{"id":125181,"date":"2025-03-16T15:16:44","date_gmt":"2025-03-16T15:16:44","guid":{"rendered":"http:\/\/cryptospotters.net\/?p=125181"},"modified":"2025-03-16T15:16:44","modified_gmt":"2025-03-16T15:16:44","slug":"web3-has-a-metadata-problem-and-its-not-going-away","status":"publish","type":"post","link":"http:\/\/cryptospotters.net\/?p=125181","title":{"rendered":"Web3 has a metadata problem, and it\u2019s not going away"},"content":{"rendered":"<p>Source: Cointelegraph.com NewsOpinion by: Casey Ford, PhD, researcher at Nym Technologies<br \/>\nWeb3 rolled in on the wave of decentralization. Decentralized applications (DApps) grew by 74% in 2024 and individual wallets by 485%, with total value locked (TVL) in decentralized finance (DeFi) closing at a near-record high of $214 billion. The industry is also, however, heading straight for a state of capture if it does not wake up.\u00a0<br \/>\nAs Elon Musk has teased of placing the US Treasury on blockchain, however poorly thought out, the tides are turning as crypto is deregulated. But when they do, is Web3 ready to \u201cprotect [user] data,\u201d as Musk surrogates pledge? If not, we\u2019re all on the brink of a global data security crisis.<br \/>\nThe crisis boils down to a vulnerability at the heart of the digital world: the metadata surveillance of all existing networks, even the decentralized ones of Web3. AI technologies are now at the foundation of surveillance systems and serve as accelerants. Anonymity networks offer a way out of this state of capture. But this must begin with metadata protections across the board.<br \/>\nMetadata is the new frontier of surveillance<br \/>\nMetadata is the overlooked raw material of AI surveillance. Compared to payload data, metadata is lightweight and thus easy to process en masse. Here, AI systems excel best. Aggregated metadata can reveal much more than encrypted contents: patterns of behaviors, networks of contacts, personal desires and, ultimately, predictability. And legally, it is unprotected in the way end-to-end (E2E) encrypted communications are now in some regions.\u00a0<br \/>\nWhile metadata is a part of all digital assets, the metadata that leaks from E2E encrypted traffic exposes us and what we do: IPs, timing signatures, packet sizes, encryption formats and even wallet specifications. All of this is fully legible to adversaries surveilling a network. Blockchain transactions are no exception.<br \/>\nFrom piles of digital junk can emerge a goldmine of detailed records of everything we do. Metadata is our digital unconscious, and it is up for grabs for whatever machines can harvest it for profit.<br \/>\nThe limits of blockchain<br \/>\nProtecting the metadata of transactions was an afterthought of blockchain technology. Crypto does not offer anonymity despite the reactionary association of the industry with illicit trade. It offers pseudonymity, the ability to hold tokens in a wallet with a chosen name.\u00a0<br \/>\nRecent: How to tokenize real-world assets on Bitcoin<br \/>\nHarry Halpin and Ania Piotrowska have diagnosed the situation:<br \/>\n\u201c[T]he public nature of Bitcoin\u2019s ledger of transactions [&#8230;] means anyone can observe the flow of coins. [P]seudonymous addresses do not provide any meaningful level of anonymity, since anyone can harvest the counterparty addresses of any given transaction and reconstruct the chain of transactions.\u201d<br \/>\nAs all chain transactions are public, anyone running a full node can have a panoptic view of chain activity. Further, metadata like IP addresses attached to pseudonymous wallets can be used to identify people\u2019s locations and identities if tracking technologies are sophisticated enough.\u00a0<br \/>\nThis is the core problem of metadata surveillance in blockchain economics: Surveillance systems can effectively de-anonymize our financial traffic by any capable party.<br \/>\nKnowledge is also an insecurity<br \/>\nKnowledge is not just power, as the adage goes. It\u2019s also the basis on which we are exploited and disempowered. There are at least three general metadata risks across Web3.<\/p>\n<p>Fraud: Financial insecurity and surveillance are intrinsically linked. The most serious hacks, thefts or scams depend on accumulated knowledge about a target: their assets, transaction histories and who they are. DappRadar estimates a $1.3-billion loss due to \u201chacks and exploits\u201d like phishing attacks in 2024 alone.\u00a0<br \/>\nLeaks: The wallets that permit access to decentralized tokenomics rely on leaky centralized infrastructures. Studies of DApps and wallets have shown the prevalence of IP leaks: \u201cThe existing wallet infrastructure is not in favor of users\u2019 privacy. Websites abuse wallets to fingerprint users online, and DApps and wallets leak the user\u2019s wallet address to third parties.\u201d Pseudonymity is pointless if people\u2019s identities and patterns of transactions can be easily revealed through metadata.<br \/>\nChain consensus: Chain consensus is a potential point of attack. One example is a recent initiative by Celestia to add an anonymity layer to obscure the metadata of validators against particular attacks seeking to disrupt chain consensus in Celestia\u2019s Data Availability Sampling (DAS) process.<\/p>\n<p>Securing Web3 through anonymity<br \/>\nAs Web3 continues to grow, so does the amount of metadata about people\u2019s activities being offered up to newly empowered surveillance systems.\u00a0<br \/>\nBeyond VPNs<br \/>\nVirtual private network (VPN) technology is decades old at this point. The lack of advancement is shocking, with most VPNs remaining in the same centralized and proprietary infrastructures. Networks like Tor and Dandelion stepped in as decentralized solutions. Yet they are still vulnerable to surveillance by global adversaries capable of \u201ctiming analysis\u201d via the control of entry and exit nodes. Even more advanced tools are needed.<br \/>\nNoise networks<br \/>\nAll surveillance looks for patterns in a network full of noise. By further obscuring patterns of communication and de-linking metadata like IPs from metadata generated by traffic, the possible attack vectors can be significantly reduced, and metadata patterns can be scrambled into nonsense.<br \/>\nAnonymizing networks have emerged to anonymize sensitive traffic like communications or crypto transactions via noise: cover traffic, timing obfuscations and data mixing. In the same spirit, other VPNs like Mullvad have introduced programs like DAITA (Defense Against AI-guided Traffic Analysis), which seeks to add \u201cdistortion\u201d to its VPN network.\u00a0<br \/>\nScrambling the codes<br \/>\nWhether it\u2019s defending people against the assassinations in tomorrow\u2019s drone wars or securing their onchain transactions, new anonymity networks are needed to scramble the codes of what makes all of us targetable: the metadata our online lives leave in their wake.<br \/>\nThe state of capture is already here. Machine learning is feeding off our data. Instead of leaving people\u2019s data there unprotected, Web3 and anonymity systems can make sure that what ends up in the teeth of AI is effectively garbage.<br \/>\nOpinion by: Casey Ford, PhD, researcher at Nym Technologies.<br \/>\nThis article is for general information purposes and is not intended to be and should not be taken as legal or investment advice. The views, thoughts, and opinions expressed here are the author\u2019s alone and do not necessarily reflect or represent the views and opinions of Cointelegraph.<a href=\"https:\/\/cointelegraph.com\/news\/web3-has-a-metadata-problem?utm_source=rss_feed&amp;utm_medium=rss&amp;utm_campaign=rss_partner_inbound\" target=\"_blank\" class=\"feedzy-rss-link-icon\" rel=\"noopener\">Read More<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Source: Cointelegraph.com NewsOpinion by: Casey Ford, PhD, researcher at Nym Technologies Web3 rolled in on the wave of decentralization. Decentralized applications (DApps) grew by 74% in 2024 and individual wallets&hellip; <\/p>\n","protected":false},"author":0,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[5],"tags":[],"_links":{"self":[{"href":"http:\/\/cryptospotters.net\/index.php?rest_route=\/wp\/v2\/posts\/125181"}],"collection":[{"href":"http:\/\/cryptospotters.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/cryptospotters.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"http:\/\/cryptospotters.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=125181"}],"version-history":[{"count":0,"href":"http:\/\/cryptospotters.net\/index.php?rest_route=\/wp\/v2\/posts\/125181\/revisions"}],"wp:attachment":[{"href":"http:\/\/cryptospotters.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=125181"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/cryptospotters.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=125181"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/cryptospotters.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=125181"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}