Dusting Attack
1 min read
Pronunciation
[duh-sting uh-tak]
Analogy
Like sprinkling a fine powder on multiple footprints to trace where each person walks.
Definition
A privacy attack where an adversary sends tiny amounts of cryptocurrency (dust) to many addresses, then tracks spending patterns to de‑anonymize users by linking addresses.
Key Points Intro
Dusting attacks compromise wallet anonymity by tagging UTXOs.
Key Points
Dust distribution: Sends minimal-value outputs to target addresses.
Transaction tracing: Monitors when dust moves to link addresses.
Clustering: Joins multiple addresses into a single identity cluster.
Mitigation: Wallets ignore dust or consolidate with privacy techniques.
Example
Technical Deep Dive
Security Warning
Even tiny amounts can erode privacy; use coin‑control features and avoid spending unsolicited dust.
Caveat
Dust filtering may lock out legitimate small payments; balance privacy with usability.
Dusting Attack - Related Articles
No related articles for this term.