Press, 2016.
[3]
Financial Action Task Force, “Updated Guidance for a Risk-Based Approach to Virtual Assets and Virtual Asset Service Providers.” Accessed: Oct. 20, 2025. [Online]. Available: https://www.fatf-gafi.org/en/publications/Fatfrecommendations/Guidance-rba-virtual-assets-2021.html
[4]
Bitcoin.org Developers, P2P Network (Developer Guide).” 2024. Available: https://developer.bitcoin.org/devguide/p2p_network.html
[5]
E. Heilman, A. Kendler, A. Zohar, and S. Goldberg, “Eclipse Attacks on Bitcoin’s Peer-to-Peer Network.” Accessed: Oct. 21, 2025. [Online]. Available: https://eprint.iacr.org/2015/263
[6]
M. Apostolaki, A. Zohar, and L. Vanbever, “Hijacking Bitcoin: Routing Attacks on Cryptocurrencies,” in 2017 IEEE Symposium on Security and Privacy (SP), May 2017, pp. 375–392. doi: 10.1109/SP.2017.29.
[7]
A. Biryukov, D. Khovratovich, and I. Pustogarov, “Deanonymisation of clients in Bitcoin P2P network,” in Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, New York, NY, USA: Association for Computing Machinery, 2014, pp. 15–29. doi: 10.1145/2660267.2660379.
[8]
S. B. Venkatakrishnan, G. Fanti, and P. Viswanath, “Dandelion: Redesigning the Bitcoin Network for Anonymity.” Accessed: Oct. 15, 2025. [Online]. Available: https://arxiv.org/abs/1701.04439
[9]
J. B. Sykes and N. Vanatko, “Virtual Currencies and Money Laundering: Legal Background, Enforcement Actions, and Legislative Proposals,” Congressional Research Service, Washington, D.C., CRS Report R45664.2, Mar. 2019. Available: https://www.congress.gov/crs_external_products/R/PDF/R45664/R45664.2.pdf
[10]
I. Eyal and E. G. Sirer, “Majority is Not Enough: Bitcoin Mining is Vulnerable,” in Financial Cryptography and Data Security, in LNCS, vol. 8437. 2014, pp. 436–454. doi: 10.1007/978-3-662-45472-5_28.
[11]
lfm, “Overflow bug SERIOUS.” Accessed: Oct. 21, 2025. [Online]. Available: https://bitcointalk.org/index.php?topic=823.0
[12]
NIST, CVE-2010-5139.” Accessed: Sep. 12, 2025. [Online]. Available: https://nvd.nist.gov/vuln/detail/CVE-2010-5139
[13]
J. Lovejoy, “Bitcoin Gold (BTG) was 51% attacked.” [Online]. Available: https://gist.github.com/metalicjames/71321570a105940529e709651d0a9765#file-btg-attacks-md
[14]
A. M. Antonopoulos, Mastering Bitcoin: Programming the open blockchain, Second edition. Sebastopol, CA: O’Reilly, 2017.
[15]
Financial Crimes Enforcement Network (FinCEN), “Application of FinCEN’s regulations to persons administering, exchanging, or using virtual currencies,” U.S. Department of the Treasury, Guidance FIN-2013-G001, Mar. 2013. Accessed: Mar. 27, 2026. [Online]. Available: https://www.fincen.gov/resources/statutes-regulations/guidance/application-fincens-regulations-persons-administering
[16]
Financial Crimes Enforcement Network (FinCEN), “Application of FinCEN’s regulations to certain business models involving convertible virtual currencies,” U.S. Department of the Treasury, Guidance FIN-2019-G001, May 2019. Accessed: Mar. 27, 2026. [Online]. Available: https://www.fincen.gov/index.php/resources/statutes-regulations/guidance/application-fincens-regulations-certain-business-models
[17]
FATF, FATF: Targeted Update on Implementation of the FATF Standards on Virtual Assets and VASPs (June 26, 2025).” [Online]. Available: https://www.fatf-gafi.org/en/publications/Fatfrecommendations/targeted-update-virtual-assets-vasps-2025.html
[18]
Office of Public Affairs, U.S. Department of Justice, “Former Liberty Reserve IT Manager Sentenced to 36 Months in Prison.” Accessed: Mar. 27, 2026. [Online]. Available: https://www.justice.gov/archives/opa/pr/former-liberty-reserve-it-manager-sentenced-36-months-prison
[19]
U.S. Attorney’s Office, District of Maryland, “Over $56.6 Million Forfeited In E-Gold Accounts Involved In Criminal Offenses.” Accessed: Mar. 27, 2026. [Online]. Available: https://www.justice.gov/usao-md/pr/over-566-million-forfeited-e-gold-accounts-involved-criminal-offenses