Weeks before the Russian invasion of Ukraine, an anonymous Bitcoin user sounded the alarm and called out 986 addresses they claim belong to Russian security agencies. How did they do it? OP_RETURNs. This blockchain vigilante burned over $300,000 worth of Bitcoin across over 1,000 transactions to embed their accusations in the OP_RETURN field. Under ordinary circumstances, it would be difficult to detect cryptocurrency addresses used by hostile actors unless you were actively looking for them. But starting on February 12, 2022 β weeks before the Russian invasion of Ukraine β and ending on March 14, 2022, an anonymous Bitcoin user sounded the alarm and called out nearly 1,000 addresses they claim belong to Russian security agencies. How did they do it? OP_RETURNs. OP_RETURN is a field used to mark Bitcoin transactions as invalid, but can also be used to store text, effectively allowing users to attach messages to transactions and broadcast them to the entire blockchain, where theyβll be saved forever. In this case, an individual or group sent thousands of transactions to a total of 986 unique Bitcoin addresses, claiming that these addresses were linked to Russian intelligence agencies. Above is just a few sections about it but if you want to read the whole thing, here is an interesting analysis by Chainalysis: https://blog.chainalysis.com/reports/russia-bitcoin-op-return-messages/ [link] [comments] |
You can get bonuses upto $100 FREE BONUS when you:
π° Install these recommended apps:
π² SocialGood - 100% Crypto Back on Everyday Shopping
π² xPortal - The DeFi For The Next Billion
π² CryptoTab Browser - Lightweight, fast, and ready to mine!
π° Register on these recommended exchanges:
π‘ Binanceπ‘ Bitfinexπ‘ Bitmartπ‘ Bittrexπ‘ Bitget
π‘ CoinExπ‘ Crypto.comπ‘ Gate.ioπ‘ Huobiπ‘ Kucoin.
Comments