
Rai Ma’janab: Nime Technologies Researcher, PhD, Casey Ford
The web 3 विकेंद्रीकरण wandered on a wave. In 2024, applications (DAPPS) increased by 74 % and individual wallets increased by 485 %, with a total value lock (TVL) closed at a record height of around $ 214 billion in Finance (DEFI). However, the industry is also moving directly if it does not rise.
Since Elon Musk has teased the US Treasury on the blockchain, although it has been considered poor, Crypto has been dismissed. But when they do, is the web 3 “(user) ready to protect the web 3” (user) data as a covenant? If not, we are all on the verge of global data security crisis.
The crisis is at risk at the digital world center: monitoring of all existing networks, even monitoring, even with the web -3. AI technologies are now based on monitoring systems and operates as an Excelonant. Anonymous networks offer a way out of this capture. But it should start with metad data reservations on the board.
Metal is the new frontier of surveillance
Metal data is a raw material neglected by AI surveillance. Compared to the Payload data, the metadata is lightweight and thus easy to process Mass Mass. Here, AI systems perform well. The overall metal can reveal much more than encrypted content: behavior samples, networking networks, personal desires and ultimately, predicted. And legally, it is unsafe to the end (E2E) from the end (E2E) Communication is now in some areas.
Although the metad data is a part of all digital assets, the metad data leaked from the E -E -EE encrypted traffic exposes us and what we do: IPS, timing signatures, packet size, encryption forms and even wallet specifications. All this is fully capable of network monitoring opponents. Blockchain transactions are not exempt.
Digital junk piles can bring the gold mine of detailed records of each of our work. The metadata is our digital unconscious, and it is in the grip of any machines that can make it a profit of profit.
Blockchain limits
The protection of transactions meta data was a thought of blockchain technology. Crypto does not offer Anonymity Despite the industry’s reactionary association with illegal trade. It offers SurcoseThe ability to have tokens in the wallet with a selected name.
Recent: How to make real world assets on Bitcoin
Harry Hulpian and Ania Pyroteska have Diagnosis The situation:
“(T) He means the public nature of the Bitcoin transaction (…) that anyone can observe the flow of coins. (p) Seudonymous leaves do not provide any meaningful level of anonymity, because anyone can cut the address of any transaction and re -create a chain of transactions.
Since all China’s transactions are public, each one can have a complete node -running channel activity. In addition, if tracking technologies are quite sophisticated, IP addresses such as metadata can be used to identify people’s locations and identities.
This is the main issue of metadata monitoring in the blockchain economics: the surveillance systems can effectively display our financial traffic through any competent party.
Knowledge is also an insecurity
Knowledge is not just power, as the proverb goes. It is also the basis on which we are exploited and deprived of them. The web 3 has at least three common metal risks.
Fraud: Financial insecurity and monitoring are connected internally. Extremely serious hexes, thefts or scams depend on the knowledge of a target: their assets, transactions dates and who are they. Dapradar estimates that only $ 1.3 billion loss due to fashing attacks such as “hack and achievements” in 2024.
Leak: Witches that allow विकेंद्रीकृत tokenomix access to leaks depend on central infrastructure. Studies The spread of IP leaks from DAPPs and wallets shows: “The current wallet infrastructure is not in favor of consumers’ privacy. The website abuses wallets with online fingerprint users, and leaked the third party of DAPPs and wallets. The pseudonym is meaningless if people’s identity and transaction samples can be easily manifested through metadata.
China’s Consensus: China’s consensus is a potential point of attack. An example of this is a recent move by Celsia that can include a layer of anonymity not to disclose the availability of Celsia’s Data Data Data Data (DAS) process to disrupt the chains in the consensus of the chains.
Web 3 secure through anonymity
As the web 3 is increasing, the amount of metadata about people’s activities is also being offered to the new empowered monitoring system.
Beyond vpns
At this point, the Virtual Private Network (VPN) technology is decades old. The lack of growth is astonishing, most VPNs remain in the same central and proprietary infrastructure. Networks such as Tour and Dandeline stepped into a decentral solution. Yet they are still at risk of surveillance by global opponents who are capable of “time analysis” through the control of entry and external nodes. Even more modern tools are needed.
Noisy networks
All surveillance looks for samples in a noisy network. Traffic metadata can significantly reduce potentially attack vector vectors, through more unclear samples of communication and D -associated metadata -connected metadata, and metadata samples can be reduced to nonsense.
Anonymous networks have emerged to anonymously to sensitive traffic such as communication or crypto transactions through noise: traffic cover, time -consuming and data mixing. In the same spirit, other VPNs like Molwood have introduced programs such as DAATA (defense against AI-guide traffic analysis), which try to add “distortion” to their VPN network.
Rotate the codes
Whether it is defending people against the killings in yesterday’s drone wars or securing their high transactions, new anonymous networks need to rotate the code that we all target: metad data is left behind our online life.
The condition of the arrest is already here. Machine learning is feeding our data. Instead of leaving people’s data there, web 3 and anonymous system can make sure that what ends in AI’s teeth is effectively.
Rai Ma’janab: Researchers at Nim Technologies, PhD, Casey Ford.
This article is for general information purposes and is not intended and should not be taken as legal or investment advice. The views, ideas and opinions expressed here are alone by the author and do not necessarily reflect or represent the Quantal Graf’s ideas and opinions.