Bitcoin Experience
Bitcoin Experience
Abstract. We present the first large-scale survey to investigate how users ex-
perience the Bitcoin ecosystem in terms of security, privacy and anonymity. We
surveyed 990 Bitcoin users to determine Bitcoin management strategies and iden-
tified how users deploy security measures to protect their keys and bitcoins. We
found that about 46% of our participants use web-hosted solutions to manage at
least some of their bitcoins, and about half of them use exclusively such solu-
tions. We also found that many users do not use all security capabilities of their
selected Bitcoin management tool and have significant misconceptions on how to
remain anonymous and protect their privacy in the Bitcoin network. Also, 22% of
our participants have already lost money due to security breaches or self-induced
errors. To get a deeper understanding, we conducted qualitative interviews to ex-
plain some of the observed phenomena.
1 Introduction
With a current market capitalization of more than 3.5 billion USD, Bitcoin is the most
successful cryptographic currency at this time. Bitcoin is utilized for roughly 130.000
transactions per day [6] and has gained significant news coverage. With the success of
Bitcoin, several other cryptographic currencies were developed either based on Bitcoin
or from scratch.
Although the popularity of cryptographic currencies is increasing, they are not yet a
mass phenomenon. One of the reasons is that Bitcoin forces its users to deal with pub-
lic key cryptography. Furthermore, Bitcoin shifts the responsibilities for most security
measures to the end user compared to centralized monetary systems. Even though there
is a great variety of software available for managing bitcoins, user-experience is still
not obviating the need to deal with the technical fundamentals and to perform backups
to recover their virtual monetary assets in case of a loss. Hence, these systems are not
resilient to human errors. Reports from online forums and mailing-lists show that many
Bitcoin users already lost money due to poor usability of key management and secu-
rity breaches such as malicious exchanges and wallets. This motivates our research on
human interactions with the Bitcoin ecosystem.
Bitcoin users have a huge variety of tools available to manage their virtual assets.
These tools are commonly referred to as wallets. A wallet was originally defined as a
collection of private keys [8]. Hence, a piece of paper with a private key on it or even a
mental representation can be considered a wallet. However, most of these tools provide
functionality beyond storing keys, such as performing transactions. In contrary to other
public key crypto-systems, e.g. PGP/GPG, Bitcoin is not fully communication channel
agnostic. In case of Bitcoin the interaction with the Bitcoin network is an integral part to
operate in the distributed system. In contrast to other signing systems, Bitcoin tools need
to keep state information on performed transactions and account balances respectively.
As a first step to accommodate these misconceptions on Bitcoin wallets, we intro-
duce the term Coin Management Tool (CMT) as an extension to the current narrow
definition of a wallet. We define a CMT as a tool or a collection of tools which allows
users to manage one or more core tasks of cryptocurrencies. Throughout this paper we
are therefore referring to Bitcoin management, as it better describes user activities when
interacting with the Bitcoin ecosystem. Bitcoin security and privacy aspects have aleady
been studied in the research literature [7, 10, 14–16]. A first look on the usability of Bit-
coin key management has been presented in [8]. However, we are the first to conduct a
comprehensive user study to collect evidence on user experiences with Bitcoin security
and privacy.
In this paper, we present a comprehensive user study (n = 990) to cover human-
computer interaction aspects of the Bitcoin ecosystem. The goal was to understand how
users interact with Bitcoin and how they manage their virtual assets. We furthermore
studied experiences and perceptions related to security, privacy and anonymity in the
Bitcoin network. To collect user-reported data, we conducted a comprehensive online
survey with 990 participants and qualitative interviews with a subset of 10 participants.
Additionally, we extended the evaluation criteria from [8] and provide a method to
categorize CMTs depending on the level of control and verifiability a user can exercise
with the respective client.
We gathered interesting insights on how users interact with the Bitcoin network and
what privacy and security measures they deploy to protect their keys and coins. We
found that the first- and third-most used CMTs (Coinbase, Xapo) are web-hosted tools
where users shift security responsibilities to a third party. We also found that about a
third of their users are not aware whether their CMT data is encrypted or backed-up.
Among the participants who use a web-hosted solution, 50% indicated to use it exclu-
sively while the other half used additional local clients to manage their coins. Regard-
ing risk scenarios and their likelihood to occur, the second-highest risk was attributed
to vulnerabilities in web-hosted CMTs (after value fluctuation and followed by theft via
malware).
We also found that many users have misconceptions about how to remain anony-
mous. About 25% of our participants reported to use Bitcoin over Tor which has already
shown to be disadvantageous in certain cases [1, 3]. 22.5% of the participants reported
to have lost their bitcoins due to security breaches. About half of them consider this
loss as their own fault and the majority of them was not able to recover their bitcoins
and lost money permanently. Our work contributes research on user-centric concerns
of Bitcoin management, as according to Bonneau [7] Bitcoin is one of the cases where
practice is ahead of theory.
The main contributions of this paper are (1) a user study consisting of an online
survey and qualitative interviews, and (2) a method for categorizing Bitcoin CMTs.
2 Bitcoin Background
The Bitcoin currency is based on a distributed P2P system which synchronizes a public
ledger of all transactions among all Bitcoin clients. As a consequence, every full client
in the Bitcoin network is able to see the entire history containing all prior transactions.
Thereby it is possible to determine the current balance of every account. The account
information in Bitcoin basically consists of a hash over a public key which can be
compared to an account number, the so-called Bitcoin address. The protocol does not
require a link between account information and personal data. An individual can have
more than one account, hence Bitcoin provides a certain degree of pseudonymity [1, 9].
To transfer n bitcoins from account A, which is under control of Alice, to an-
other account B, which is under control of Bob, a new transaction is created by Alice.
Thereby, Alice creates a transaction message with the amount of bitcoins she wants to
send to Bob and includes the hash of the public key of Bobs account B as a destination
before signing it with her secret key skA . Alice publishes this transaction in the Bitcoin
network so that every participant knows that Alice now has n bitcoins less on her ac-
count A and Bob has received the difference on his account B. When this transaction
is successfully propagated in the network, Bob can create new transactions from his
account B to another account and spend the previously received bitcoins. This chaining
mechanism works fine for passing over arbitrary amounts of bitcoins from one account
to another, except in the special case of the first transaction in a chain, because this is
where new bitcoins come into existence [20].
Bitcoins are created during the so-called mining process. In this procedure every
miner collects transactions which have recently been propagated in the P2P network.
Then they try to successfully create a new block out of all unconfirmed transactions that
have not yet been included in a block of the block chain. A block essentially consists of a
collection of valid transactions1 , a nonce value, and a proof of work. The proof of work
is a partial pre-image attack on SHA-256 over the whole block as input. For the attack
to succeed, the hash has to be a value smaller than the current difficulty in the Bitcoin
network. In other words, the SHA-256 hash has to start with a certain number of zero
bits. The number of zero bits is referred to as difficulty. Since SHA-256 is categorized as
a cryptographic hash function [21], it is easy to verify a previously calculated SHA-256
sum of a block, but it is considered infeasible to generate a specific block that produces
a given hash value. To achieve this, the nonce field is constantly incremented to search
for a hash value that fulfils the described property. This brute-force process of searching
is called mining. If one client in the Bitcoin network finds such a combination of valid
transactions and nonce that yields a desired result, he/she publishes this new block in
the Bitcoin network and gets rewarded with newly created bitcoins.
The reward comes in form of a new transaction of (currently) 25 bitcoins that has no
predecessor and is included as a special so-called coinbase transaction by the creator
of the respective block. This coinbase transaction also includes the public key/bitcoin
address of the creator and marks the first transaction of a new chain of Bitcoin transac-
tions [4, 5, 17, 20].
1
More precisely a Merkle-Tree Hash over those transactions, for details see the specifications [4,
5, 17]
3 Related Work
We build upon already existing work by contributing the first user study with Bit-
coin users. Eskandari et al. [8] presented a first look at the key management of Bit-
coin by providing a set of evaluation criteria for Bitcoin wallets and a cognitive walk-
through [23] of selected wallets. The work by Eskandari et al. [8] can be considered a
first look at the usability of Bitcoin.
Moore et al. [19] conducted an empirical analysis of Bitcoin exchange risks. They
examined the track record of 40 Bitcoin exchanges and found that 18 had been closed,
with customer account balances often wiped out. They also found that popularity is a
strong indicator to predict the lifetime of an exchange, i.e. popular exchanges have a
longer lifespan.
Baur et al. [2] conducted exploratory interviews with individuals of distinct groups
and found that most stakeholders perceived the ease of use still as rather low. They also
found that the experienced usefulness varies according to the user group.
However, no empirical study has been performed to examine user perceptions of
Bitcoin security, privacy and anonymity. For a cryptographic currency like Bitcoin, pub-
lic key cryptography is required. Regarding the usability of key management and en-
cryption in the context of e-mail various studies have shown that there are numerous us-
ability issues regarding the successful usage of public key cryptography [11,12,22,24].
At this time, for neither domain a fully usable concept has been successful. Human as-
pects of key management have already been studied in other domains [11–13, 22, 24].
For the Bitcoin ecosystem however, secure key management alone is not sufficient, as
communication is not channel-independent but an integral part of the security concept.
4 User Study Methodology
The goal of this study is to empirically investigate end user perceptions and behavior in
the Bitcoin ecosystem with an emphasis on security practices as well as coin and key
management with the involved security risks. We designed an online questionnaire and
additionally conducted qualitative interviews. We derived specific research questions
from already existing literature on Bitcoin (as discussed in Section 3) as well as from
a qualitative content analysis of threads from online forums and mailing lists. Further-
more, we revised the available Bitcoin wallets2 and their capabilities and used them
as inspiration for our questions and the design of the security and privacy risk scenar-
ios. We focus on Bitcoin as it was by far the most popular cryptographic currency at
the time we conducted this study (July 2015). While the online survey was intended
to broadly measure self-reported Bitcoin management behavior and risk perception, the
interviews were conducted to get a deeper understanding on key usability issues, causes
of common security incidents and if and how they managed to recover their keys.
4.1 Research Questions
We sought answers to the following questions regarding users’ perceptions of Bitcoin
management and Bitcoin-associated security risks:
We were also interested in categorizing CMTs in a way that users can quickly make an
informed decision based on the level of security, privacy and control they prefer? Our
categorization can be found in Appendix A.
5 Online Survey
We conducted our online survey over July 8-15, 2015. Our survey consisted of both
closed- and open-ended questions and covered the following topics: (1) Bitcoin us-
age and management, (2) CMT choice and usage, (3) security, privacy, anonymity and
backup behavior, (4) risk perception, and (5) demographics. The full set of questions is
presented in Appendix B. The open-ended questions were coded independently by two
researchers independently. After agreeing on a final set of codes, we coded all answer
segments for the final analysis. Coding refers to categorizing qualitative data to facili-
tate analysis [18] and is a common practice in human-computer interaction research.
5.1 Recruitment
We hosted our survey at soscisurvey.de3 . To restrict our participants to Bitcoin users
only, we deliberately designed our study to exclude all non-Bitcoin users. As it is diffi-
cult to construct such a restricted sample on platforms like Amazon Mechanical Turk,
we decided to use Bitcoin mailing lists and forums for recruiting. Furthermore, we
compensated participants in Bitcoin. The reward for a completed questionnaire was 4.2
mB(= 0.0042 B ≈ 1.22 USD at that time) After completing the survey, the participants
were instructed to enter a valid Bitcoin address to receive the payment. This ensured
that everyone who wanted to receive bitcoins as a reward is a Bitcoin user and hence
exactly our target audience. Even participants who had not used Bitcoin before had to
create a Bitcoin address to receive the compensation.
To motivate participants to spread the word and thus recruit further participants, we
displayed a link for re-distribution at the end of the survey. All participants that recruited
others received an additional 1 mB(≈ 0.29 USD). Table 1 shows that this additional
incentive scheme was successful since we received a high number of participants this
way. As Table 1 shows, the top 5 re-distributors of the link recruited about one quarter
of the overall sample. Initially we distributed the link to our survey over the following
channels: bitcointalk.org forum4 , bitcoin-list mailing list5 , twitter.com6 and an Austrian
3
https://www.soscisurvey.de/
4
https://bitcointalk.org/index.php?topic=1114149.0
5
http://sourceforge.net/p/bitcoin/mailman/bitcoin-list/
?viewmonth=201507
6
https://twitter.com/bit_use
bitcoin mailing list7 . We aimed for maximum transparency to avoid that our call for
participation would be misinterpreted as scam. Therefore, we proved on the initial page
of our survey that we indeed hold a respectable amount of bitcoins8 , by providing our
Bitcoin address9 together with a signature with the according private key (see appendix
C for the signature).
We recruited 1,265 participants over July 8-15, 2015 via these channels. The total
sample size after filtering out 275 participants due to incomplete or duplicated sub-
mission, or invalid entries, was 990. Of these, 85.2% claimed to be male (m), 10.5%
claimed to be female (f). 4.3% of our participants preferred not to provide their gender.
Ages ranged from 15 to 72 (median = 28.56). About half of our participants reported
to have an IT-related background. According to the collected IP addresses, most of our
participants filled out the survey in the US, followed by the UK and Germany. 7.6%
accessed the survey site over Tor (Figure 1). These numbers can of course be biased by
VPN usage.
United States
United Kingdom
Germany
Indonesia
Canada
Russian Federation
Tor
0
50
100
150
200
Fig. 1. Countries from which our participants accessed the survey site.
Fig. 2. Self-reported wallet usage and accumulated hosted bitcoins per wallet.
Table 2. Backup properties in absolute mentions in descending order; a user can have multiple
wallets and multiple backups.
Table 3. Properties of the most frequently used wallets mentioned by our participants.
Anonymity. We found that 32.3% of our participants think that Bitcoin is per-se anony-
mous while it is in fact only pseudonymous. 47% thinks that Bitcoin is not per-se anony-
mous but can be used anonymously. However, about 80% think that it is possible to
follow their transactions. 25% reported to have used Bitcoin over Tor to preserve their
anonymity.
We also asked participants if they take any additional steps to stay anonymous. 18%
reported to frequently apply methods to stay anonymous on the Bitcoin network. Most
of them reported to use Bitcoin over Tor followed by multiple addresses, mixing ser-
vices, multiple wallets and VPN services. As shown by Biryukov et al. [1, 3] using Bit-
coin over Tor creates an attack vector for deterministic and stealthy man-in-the-middle
attacks and fingerprinting.
7.3 Risk Perception (Q3)
We were also interested in user perceptions of risks associated with Bitcoin. We pro-
vided the participants with 11 risk scenarios. We selected the risk scenarios based on
findings from scientific literature and evidence from online resources. For each risk
scenario, we provided an easy-to-understand description and asked the participants
whether they think the risk is likely or unlikely to occur. Figure 3 shows the partici-
pants’ risk estimation. Our results show that the participants consider value fluctuation
as the highest risk, followed by vulnerabilities in hosted wallets and Bitcoin theft via
malware. Our participants estimated the risk for cryptographic flaws as the lowest, fol-
lowed by double-spending attacks and DoS attacks on the Bitcoin network.
7.4 Security Breaches (Q4)
About 22.5% indicated to have lost bitcoins or Bitcoin keys at least once. Of those,
43.2% mentioned that it was their own fault (e.g., formatted hard drive or lost a physi-
cal device with Bitcoin keys). 26.5% reported that their loss stemmed from a hardware
failure (e.g., a broken hard drive), followed by software failure (24.4%; e.g. keyfile cor-
ruption) and security breaches (18% e.g., malware, hacker).
Fig. 3. User perceptions of risk scenarios in percentage of participants (N = 990).
The majority (77.6%) among those who lost bitcoins did not want to indicate whether
they were able to recover their keys. Of those who provided an answer, 65% were not
able to recover their keys. Overall, our participants reported to have lost about 660.6873
bitcoins. However, it must be taken into account that we did not ask when the coins were
lost. Hence, interpreting this result we must take into consideration that the Bitcoin ex-
change rate is highly volatile and it is therefore hard to provide an overall estimation in
USD. About 40% of our participants reported to have lost money due to a self-classified
major security breach. 13.1% of our overall sample reported to have lost bitcoins in
HYIPS (high-yield investment programs) and pyramid schemes. 7.9% lost money at
Mt. Gox.
We also gave our participants the opportunity to describe how they dealt with the
incident. Most participants stated that they did not do anything to recover their keys and
simply accepted the loss. Some argued that the financial loss was not worth the effort to
take further steps or that they felt helpless as they didn’t know what to do. Those who
actually took action most frequently mentioned that they filed claims and contacted the
exchange or online wallet provider. Those who lost money to a malicious online wal-
let reported to have moved to other types of wallets instead of hosted/online wallets.
The participants who lost money in HYIPS mostly stated that they started to use less
risky investments and learned from their previous mistakes. Irrespective of the security
breach, many participants reported to have spread the word over forums on the Internet
and shared their experiences with other affected users.
Participant Statements
– “I follow the ‘do not invest more than you’re ready to lose’ rule.” (P3848)
– “I just had to accept that my money was stolen ... and that I learned my lesson to
never use exchanges as wallets. Keep everything in your own hand.” (P3763)
– “Just learned from it. It was exceedingly stupid on my part.” (P853)
Eight participants from our qualitative interviews reported that they have already
experienced an intentional or accidential key and/or Bitcoin loss. Three participants
were affected from the Mt. Gox security breach and two of them reported to have filed
a claim on Kraken12 . One participant reported to have lost a physical Casascius13 Bit-
coin but then stopped searching for it as it was only worth about 9 USD at that time.
Others also mentioned to have lost their keys due to device failure, corrupted HDDs, or
software failure.
7.5 Perceptions of Usability (Q5)
Even though most participants of our qualitative interviews were very much concerned
about security and privacy aspects of Bitcoin management, eight of them said that
they would recommend web wallets and deterministic wallets to non-tech-savvy Bit-
coin users. Convenience and easiness of use were highlighted as the main benefits. One
participant said that he would definitely recommend a wallet where the private key is
stored on a central server to make key recovery easier and to obviate the need for com-
prehensive backups as well as that mnemonics would help. Six participants also said
that they would recommend MyCelium14 as the most usable wallet. Those who had
already used MyCelium consider the paper backup procedure as the most usable and
secure way. To create a paper backup with MyCelium, the user has to print out a tem-
plate that contains some parts of the key and then lets the user fill out the empty spots
manually. Some participants expressed initial discomfort when they used paper wallets.
Most interviewees also highlighted the need for fundamental education in early
years of childhood. P2 said that Bitcoin is inherently complex, that the fundamental
idea of public key cryptography should be taught in school and monetary systems are a
matter of culture.
Two participants also highlighted that user interfaces should be simplified and min-
imalized. Many participants stated that for a fast proliferation of Bitcoin, simple and
intuitive UIs are more important than security. They argued that computers proliferated
even though most people do not know how computers work and that security is not
necessarily an argument for large-scale adoption. They provided examples such as cars
in the 1940s, computers, credit cards and WhatsApp. They also said that the amount
of money that is circulating in the Bitcoin network is low enough to take the risk of
loosing it and compared this scenario to the risk of loosing cash. Some participants also
proposed a dedicated device with an intuitive UI for key management and think that
such an artifact would be the most secure and usable option.
12
https://www.kraken.com/
13
https://www.casascius.com/
14
https://mycelium.com/
Participant Statements
– “It somehow didn’t feel right for me to go out of the digital realm.” (P6 on paper
wallets)
– “Children learn about our monetary system in their very early days in primary
school. This is why society knows how to use cash and credit cards. I’m sure it
could be the same thing with a decentralized crypto-currency.” (P7)
8 Discussion
The goal of this paper was to answer the research questions provided in Section 4.1
in order to understand how users interact with the Bitcoin ecosystem. As this is the
first-ever user study focused on user experiences with Bitcoin security and privacy, we
gathered useful insights. In the following we discuss our results in the context of already
existing works in the field.
Regarding Bitcoin management tools and practices (Q2), we found that two of the
most widely used CMTs were web-hosted solutions that obviate the need for users to
deal with key management and backups. Our results show that our participants had clear
preferences regarding their choice of CMT. In contrary, this is not the case for Bitcoin
exchanges. Our data shows that the Bitcoin exchanges chosen by our participants were
almost evenly distributed. Even though our data reveals a clear tendency towards web-
hosted solutions, these CMTs do not host the majority of our participants’ bitcoins.
According to our participants’ self-reported data, the highest amount of accumulated
bitcoins is hosted in Armory. At the time of writing, if used correctly, Armory is one of
the most secure solutions.
For the two most widely used web-hosted CMTs, about a third of our participants
are unaware of whether their wallet is encrypted or backed up. In such a scenario, users
shift responsibilities to a third party. Even though this seems to be a convenient and
usable solution for non-expert users, it implies that the user trusts these third parties to
take care of their security. About 50% of web client users indicated to use an additional
local client to store their virtual assets. According to our results, users that have a higher
number of bitcoins do not necessarily back up their wallets more often. Also, MyCelium
users back up their wallets more often than others. Hence we conclude that backup
motivation and respectively fatigue depend highly on usability and not on the number
of coins.
As the answer to Q4 indicates, participants have already lost money to malicious
hosted-wallet providers. Also, our participants perceived vulnerabilities in hosted wal-
lets as the second highest among our risk scenarios (Q5). Some participants from our
qualitative interviews said that they would recommend inexperienced users to start with
a hosted wallet due to the usability benefits as for most other solutions users are re-
quired to have at least a basic understanding of the underlying basics of Bitcoin and the
blockchain.
Bitcoin is a pseudonymous system, whereas a wide-spread myth says that it is per-se
anonymous. More than a third of our participants still believe in this myth and reported
that they think that Bitcoin is fully anonymous. About half of our participants are aware
that Bitcoin is not per-se anonymous, but that it can be used anonymously. Regarding
anonymity measures, many users reported to use Bitcoin over Tor, which in fact creates
an attack vector for deterministic and stealthy MITM attacks, as shown in [3].
Our results also suggest that our participants trust the cryptography behind Bitcoin
and are aware of risks according to value fluctuation and software vulnerabilities. Poor
usability and the lack of knowledge are major contributors to security failures. Almost
a fourth of our participants indicated that they had already lost bitcoins or Bitcoin keys
at least once (Q5). To our surprise, almost half of those who lost bitcoins due to a self-
induced error which indicates that state of the art CMTs are sometimes still difficult
to use or require users to manually take care of security tasks, such as backups and
encryption. Our results also indicate that the Bitcoin ecosystem is mostly utilized for
tipping and donations as well as acquiring digital goods, but to some extend also for
criminal activity and adventurous gambling.
9 Conclusion
In this work we presented the first user study to examine how users interact with the
Bitcoin ecosystem in terms of security and privacy. We conducted an online survey with
990 Bitcoin users and qualitative interviews with a subset of 10 participants. Further-
more, we introduced the term Coin Management Tools (CMTs) to describe tools that let
users manage their virtual assets (keys) and interact with the Bitcoin network. Addition-
ally, we proposed a method for categorizing CMTs according to the degree of control
and verifiability a user can exercise with this client.
We found that managing bitcoins is still a major challenge for many users, as many
of them do not apply sufficient security measures such as encryption and backups. We
found that many participants were not even aware of security features provided by their
used CMT. Two of the most widely used CMTs among our participants were web-
hosted solutions. About half of their users reported to use such solutions exclusively,
while the other half also used local clients. Even though web clients ought to be a usable
and convenient solution, they require a certain level of trust and shift the responsibilities
of encryption and managing backups to a third party. We also found that 22.5% of our
participants have already experienced security breaches and lost bitcoins. About half of
them mentioned a self-induced error as the reason, which highlights that users find it
still difficult to manage their bitcoins in a secure way.
We believe that our insights and suggestions are an important first step towards
improving the usability of Bitcoin security. In order to guarantee secure interactions
with the Bitcoin ecosystem to both expert and non-expert users, we must re-think the
concept of Bitcoin management, since it is more than just the secure handling of secret
keys. Bitcoin is a decentralized system where the interactions between peers and the
propagation and verification of messages and data is important. If this aspect is ignored,
Bitcoin would just consist of signed numbers without value.
Acknowledgements
This research was funded by COMET K1, FFG - Austrian Research Promotion Agency
and by FFG Bridge Early Stage 846573 A2Bit. We would also like to thank Martin
Mulazzani, Artemios G. Voyiatzis and Matthew Smith for their useful comments and
feedback. Furthermore, we would like to thank Elizabeth Stobert for her valuable feed-
back and for her help in recruiting participants.
References
1. Alex Biryukov and Dmitry Khovratovich and Ivan Pustogarov. Deanonymisation of clients
in Bitcoin P2P network. CoRR, abs/1405.7418, 2014.
2. A. W. Baur, J. Bühler, M. Bick, and C. S. Bonorden. Cryptocurrencies as a disruption?
empirical findings on user adoption and future potential of bitcoin and co. In Open and Big
Data Management and Innovation, pages 63–80. Springer, 2015.
3. A. Biryukov and I. Pustogarov. Bitcoin over tor isn’t a good idea. arXiv preprint
arXiv:1410.6079, 2014.
4. Bitcoin community. Bitcoin developer guide, Oct. 2014. Accessed: 2014-10-14.
5. Bitcoin community. Bitcoin protocol specification, Oct. 2014. Accessed: 2014-10-14.
6. Blockchain.info. Bitcoin currency statistics, Apr. 2014. Accessed: 2014-04-05.
7. J. Bonneau, A. Miller, J. Clark, A. Narayanan, J. A. Kroll, and E. W. Felten. Sok: Research
perspectives and challenges for bitcoin and cryptocurrencies. 2015.
8. S. Eskandari, D. Barrera, E. Stobert, and J. Clark. A first look at the usability of bitcoin key
management. In Workshop on Usable Security (USEC), 2015.
9. M. H. F. Reid. An analysis of anonymity in the bitcoin system. In 2011 IEEE International
Conference on Privacy, Security, Risk, and Trust, and IEEE International Conference on
Social Computing, 2011.
10. J. Garay, A. Kiayias, and N. Leonardos. The bitcoin backbone protocol: Analysis and appli-
cations. In Advances in Cryptology-EUROCRYPT 2015, pages 281–310. Springer, 2015.
11. S. L. Garfinkel, D. Margrave, J. I. Schiller, E. Nordlander, and R. C. Miller. How to make
secure email easier to use. In Proceedings of the SIGCHI conference on human factors in
computing systems, pages 701–710. ACM, 2005.
12. S. L. Garfinkel and R. C. Miller. Johnny 2: a user test of key continuity management with
s/mime and outlook express. In Proceedings of the 2005 symposium on Usable privacy and
security, pages 13–24. ACM, 2005.
13. S. Gaw, E. W. Felten, and P. Fernandez-Kelly. Secrecy, flagging, and paranoia: adoption
criteria in encrypted email. In Proceedings of the SIGCHI conference on human factors in
computing systems, pages 591–600. ACM, 2006.
14. A. Gervais, H. Ritzdorf, G. O. Karame, and S. Capkun. Tampering with the delivery of blocks
and transactions in bitcoin. Technical report, Cryptology ePrint Archive, Report 2015/578,
2015. http://eprint. iacr. org.
15. S. Goldfeder, R. Gennaro, H. Kalodner, J. Bonneau, J. Kroll, E. W. Felten, and A. Narayanan.
Securing Bitcoin wallets via a new DSA/ECDSA threshold signature scheme. Accessed
2015-06-09.
16. E. Heilman, A. Kendler, A. Zohar, and S. Goldberg. Eclipse attacks on bitcoin’s peer-to-
peer network. In 24th USENIX Security Symposium (USENIX Security 15), pages 129–144,
Washington, D.C., Aug. 2015. USENIX Association.
17. Krzysztof Okupski. Bitcoin protocol specification, Oct. 2014. Accessed: 2014-10-14.
18. J. Lazar, J. H. Feng, and H. Hochheiser. Research methods in human-computer interaction.
John Wiley & Sons, 2010.
19. T. Moore and N. Christin. Beware the middleman: Empirical analysis of bitcoin-exchange
risk. In Financial Cryptography and Data Security, pages 25–33. Springer, 2013.
20. S. Nakamoto. Bitcoin: A peer-to-peer electronic cash system. online, Dec 2008.
21. NIST. FIPS 180-4: Secure Hash Standard (SHS), Mar. 2012.
22. S. Sheng, L. Broderick, C. A. Koranda, and J. J. Hyland. Why johnny still can’t encrypt:
evaluating the usability of email encryption software. In Symposium On Usable Privacy and
Security, 2006.
23. C. Wharton, J. Rieman, C. Lewis, and P. Polson. The cognitive walkthrough method: A
practitioner’s guide. In Usability inspection methods, pages 105–140. John Wiley & Sons,
Inc., 1994.
24. A. Whitten and J. D. Tygar. Why johnny can’t encrypt: A usability evaluation of pgp 5.0. In
Usenix Security, volume 1999, 1999.
A CMT Categorization
In this section we discuss the term Coin Management Tool and provide a methodol-
ogy to categorize CMTs according to the degree of control and verifiability a user can
exercise with his respective client. The proposed scheme is tailored to Bitcoin-like cryp-
tocurrencies, but explicitly designed in an utmost generic way so that it can be applied
to other derived cryptocurrencies as long as they are not fundamentally different in
their design. Our approach used the evaluation framework from [8] as a starting point.
A categorization according to our scheme allows users to quickly distinguish clients ac-
cording to their underlying security model and hence allows users to make an informed
decision on the level of confidence and trust they can put into an individual client.
A.1 Definitions
When Bitcoin was in its infancy bitcoind was the only available Bitcoin client which
performed all required tasks: mining management, P2P network communication and
blockchain management, key management and virtual asset management. With the in-
creased popularity of Bitcoin and cryptocurrencies in general, more and more software
was developed which focused on a subset of individual tasks of the original implemen-
tation. Moreover, the design of Bitcoin allows users to use it even if they do not run
mining software or a full P2P client (full node). As a result there exists software with
varying feature sets where the handling of public-private key pairs is the most sensi-
tive and hence the most common core feature. A Bitcoin wallet was originally defined
as a collection of private keys15 . Since this definition is very narrow, we introduced
the broader definition of a Coin Management Tool (CMT) to account for the other ar-
eas without whom most cryptocurrencies would not work. Especially the network and
blockchain layer of Bitcoin and other cryptocurrencies is not only important for the in-
tegrity of the system as a whole, but has a significant impact on the security and privacy
of each and every end user.
A.2 Categorization
To categorize CMTs, we first identified critical CMT tasks which are directly related to
security and privacy issues. This covers aspects regarding key management like gener-
ating keys/addresses and signing transactions, as well as P2P network communication
and blockchain management like handling connections as well as verifying and stor-
ing the blockchain. These core tasks can be used to divide CMTs into five different
categories. A client can be in more than one category depending on its configuration.
Q5 What do you think are the most likely risks associated with Bitcoin?
Q6 Please select the crypto currencies you are holding or using besides Bitcoin (mul-
tiple selections possible):
( ) I do not use other crypto currencies
( ) BanxShares
( ) BitShares
( ) BlackCoin
( ) Bytecoin
( ) Counterparty
( ) Dash
( ) Dogecoin
( ) Litecoin
( ) MaidSafeCoin
( ) MonaCoin
( ) Monero
( ) Namecoin
( ) Nxt
( ) Peercoin
( ) Primecoin
( ) Ripple
( ) Startcoin
( ) Stellar
( ) SuperNET
( ) Vertcoin
( ) YbCoin
( ) Other
Q7 Select the Bitcoin exchanges you have used in the past or you are using on regu-
larly (multiple selections possible):
( ) None
( ) BanxIO
( ) Bitcoin Exchange Thailand
( ) Bittrex
( ) Bitcoin Indonesia
( ) bitcoin.de
( ) Bitfinex
( ) Bitstamp
( ) BitX South Africa
( ) BTC-e
( ) BTC38
( ) BTCChina
( ) CCEDK
( ) Cryptsy
( ) Gatecoin
( ) hibtc
( ) Kraken
( ) Mt. Gox
( ) OKCoin
( ) Poloniex
( ) QuadrigaCX
( ) The Rock Trading
( ) VirWox
( ) Other:
Q11 Why did you choose to use multiple wallets to manage your bitcoins?
Q21 Do you run a full Bitcoin server that is reachable for others from the Internet?
a) Yes b) No
Q22 Please provide some reasons on why you operate a full Bitcoin server (multiple
selections possible):
( ) Fast transaction propagation
( ) Double-spending detection
( ) Network analysis
( ) Support the Bitcoin network
( ) Other
B.6 BTC Security Risks
Q23 How would you estimate the risk of monetary loss for Bitcoin compared to credit
cards?
(7 Point Likert-Scale from ”High” to ”Low”)
Q24 How high do you think is the risk of becoming a victim of a successful double
spending attack?
(7 Point Likert-Scale from ”High” to ”Low”)
Q25 How high or low would you estimate the risk for malware that steals your Bit-
coins?
(7 Point Likert-Scale from ”High” to ”Low”)
Q26 How would you estimate the risk of monetary theft in case the device with your
wallet gets lost or stolen?
(7 Point Likert-Scale from ”High” to ”Low”)
Q27 How would you estimate the risk of de-anonymization?
(7 Point Likert-Scale from ”High” to ”Low”)
Q28 How high do you think the risk of cryptographic flaws is?
(7 Point Likert-Scale from ”High” to ”Low”)
Q29 How high do you think is the risk of security vulnerabilities in hosted/web wallets
or Exchange services?
(7 Point Likert-Scale from ”High” to ”Low”)
Q30 How high do you think is the risk of key loss due to a device failure?
(7 Point Likert-Scale from ”High” to ”Low”)
Q31 How high do you think is the risk that the Bitcoin network is temporarily not
available?
(7 Point Likert-Scale from ”High” to ”Low”)
Q32 How high do you think is the risk of a centralization of mining?
(7 Point Likert-Scale from ”High” to ”Low”)
Q33 How high do you think is the risk of a strong fluctuation in the Bitcoin exchange
rate (e.g. BTC to USD and vice versa)?
(7 Point Likert-Scale from ”High” to ”Low”)
B.9 Demographics
Q45 Please provide your age:
Q45 Please provide your gender:
a) Female b) Male c) Do not want to specify
Q46 Please select your highest completed level of education:
a) Did Not Complete High School b) High School/GED c) Some College d) Bach-
elor’s Degree e) Master’s Degree f) Advanced Graduate work or Ph.D. g) Not Sure
Q47 Do you work or study in a computer science related field?
a) Yes b) No
Q48 How would you describe yourself in terms of privacy behaviour?
A continouos slider between ”I am not concerned about my privacy” and ”I would
describe myself as a privacy fundamentalist”
B.10 End
Q49 You can enter your Bitcoin address in the textfield below. Please make sure that
your address is correct in order to receive your incentive.
Q49 This is the place where you can provide suggestions, complaints or any other
information we may have forgotten to ask in the questionnaire.
C Address Signature
./bitcoin-cli signmessage 12yeU5ymM67SL5UWVSwErAgwVwwaTd1Nma \
"https://www.soscisurvey.de/BTC_study/"
HzzNxFmeRhbhAwVZ4DsraBkXkW7JYjO0tAlIPAnHB2z5P12eddFilWXJmwGm\
PkgS/v8W0DNr0Z1qLwroPbWWMoE=