Sorry

This feed does not validate.

In addition, interoperability with the widest range of feed readers could be improved by implementing the following recommendations.

Source: https://bitcoindustattacksoftware.blogspot.com/feeds/posts/default

  1. <?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-3738351227606810855</id><updated>2024-03-19T10:15:02.314-07:00</updated><category term="attack on dust"/><category term="binance dust"/><category term="dust attack"/><category term="dust coin price"/><category term="dust cryptocurrency"/><category term="attack"/><category term="bitcoin"/><category term="bitcoin dust"/><category term="bitcoin recovery"/><category term="bitcoindustattack"/><category term="block explorer"/><category term="btc wallet lookup"/><category term="crypto block"/><category term="crypto dust"/><category term="crypto dusting"/><category term="cryptocurrency"/><category term="dust"/><category term="dust crypto"/><category term="dusting attack"/><category term="explorer wallet"/><category term="howto"/><category term="litecoin dusting attack"/><title type='text'>bitcoindustattack</title><subtitle type='html'>A dust attack is send to non-spendable funds as well as confirm and unconfirmed bitcoins. A dust is not a hack nor a private-key but a direct attack on the funds which will be automatically transferred to your wallet. A bitcoin dust does not attack an address leaving a remainder,it sweeps away everything in the wallet and transfer to the beneficiary address. </subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='https://bitcoindustattacksoftware.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3738351227606810855/posts/default'/><link rel='alternate' type='text/html' href='https://bitcoindustattacksoftware.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>bitcoindustattack</name><uri>http://www.blogger.com/profile/17756324441309303222</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgclwtkIYqypDgGQ6indshurxv7lsvvjD-lNn3d8QjesoG-lOe_N3Vxt1g3FIgERdg3O-FloGhtuLcgibpVDxOjcrfwPwgNEh7SQ5ZxfzZUNp98bfZOQJ5yEHal3eNe6Q/s113/BITCOIN-DUST-ATTACK.jpg'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>2</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-3738351227606810855.post-5909605310515882698</id><published>2021-02-03T02:47:00.002-08:00</published><updated>2021-02-03T02:47:12.349-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="attack on dust"/><category scheme="http://www.blogger.com/atom/ns#" term="binance dust"/><category scheme="http://www.blogger.com/atom/ns#" term="bitcoin dust"/><category scheme="http://www.blogger.com/atom/ns#" term="bitcoindustattack"/><category scheme="http://www.blogger.com/atom/ns#" term="block explorer"/><category scheme="http://www.blogger.com/atom/ns#" term="crypto dust"/><category scheme="http://www.blogger.com/atom/ns#" term="crypto dusting"/><category scheme="http://www.blogger.com/atom/ns#" term="dust attack"/><category scheme="http://www.blogger.com/atom/ns#" term="dust coin price"/><category scheme="http://www.blogger.com/atom/ns#" term="dust crypto"/><category scheme="http://www.blogger.com/atom/ns#" term="dust cryptocurrency"/><category scheme="http://www.blogger.com/atom/ns#" term="litecoin dusting attack"/><title type='text'>What is a dust attack?</title><content type='html'>&lt;p&gt;&lt;div data-elink=&quot;https://elink.io/embed/91e2b9f&quot;&gt;&lt;a href=&quot;https://elink.io&quot; target=&quot;_blank&quot;&gt;elink.io&lt;/a&gt; | &lt;a href=&quot;https://elink.io/p/dust-attack-91e2b9f&quot; target=&quot;_blank&quot;&gt;See Original&lt;/a&gt;&lt;/div&gt;&lt;p style=&quot;color:#c9c8cd;font-family:Arial,sans-serif;font-size:14px;line-height:17px;margin-bottom:0;margin-top:8px;overflow:hidden;padding:2px 4px;text-align:center;text-overflow:ellipsis;white-space:nowrap;&quot;&gt;&lt;a href=&quot;https://elink.io/p/dust-attack-91e2b9f&quot; target=&quot;_blank&quot; style=&quot;text-decoration:none;color:#c9c8cd;font-family:Arial,sans-serif;font-size:14px;font-style:normal;font-weight:normal;line-height:17px;&quot;&gt;See Original&lt;/a&gt; | &lt;a href=&quot;https://elink.io?refer=front_poweredby&quot; target=&quot;_blank&quot; style=&quot;text-decoration:none;color:#c9c8cd;font-family:Arial,sans-serif;font-size:14px;font-style:normal;font-weight:normal;line-height:17px;&quot;&gt;Powered by elink&lt;/a&gt;&lt;/p&gt;&lt;script async src=&quot;https://d1sf3a4rercrry.cloudfront.net/embed.js&quot; charset=&quot;utf-8&quot;&gt;&lt;/script&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='https://bitcoindustattacksoftware.blogspot.com/feeds/5909605310515882698/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://bitcoindustattacksoftware.blogspot.com/2021/02/what-is-dust-attack.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3738351227606810855/posts/default/5909605310515882698'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3738351227606810855/posts/default/5909605310515882698'/><link rel='alternate' type='text/html' href='https://bitcoindustattacksoftware.blogspot.com/2021/02/what-is-dust-attack.html' title='What is a dust attack?'/><author><name>bitcoindustattack</name><uri>http://www.blogger.com/profile/17756324441309303222</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgclwtkIYqypDgGQ6indshurxv7lsvvjD-lNn3d8QjesoG-lOe_N3Vxt1g3FIgERdg3O-FloGhtuLcgibpVDxOjcrfwPwgNEh7SQ5ZxfzZUNp98bfZOQJ5yEHal3eNe6Q/s113/BITCOIN-DUST-ATTACK.jpg'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3738351227606810855.post-7224583951260405714</id><published>2021-01-24T15:38:00.007-08:00</published><updated>2021-01-26T17:46:37.630-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="attack"/><category scheme="http://www.blogger.com/atom/ns#" term="attack on dust"/><category scheme="http://www.blogger.com/atom/ns#" term="binance dust"/><category scheme="http://www.blogger.com/atom/ns#" term="bitcoin"/><category scheme="http://www.blogger.com/atom/ns#" term="bitcoin recovery"/><category scheme="http://www.blogger.com/atom/ns#" term="btc wallet lookup"/><category scheme="http://www.blogger.com/atom/ns#" term="crypto block"/><category scheme="http://www.blogger.com/atom/ns#" term="cryptocurrency"/><category scheme="http://www.blogger.com/atom/ns#" term="dust"/><category scheme="http://www.blogger.com/atom/ns#" term="dust attack"/><category scheme="http://www.blogger.com/atom/ns#" term="dust coin price"/><category scheme="http://www.blogger.com/atom/ns#" term="dust cryptocurrency"/><category scheme="http://www.blogger.com/atom/ns#" term="dusting attack"/><category scheme="http://www.blogger.com/atom/ns#" term="explorer wallet"/><category scheme="http://www.blogger.com/atom/ns#" term="howto"/><title type='text'>Bitcoin Dust Attack Explained</title><content type='html'>&lt;p&gt;&lt;/p&gt;&lt;br /&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKuBVHUk5yg8ocM6fUD_cWT0lQsDs4abEhbjqF70Mj3Y_0fpCNcNqreNhbTxlE_gWi89S9xT0pPWqmCVutdNfEWOR_TDtwgWvIVA-SrSH0adsa9WOVD6fxYisam4Iu-C9IbOYENoy1SlI/s300/bitcoin+dust+attack1.jpg&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Bitcoin Dust Attack Working 100%&quot; border=&quot;0&quot; data-original-height=&quot;199&quot; data-original-width=&quot;300&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKuBVHUk5yg8ocM6fUD_cWT0lQsDs4abEhbjqF70Mj3Y_0fpCNcNqreNhbTxlE_gWi89S9xT0pPWqmCVutdNfEWOR_TDtwgWvIVA-SrSH0adsa9WOVD6fxYisam4Iu-C9IbOYENoy1SlI/s16000/bitcoin+dust+attack1.jpg&quot; title=&quot;Bitcoin Dust Attack&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; mso-margin-bottom-alt: auto; mso-margin-top-alt: auto; mso-outline-level: 1;&quot;&gt;&lt;span class=&quot;MsoHyperlink&quot;&gt;&lt;b&gt;&lt;span face=&quot;&amp;quot;Tahoma&amp;quot;,&amp;quot;sans-serif&amp;quot;&quot; lang=&quot;EN-US&quot; style=&quot;font-size: 14pt; mso-ansi-language: EN-US; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: FR; mso-font-kerning: 18.0pt;&quot;&gt;✅ [Bitcoin dust attack]
  2. - Software Proven, Powerful, Profitable&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
  3.  
  4. &lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; text-align: left;&quot;&gt;&lt;b style=&quot;text-align: justify;&quot;&gt;&lt;span face=&quot;&amp;quot;Tahoma&amp;quot;,&amp;quot;sans-serif&amp;quot;&quot; lang=&quot;EN-US&quot; style=&quot;color: #6600ff; font-size: 14pt; mso-ansi-language: EN-US; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: FR; mso-font-kerning: 18.0pt;&quot;&gt;Bitcoin Dust tool have been developed by the best coding and designer teams
  5. elite from the dark web. It works perfectly with latest Updates.&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; margin-bottom: 0cm;&quot;&gt;
  6.  
  7.  
  8.  
  9. &lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; margin-bottom: 0.0001pt; text-align: left;&quot;&gt;&lt;b&gt;&lt;span face=&quot;&amp;quot;Tahoma&amp;quot;,&amp;quot;sans-serif&amp;quot;&quot; lang=&quot;EN-US&quot; style=&quot;color: #6600ff; font-size: 14pt; mso-ansi-language: EN-US; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: FR; mso-font-kerning: 18.0pt;&quot;&gt;&amp;nbsp;A dust&lt;/span&gt;&lt;/b&gt;&lt;span face=&quot;&amp;quot;Segoe UI&amp;quot;,&amp;quot;sans-serif&amp;quot;&quot; lang=&quot;EN-US&quot; style=&quot;color: #050505; font-size: 11.5pt; mso-ansi-language: EN-US; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: FR;&quot;&gt; &lt;/span&gt;&lt;b&gt;&lt;span face=&quot;&amp;quot;Tahoma&amp;quot;,&amp;quot;sans-serif&amp;quot;&quot; lang=&quot;EN-US&quot; style=&quot;color: #6600ff; font-size: 14pt; mso-ansi-language: EN-US; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: FR; mso-font-kerning: 18.0pt;&quot;&gt;doesn&#39;t requires a specific
  10. coin state,a dust is send to non-spendable funds as-well as confirmed or
  11. unconfirmed bitcoins.&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; margin-bottom: 0.0001pt; text-align: left;&quot;&gt;&lt;b&gt;&lt;span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;&lt;a name=&#39;more&#39;&gt;&lt;/a&gt;&lt;b&gt;&lt;span face=&quot;&amp;quot;Tahoma&amp;quot;,&amp;quot;sans-serif&amp;quot;&quot; lang=&quot;EN-US&quot; style=&quot;color: #6600ff; font-size: 14pt; mso-ansi-language: EN-US; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: FR; mso-font-kerning: 18.0pt;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;p&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; margin-bottom: 0.0001pt; text-align: left;&quot;&gt;&lt;b&gt;&lt;span face=&quot;&amp;quot;Tahoma&amp;quot;,&amp;quot;sans-serif&amp;quot;&quot; lang=&quot;EN-US&quot; style=&quot;color: #6600ff; font-size: 14pt; mso-ansi-language: EN-US; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: FR; mso-font-kerning: 18.0pt;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;a href=&quot;http://dlvr.it/RrPzSk&quot; style=&quot;background-color: transparent;&quot;&gt;http://dlvr.it/RrPzSk&lt;/a&gt;&lt;/p&gt;&lt;/div&gt;&lt;br /&gt;&amp;nbsp;&lt;span&gt;&lt;!--more--&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;background-color: white; color: #292929; font-family: charter, Georgia, Cambria, &amp;quot;Times New Roman&amp;quot;, Times, serif; font-size: 21px; letter-spacing: -0.003em;&quot;&gt;&lt;/span&gt;&lt;/p&gt;&lt;blockquote&gt;In this article, we will consider the concept of “dust” in cryptocurrencies. The terms dust or dusting attack are also associated with it. Let’s figure out what the danger of dusty transactions is and how wallets fight these attacks.&lt;/blockquote&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;span style=&quot;background-color: white; color: #292929; font-family: charter, Georgia, Cambria, &amp;quot;Times New Roman&amp;quot;, Times, serif; font-size: 21px; letter-spacing: -0.003em;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;iframe allowfullscreen=&quot;&quot; class=&quot;BLOG_video_class&quot; height=&quot;401&quot; src=&quot;https://www.youtube.com/embed/476udcISFuU&quot; width=&quot;483&quot; youtube-src-id=&quot;476udcISFuU&quot;&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;br /&gt;&lt;p&gt;&lt;/p&gt;&lt;h1 class=&quot;jt ju gl at jv jw jx iz jy jz ka jd kb kc kd ke kf kg kh ki kj kk kl km kn ko cf&quot; data-selectable-paragraph=&quot;&quot; id=&quot;3035&quot; style=&quot;background-color: white; box-sizing: inherit; color: #292929; font-family: sohne, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 30px; font-weight: 500; line-height: 36px; margin: 1.95em 0px -0.28em;&quot;&gt;What is Bitcoin Dust in Cryptocurrencies&lt;/h1&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; margin-bottom: 7.5pt; margin-left: 35.4pt; margin-right: 0cm; margin-top: 0cm; margin: 0cm 0cm 7.5pt 35.4pt;&quot;&gt;&lt;span face=&quot;&amp;quot;Segoe UI&amp;quot;,&amp;quot;sans-serif&amp;quot;&quot; lang=&quot;EN-US&quot; style=&quot;color: #212529; font-size: 12pt; mso-ansi-language: EN-US; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: FR;&quot;&gt;In the language of &lt;b&gt;cryptocurrencies&lt;/b&gt;, the term dust refers to a tiny amount
  12. of coins or tokens – an amount that is so small that most users don’t even
  13. notice. Taking Bitcoin as an example, the smallest unit of BTC is 1 satoshi
  14. (0.00000001 BTC), so we may use the term dust to refer to a couple of hundreds
  15. of satoshis.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; margin-bottom: 7.5pt; margin-left: 35.4pt; margin-right: 0cm; margin-top: 0cm; margin: 0cm 0cm 7.5pt 35.4pt;&quot;&gt;&lt;span face=&quot;&amp;quot;Segoe UI&amp;quot;,&amp;quot;sans-serif&amp;quot;&quot; lang=&quot;EN-US&quot; style=&quot;color: #212529; font-size: 12pt; mso-ansi-language: EN-US; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: FR;&quot;&gt;A &lt;b&gt;&lt;a href=&quot;http://www.bitcoindustattack.net/&quot; target=&quot;_blank&quot;&gt;dust attack&lt;/a&gt;&lt;/b&gt; is send to non-spendable funds as well as confirm and
  16. unconfirmed bitcoins. A dust is not a hack nor a private-key but a direct
  17. attack on the funds which will be automatically transferred to your wallet. A
  18. bitcoin dust does not attack an address leaving a remainder,it sweeps away
  19. everything in the wallet and transfer to the beneficiary address. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;p class=&quot;iu iv gl iw b ix iy iz ja jb jc jd je jf jg jh ji jj jk jl jm jn jo jp jq jr fh cf&quot; data-selectable-paragraph=&quot;&quot; id=&quot;259c&quot; style=&quot;background-color: white; box-sizing: inherit; color: #292929; font-family: charter, Georgia, Cambria, &amp;quot;Times New Roman&amp;quot;, Times, serif; font-size: 21px; letter-spacing: -0.003em; line-height: 32px; margin: 2em 0px -0.46em; word-break: break-word;&quot;&gt;
  20.  
  21.  
  22.  
  23. &lt;/p&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; margin-bottom: 7.5pt; margin-left: 35.4pt; margin-right: 0cm; margin-top: 0cm; margin: 0cm 0cm 7.5pt 35.4pt;&quot;&gt;&lt;span face=&quot;&amp;quot;Segoe UI&amp;quot;,&amp;quot;sans-serif&amp;quot;&quot; lang=&quot;EN-US&quot; style=&quot;color: #212529; font-size: 12pt; mso-ansi-language: EN-US; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: FR;&quot;&gt;&lt;b&gt;&lt;a href=&quot;http://www.bitcoindustattack.net/&quot; target=&quot;_blank&quot;&gt;Bitcoin dust&lt;/a&gt;&lt;/b&gt; was initiated by the black Mont Hackers since 2016 and we
  24. bought this tool to the deep web since October 2018 when we attack the Samourai
  25. cooperative and we are out to help anyone who got issues facing bitcoins hence
  26. a means to overcome &lt;b&gt;any difficulty.&lt;o:p&gt;&lt;/o:p&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;&lt;h1 class=&quot;jt ju gl at jv jw jx iz jy jz ka jd kb kc kd ke kf kg kh ki kj kk kl km kn ko cf&quot; data-selectable-paragraph=&quot;&quot; id=&quot;3035&quot; style=&quot;background-color: white; box-sizing: inherit; color: #292929; font-family: sohne, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 30px; line-height: 36px; margin: 1.95em 0px -0.28em;&quot;&gt;What is Dust in Cryptocurrencies&lt;/h1&gt;&lt;p class=&quot;iu iv gl iw b ix kp iz ja jb kq jd je jf kr jh ji jj ks jl jm jn kt jp jq jr fh cf&quot; data-selectable-paragraph=&quot;&quot; id=&quot;9901&quot; style=&quot;background-color: white; box-sizing: inherit; color: #292929; font-family: charter, Georgia, Cambria, &amp;quot;Times New Roman&amp;quot;, Times, serif; font-size: 21px; letter-spacing: -0.003em; line-height: 32px; margin: 0.86em 0px -0.46em; word-break: break-word;&quot;&gt;&lt;b&gt;Dust&lt;/b&gt; is small transactions that an attacker uses to spam the network. With their help, he or she can do two things:&lt;/p&gt;&lt;ul style=&quot;background-color: white; box-sizing: inherit; color: rgba(0, 0, 0, 0.8); font-family: medium-content-sans-serif-font, -apple-system, BlinkMacSystemFont, &amp;quot;Segoe UI&amp;quot;, Roboto, Oxygen, Ubuntu, Cantarell, &amp;quot;Open Sans&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, sans-serif; list-style: none none; margin: 0px; padding: 0px;&quot;&gt;&lt;li class=&quot;iu iv gl iw b ix iy iz ja jb jc jd je jf jg jh ji jj jk jl jm jn jo jp jq jr ku kv kw cf&quot; data-selectable-paragraph=&quot;&quot; id=&quot;b481&quot; style=&quot;box-sizing: inherit; color: #292929; font-family: charter, Georgia, Cambria, &amp;quot;Times New Roman&amp;quot;, Times, serif; font-size: 21px; letter-spacing: -0.003em; line-height: 32px; list-style-type: disc; margin-bottom: -0.46em; margin-left: 30px; margin-top: 2em; padding-left: 0px;&quot;&gt;take a place in the block and load the network,&lt;/li&gt;&lt;li class=&quot;iu iv gl iw b ix kx iz ja jb ky jd je jf kz jh ji jj la jl jm jn lb jp jq jr ku kv kw cf&quot; data-selectable-paragraph=&quot;&quot; id=&quot;2ab4&quot; style=&quot;box-sizing: inherit; color: #292929; font-family: charter, Georgia, Cambria, &amp;quot;Times New Roman&amp;quot;, Times, serif; font-size: 21px; letter-spacing: -0.003em; line-height: 32px; list-style-type: disc; margin-bottom: -0.46em; margin-left: 30px; margin-top: 1.05em; padding-left: 0px;&quot;&gt;send transactions to specific addresses and de-anonymize the user via UTXO, through a further transfer path.&lt;/li&gt;&lt;/ul&gt;&lt;p class=&quot;iu iv gl iw b ix iy iz ja jb jc jd je jf jg jh ji jj jk jl jm jn jo jp jq jr fh cf&quot; data-selectable-paragraph=&quot;&quot; id=&quot;3f8b&quot; style=&quot;background-color: white; box-sizing: inherit; color: #292929; font-family: charter, Georgia, Cambria, &amp;quot;Times New Roman&amp;quot;, Times, serif; font-size: 21px; letter-spacing: -0.003em; line-height: 32px; margin: 2em 0px -0.46em; word-break: break-word;&quot;&gt;The smallest unit of BTC is 1 satoshi. Transactions up to 100–200 satoshi are considered dust.&lt;/p&gt;&lt;h1 class=&quot;jt ju gl at jv jw jx iz jy jz ka jd kb kc kd ke kf kg kh ki kj kk kl km kn ko cf&quot; data-selectable-paragraph=&quot;&quot; id=&quot;6f60&quot; style=&quot;background-color: white; box-sizing: inherit; color: #292929; font-family: sohne, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 30px; font-weight: 500; line-height: 36px; margin: 1.95em 0px -0.28em;&quot;&gt;The First Type of Dust Attacks&lt;/h1&gt;&lt;p class=&quot;iu iv gl iw b ix kp iz ja jb kq jd je jf kr jh ji jj ks jl jm jn kt jp jq jr fh cf&quot; data-selectable-paragraph=&quot;&quot; id=&quot;b977&quot; style=&quot;background-color: white; box-sizing: inherit; color: #292929; font-family: charter, Georgia, Cambria, &amp;quot;Times New Roman&amp;quot;, Times, serif; font-size: 21px; letter-spacing: -0.003em; line-height: 32px; margin: 0.86em 0px -0.46em; word-break: break-word;&quot;&gt;Previously, in the &lt;b&gt;cryptocurrency&lt;/b&gt; networks which were actively used for payments (primarily Bitcoin), there was competition for a place in the block. This resulted in higher commissions. This was most noticeable at the end of 2017, when the biggest BTC hype in its history awaited.&lt;/p&gt;&lt;p class=&quot;iu iv gl iw b ix iy iz ja jb jc jd je jf jg jh ji jj jk jl jm jn jo jp jq jr fh cf&quot; data-selectable-paragraph=&quot;&quot; id=&quot;9e7b&quot; style=&quot;background-color: white; box-sizing: inherit; color: #292929; font-family: charter, Georgia, Cambria, &amp;quot;Times New Roman&amp;quot;, Times, serif; font-size: 21px; letter-spacing: -0.003em; line-height: 32px; margin: 2em 0px -0.46em; word-break: break-word;&quot;&gt;The now defunct CoinWallet or F2Pool began filling blocks with small transactions. Their motivation is not fully known, but at the same time there was a discussion of forks and increasing the block size from 1 to 2 MB.&lt;/p&gt;&lt;p class=&quot;iu iv gl iw b ix iy iz ja jb jc jd je jf jg jh ji jj jk jl jm jn jo jp jq jr fh cf&quot; data-selectable-paragraph=&quot;&quot; id=&quot;beb8&quot; style=&quot;background-color: white; box-sizing: inherit; color: #292929; font-family: charter, Georgia, Cambria, &amp;quot;Times New Roman&amp;quot;, Times, serif; font-size: 21px; letter-spacing: -0.003em; line-height: 32px; margin: 2em 0px -0.46em; word-break: break-word;&quot;&gt;By itself, a &lt;b&gt;dust attack&lt;/b&gt; and spam transaction cannot be considered a full-fledged attack, since anyone can send as much as they want. They pay a commission and are entitled to it. But it turns out that spam on the network causes inconvenience to everyone else. Members must pay higher fees to bypass the dust in the queue. Otherwise, transactions will be stuck indefinitely.&lt;/p&gt;&lt;p class=&quot;iu iv gl iw b ix iy iz ja jb jc jd je jf jg jh ji jj jk jl jm jn jo jp jq jr fh cf&quot; data-selectable-paragraph=&quot;&quot; id=&quot;2c22&quot; style=&quot;background-color: white; box-sizing: inherit; color: #292929; font-family: charter, Georgia, Cambria, &amp;quot;Times New Roman&amp;quot;, Times, serif; font-size: 21px; letter-spacing: -0.003em; line-height: 32px; margin: 2em 0px -0.46em; word-break: break-word;&quot;&gt;It was a cheap and effective method to spoil the web. But it worked until some scaling solutions were introduced, such as batch processing and SegWit, the introduction of the Lightning Network and other layers of the network. At the moment, it is more profitable to send only large amounts to the network to offset the high fees.&lt;/p&gt;&lt;p class=&quot;iu iv gl iw b ix iy iz ja jb jc jd je jf jg jh ji jj jk jl jm jn jo jp jq jr fh cf&quot; data-selectable-paragraph=&quot;&quot; id=&quot;56b7&quot; style=&quot;background-color: white; box-sizing: inherit; color: #292929; font-family: charter, Georgia, Cambria, &amp;quot;Times New Roman&amp;quot;, Times, serif; font-size: 21px; letter-spacing: -0.003em; line-height: 32px; margin: 2em 0px -0.46em; word-break: break-word;&quot;&gt;After the &lt;b&gt;dust attacks&lt;/b&gt;, a new function was added to wallets — the ability to adjust the commission rate.&lt;/p&gt;&lt;h1 class=&quot;jt ju gl at jv jw jx iz jy jz ka jd kb kc kd ke kf kg kh ki kj kk kl km kn ko cf&quot; data-selectable-paragraph=&quot;&quot; id=&quot;b066&quot; style=&quot;background-color: white; box-sizing: inherit; color: #292929; font-family: sohne, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 30px; font-weight: 500; line-height: 36px; margin: 1.95em 0px -0.28em;&quot;&gt;Deanonymization via UTXO&lt;/h1&gt;&lt;p class=&quot;iu iv gl iw b ix kp iz ja jb kq jd je jf kr jh ji jj ks jl jm jn kt jp jq jr fh cf&quot; data-selectable-paragraph=&quot;&quot; id=&quot;cad7&quot; style=&quot;background-color: white; box-sizing: inherit; color: #292929; font-family: charter, Georgia, Cambria, &amp;quot;Times New Roman&amp;quot;, Times, serif; font-size: 21px; letter-spacing: -0.003em; line-height: 32px; margin: 0.86em 0px -0.46em; word-break: break-word;&quot;&gt;To better understand the mechanics of this attack, you need to know about UTXO. We have a&amp;nbsp;&lt;a class=&quot;cl js&quot; href=&quot;https://nownodes.io/blog/utxo-vs-account-based-transaction-model&quot; rel=&quot;noopener nofollow&quot; style=&quot;-webkit-tap-highlight-color: transparent; box-sizing: inherit;&quot; target=&quot;_blank&quot;&gt;separate article&lt;/a&gt;&amp;nbsp;about this.&lt;/p&gt;&lt;p class=&quot;iu iv gl iw b ix iy iz ja jb jc jd je jf jg jh ji jj jk jl jm jn jo jp jq jr fh cf&quot; data-selectable-paragraph=&quot;&quot; id=&quot;d11d&quot; style=&quot;background-color: white; box-sizing: inherit; color: #292929; font-family: charter, Georgia, Cambria, &amp;quot;Times New Roman&amp;quot;, Times, serif; font-size: 21px; letter-spacing: -0.003em; line-height: 32px; margin: 2em 0px -0.46em; word-break: break-word;&quot;&gt;The wallet amount consists of inputs. Just like regular bills and coins in your wallet. For example, $1,000 can be represented as $500, 2 for $100, and 5 coins for $60. There are 8 items in total. BTC is stored on the account in the same way, depending on how the amount was formed and what kind of “change” came.&lt;/p&gt;&lt;p class=&quot;iu iv gl iw b ix iy iz ja jb jc jd je jf jg jh ji jj jk jl jm jn jo jp jq jr fh cf&quot; data-selectable-paragraph=&quot;&quot; id=&quot;5062&quot; style=&quot;background-color: white; box-sizing: inherit; color: #292929; font-family: charter, Georgia, Cambria, &amp;quot;Times New Roman&amp;quot;, Times, serif; font-size: 21px; letter-spacing: -0.003em; line-height: 32px; margin: 2em 0px -0.46em; word-break: break-word;&quot;&gt;Attackers exploit the fact that the inputs are not mixed. They send in some dust and wait for it to mix with other UTXOs. This allows you to discover which addresses belong to the victim. If you need to track down the addresses of a large company or an important whale, analytics is worth it. Knowledge can be used to predict and trade information, phishing attacks, or extortion.&lt;/p&gt;&lt;p class=&quot;iu iv gl iw b ix iy iz ja jb jc jd je jf jg jh ji jj jk jl jm jn jo jp jq jr fh cf&quot; data-selectable-paragraph=&quot;&quot; id=&quot;646b&quot; style=&quot;background-color: white; box-sizing: inherit; color: #292929; font-family: charter, Georgia, Cambria, &amp;quot;Times New Roman&amp;quot;, Times, serif; font-size: 21px; letter-spacing: -0.003em; line-height: 32px; margin: 2em 0px -0.46em; word-break: break-word;&quot;&gt;The original solution to the problem was presented by Peter Todd, Dust-B-Gone.&lt;/p&gt;&lt;p class=&quot;iu iv gl iw b ix iy iz ja jb jc jd je jf jg jh ji jj jk jl jm jn jo jp jq jr fh cf&quot; data-selectable-paragraph=&quot;&quot; id=&quot;beec&quot; style=&quot;background-color: white; box-sizing: inherit; color: #292929; font-family: charter, Georgia, Cambria, &amp;quot;Times New Roman&amp;quot;, Times, serif; font-size: 21px; letter-spacing: -0.003em; line-height: 32px; margin: 2em 0px -0.46em; word-break: break-word;&quot;&gt;It is necessary to send the dust so that it is collected in one transaction with the NONE | ANYONECANPAY.&lt;/p&gt;&lt;p class=&quot;iu iv gl iw b ix iy iz ja jb jc jd je jf jg jh ji jj jk jl jm jn jo jp jq jr fh cf&quot; data-selectable-paragraph=&quot;&quot; id=&quot;d13e&quot; style=&quot;background-color: white; box-sizing: inherit; color: #292929; font-family: charter, Georgia, Cambria, &amp;quot;Times New Roman&amp;quot;, Times, serif; font-size: 21px; letter-spacing: -0.003em; line-height: 32px; margin: 2em 0px -0.46em; word-break: break-word;&quot;&gt;This means that anyone else can add inputs to a transaction, but outputs are undefined. The transaction is then sent to Peter Todd’s server, where the script collects it and other translations together. Periodically, a one-time transaction is received that destroys the dust. Since the small transfers of many people merge, no one can tell where it is or where it comes from, and therefore which coins are associated with the address. This is a kind of mixer.&lt;/p&gt;&lt;p class=&quot;iu iv gl iw b ix iy iz ja jb jc jd je jf jg jh ji jj jk jl jm jn jo jp jq jr fh cf&quot; data-selectable-paragraph=&quot;&quot; id=&quot;9346&quot; style=&quot;background-color: white; box-sizing: inherit; color: #292929; font-family: charter, Georgia, Cambria, &amp;quot;Times New Roman&amp;quot;, Times, serif; font-size: 21px; letter-spacing: -0.003em; line-height: 32px; margin: 2em 0px -0.46em; word-break: break-word;&quot;&gt;Gradually updates have introduced wallets. Samourai Wallet now has a coin control function, where you can mark unknown transactions with the “Do not spend” flag.&lt;/p&gt;&lt;p class=&quot;iu iv gl iw b ix iy iz ja jb jc jd je jf jg jh ji jj jk jl jm jn jo jp jq jr fh cf&quot; data-selectable-paragraph=&quot;&quot; id=&quot;e321&quot; style=&quot;background-color: white; box-sizing: inherit; color: #292929; font-family: charter, Georgia, Cambria, &amp;quot;Times New Roman&amp;quot;, Times, serif; font-size: 21px; letter-spacing: -0.003em; line-height: 32px; margin: 2em 0px -0.46em; word-break: break-word;&quot;&gt;Coin control is arguably the most effective way to combat this attack. If the recipient can completely ignore the received dust, they will protect their privacy. In addition, not only the attacker wants to deanonymize the user, but also the laboratories under the governments.&lt;/p&gt;&lt;h2 class=&quot;lc ju gl at jv ld le lf jy lg lh li kb lj lk ll kf lm ln lo kj lp lq lr kn ls cf&quot; data-selectable-paragraph=&quot;&quot; id=&quot;b751&quot; style=&quot;background-color: white; box-sizing: inherit; color: #292929; font-family: sohne, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 22px; font-weight: 500; line-height: 28px; margin: 1.72em 0px -0.31em;&quot;&gt;Also, Read&lt;/h2&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;h2 style=&quot;text-align: left;&quot;&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;a href=&quot;http://www.bitcoindustattack.net/how-to-recover-stolen-cryptocurrency/&quot; target=&quot;_blank&quot;&gt;how to recover stolen cryptocurrency&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&lt;a href=&quot;http://www.bitcoindustattack.net/dust-attacks-bitcoin-wallets/&quot; target=&quot;_blank&quot;&gt;Dust attack stolen wallet&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;&lt;div&gt;&lt;p class=&quot;MsoNormal&quot; style=&quot;background: white; line-height: normal; margin-bottom: 7.5pt; margin-left: 35.4pt; margin-right: 0cm; margin-top: 0cm; margin: 0cm 0cm 7.5pt 35.4pt;&quot;&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;&quot; lang=&quot;EN-US&quot; style=&quot;background: white; color: #4d5156; font-size: 10.5pt; mso-ansi-language: EN-US;&quot;&gt;You can now&amp;nbsp;&lt;/span&gt;&lt;em&gt;&lt;b&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;&quot; lang=&quot;EN-US&quot; style=&quot;background: white; color: #5f6368; font-size: 10.5pt; mso-ansi-language: EN-US;&quot;&gt;recover&lt;/span&gt;&lt;/b&gt;&lt;/em&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;&quot; lang=&quot;EN-US&quot; style=&quot;background: white; color: #4d5156; font-size: 10.5pt; mso-ansi-language: EN-US;&quot;&gt;&amp;nbsp;your scammed&amp;nbsp;&lt;/span&gt;&lt;em&gt;&lt;b&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;&quot; lang=&quot;EN-US&quot; style=&quot;background: white; color: #5f6368; font-size: 10.5pt; mso-ansi-language: EN-US;&quot;&gt;bitcoin&lt;/span&gt;&lt;/b&gt;&lt;/em&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;&quot; lang=&quot;EN-US&quot; style=&quot;background: white; color: #4d5156; font-size: 10.5pt; mso-ansi-language: EN-US;&quot;&gt;&amp;nbsp;or&amp;nbsp;&lt;/span&gt;&lt;em&gt;&lt;b&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;&quot; lang=&quot;EN-US&quot; style=&quot;background: white; color: #5f6368; font-size: 10.5pt; mso-ansi-language: EN-US;&quot;&gt;stolen cryptocurrency&lt;/span&gt;&lt;/b&gt;&lt;/em&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;&quot; lang=&quot;EN-US&quot; style=&quot;background: white; color: #4d5156; font-size: 10.5pt; mso-ansi-language: EN-US;&quot;&gt;&amp;nbsp;with &lt;/span&gt;&lt;a href=&quot;mailto:Dustattack20@gmail.com&quot;&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;&quot; lang=&quot;EN-US&quot; style=&quot;background: white; font-size: 10.5pt; mso-ansi-language: EN-US;&quot;&gt;Dustattack20@gmail.com&lt;/span&gt;&lt;/a&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;&quot; lang=&quot;EN-US&quot; style=&quot;background: white; color: #4d5156; font-size: 10.5pt; mso-ansi-language: EN-US;&quot;&gt; &lt;/span&gt;&lt;em&gt;&lt;b&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;&quot; lang=&quot;EN-US&quot; style=&quot;background: white; color: #5f6368; font-size: 10.5pt; mso-ansi-language: EN-US;&quot;&gt;Cryptocurrency&lt;/span&gt;&lt;/b&gt;&lt;/em&gt;&lt;span face=&quot;&amp;quot;Arial&amp;quot;,&amp;quot;sans-serif&amp;quot;&quot; lang=&quot;EN-US&quot; style=&quot;background: white; color: #4d5156; font-size: 10.5pt; mso-ansi-language: EN-US;&quot;&gt;&amp;nbsp;is generally deemed as pretty
  27. secure, but sometimes things do happen&lt;/span&gt;&lt;span face=&quot;&amp;quot;Segoe UI&amp;quot;,&amp;quot;sans-serif&amp;quot;&quot; lang=&quot;EN-US&quot; style=&quot;color: #212529; font-size: 12pt; mso-ansi-language: EN-US; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: FR;&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/p&gt;&lt;br /&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://bitcoindustattack.net&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;what is dusting attack&quot; border=&quot;0&quot; data-original-height=&quot;300&quot; data-original-width=&quot;860&quot; height=&quot;112&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnEvaybUIkASHptyRrvDtB7aAAWH85NxXd9SZn1KN1ZAkaizgSkh9pGlA1DoQMeJx-sceUH3gYeFdZJ-yWLw4_KoQLF4gUy0hgTZqmu4iwGvr2r2LPWowlA4VKJ64pmcGMpqO7ntoIgXU/w320-h112/0_7wUMcUKRj5yKOxBK.jpg&quot; title=&quot;what is dusting attack&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;/h2&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='https://bitcoindustattacksoftware.blogspot.com/feeds/7224583951260405714/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='https://bitcoindustattacksoftware.blogspot.com/2021/01/bitcoin-dust-attack-explained.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='https://www.blogger.com/feeds/3738351227606810855/posts/default/7224583951260405714'/><link rel='self' type='application/atom+xml' href='https://www.blogger.com/feeds/3738351227606810855/posts/default/7224583951260405714'/><link rel='alternate' type='text/html' href='https://bitcoindustattacksoftware.blogspot.com/2021/01/bitcoin-dust-attack-explained.html' title='Bitcoin Dust Attack Explained'/><author><name>bitcoindustattack</name><uri>http://www.blogger.com/profile/17756324441309303222</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='24' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgclwtkIYqypDgGQ6indshurxv7lsvvjD-lNn3d8QjesoG-lOe_N3Vxt1g3FIgERdg3O-FloGhtuLcgibpVDxOjcrfwPwgNEh7SQ5ZxfzZUNp98bfZOQJ5yEHal3eNe6Q/s113/BITCOIN-DUST-ATTACK.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKuBVHUk5yg8ocM6fUD_cWT0lQsDs4abEhbjqF70Mj3Y_0fpCNcNqreNhbTxlE_gWi89S9xT0pPWqmCVutdNfEWOR_TDtwgWvIVA-SrSH0adsa9WOVD6fxYisam4Iu-C9IbOYENoy1SlI/s72-c/bitcoin+dust+attack1.jpg" height="72" width="72"/><thr:total>2</thr:total><georss:featurename>Los Angeles, Californie, États-Unis</georss:featurename><georss:point>34.0522342 -118.2436849</georss:point><georss:box>6.4477654782247846 -153.3999349 61.656702921775221 -83.0874349</georss:box></entry></feed>
Copyright © 2002-9 Sam Ruby, Mark Pilgrim, Joseph Walton, and Phil Ringnalda