Epicenter - Learn about Crypto, Blockchain, Ethereum, Bitcoin and Distributed Technologies - Jaron Lukasiewicz & Nir Halutzy: Inside Bitcoins Berlin 2014 – Opportunities and Challenges of Bitcoin Exchanges

Episode Date: March 20, 2014

This episode is part of our coverage of the Inside Bitcoins conference which took place in Berlin February 12 and 13, 2014. This episodes features two talks with different perspectives on Bitcoin exch...anges. In the first segment, Jaron Lukasiewicz, CEO of Coinsetter gives a talk on the interesting business opportunities in and around the Bitcoin exchange ecosystem. Then, Nir Halutzy, Account Executive, Incapsula talks about some of the security challenges exchanges face every day and takes us through an actual DDoS mitigation scenario. This episode is hosted by Brian Fabian Crain and Sébastien Couture. Show notes and listening options: epicenter.tv/eb-inside-bitcoins-berlin-05

Transcript
Discussion (0)
Starting point is 00:00:03 Hi, I'm Brian Fabian Crane and I'm here with Sebastian Guter. On February 12 and 13th, we attended the Inside Bitcoin's conference in Berlin. After two months of podcasting together, it was the first time we met in person. We had lots of fun, interviewing many people from the Bitcoin community, attending interesting talks and capturing Bitcoin at this unique moment in his history. This is one of a series of episodes about this conference. This episode features two talks with different perspectives on Bitcoin exchanges. In the first segment, Geron Wukashevich, CEO of Coinsetter, gives a talk on the interesting
Starting point is 00:00:48 business opportunities in and around the Bitcoin Exchange ecosystem. Then, near Haluzzi, account executive at Encapsula, talks about some of the security challenges exchanges face every day and takes it through an actual VDOS mitigation scenario. Next to the draft immediately right now. So here he comes. All right. So Jaron Lucasovic, it's the chief executive office
Starting point is 00:01:16 for Point Center, which offers a high performance leverage trading platform for Bitcoin. Prior to Point Center, and this is a tokenometer. He spoke in New York. He also spoke in Vegas, and it was quite popular there,
Starting point is 00:01:29 so I expect you're going to be a popular here. Let's give a big round of applause. You guys here? If he's promising him, So, John, I'm just going to talk about the Bitcoin exchange ecosystem, but I think there's a more pressing issue on everyone's mine. So instead I'm actually going to be talking about doggy point mining today, I hope that's not a good one. Just kidding, we're going to talk about Bitcoin. How do I do this forward?
Starting point is 00:02:07 I have to get a rest of the same thing. Is it down? Yeah. So, first of all, my name is Sharon Lopezovich. I'm the CEO of the Coin Center. We're in ECN-style Bitcoin Exchange based in New York City. We've created base of the bill of second latency exchange, and we're aggregating a number of other exchange.
Starting point is 00:02:44 on top of it to provide a direct source with the authority to institutions, high frequency traders, stuff like that. And, you know, it's been a really exciting year. We're currently in a growing public data, and it's going really well. We're also very much in the middle of a lot of regulation that's going on in the United States
Starting point is 00:03:07 and dealing with a lot of those issues, and that's one of a few things we're going to talk about today. So, you know, what we've noticed over the last few months is anyone was at, you know, some of the earlier Bitcoin conferences, I actually didn't wear us due to those. There are a lot more suits now over space right now. And, you know, you can visibly see this. So you're seeing a huge entrance of high net worth individuals. As a company, you know, we're starting to be contacted by brokerage houses, especially, I would say. and there's a lot of retail and institutional interest in Bitcoin
Starting point is 00:03:48 but I would say that even just through second market you can see that Bitcoin is growing and smart money is really moving into the space. Another thing that we've seen is people who are interested in Bitcoin, a lot of them have really become a distributed group of arbitrages. So these are people who just, you know, looked at the exchanges,
Starting point is 00:04:12 They said, oh, yeah, I can make money by moving it around, and I'll look at the prices. It's very simple. These people are becoming smarter and smarter, really taking advantage of the different APIs that exchanges have. Another thing that they're also finding, though, is that a lot of the part of charge opportunities in the Bitcoin space that they think exists at first
Starting point is 00:04:32 don't actually exist. I think pretty much every week I'm ready and find a new person asking, you know, why is the price on top so much higher? Or that used to be the case that's obviously been a very extraordinary couple of weeks now. But when you look at all the different, the price differentials
Starting point is 00:04:48 between the exchange, it definitely comes down in banking issues related to each exchange immediately. You know, when we look at exchanges we can aggregate, you know, bit stamp is the only one we've aggregated to date. And I think when you look at how people
Starting point is 00:05:06 view bit stamp, again, extraordinary week, but you know, bit stamping is definitely consider to be the market price because it's the only exchange it really has a free market, very little banking problems, and
Starting point is 00:05:22 historically no big financial problems. You know, one, you know, we're also hearing, just interestingly, a number of billionaires have been buying up large, their point stakes. This is something that we've been hearing
Starting point is 00:05:40 pretty, consistently over the last few months. You have a number of people who are pitching Bitcoin to high-networked individuals using, you know, I think that pitch is usually something like put 1% of your network into it
Starting point is 00:05:55 and you can't double your wealth in five for 10 years. People really are starting to enter the market under this premise. And finally, you know, a bid stamp, private deals have typically happened slightly below bit stamp. And what you've seen is
Starting point is 00:06:11 that private deals have started to happen above the stamp, which really shows that the demand for Bitcoin, the demand for Bitcoin, especially by high-end worth individuals, was growing. And I think that's one of the best examples of it. So, you know, I think when I gave a similar speech in Las Vegas in December, China was really entering the market. A lot has changed. So, you know, if you can trust Chinese statistics in December, there were a lot of, you 70% of the market.
Starting point is 00:06:43 It's now down to 51% of trading, but China is obviously still a very important part of the Bitcoin ecosystem. This is a Bidea trends. That spike was December. You can also see that Google searches,
Starting point is 00:07:00 Bidu searches that are happening in China have calmed down immensely. And I think based on this slide, I'm about to show you, it really shows that China doesn't necessarily have the driving effect that it did a couple of months ago. So this is a slide I showed in the December Bitcoin Conference in Las Vegas.
Starting point is 00:07:22 You can visibly see that China was driving war prices, and it happened three times. You know, one thing we noticed, we have an intent we put on kind of translating or maybe this translating Chinese news articles. and one thing we noticed is that U.S. articles were consistently interviewing and quoting people in China and people in China were consistently quoting me and people in the U.S.
Starting point is 00:07:52 What we figured out is that pretty much no one had a clue what was going on, and it was kind of a self-propagating cycle in December. China was driving a self-up, they didn't really know why, they were buying Bitcoin, but they were, and that was driving the world prices up. Now, since then, the chart has changed dramatically. So, you know, alongside the waning interest and just, you know, Bitcoin searches, search engine searches, you know, you can see that, you know, the market has fallen with that.
Starting point is 00:08:24 And since then, BTC, China, and BSTAMP have basically been in parity in terms of prices. That lasts even today. So that's a very interesting thing to think about. You know, it tells you that the market has, you know, the arbitragetics have really done their part, at least for the time being. And, you know, one other thing that I think many of us have noticed, but is kind of hard to explain is that the Bitcoin market has remained extremely resilient. You know, every week for the past couple of months,
Starting point is 00:08:57 we have bad news after bad news and the market price stays up. It's a pretty bullish sign. Finally, you know, so we're a U.S.-based Bitcoin Exchange and, you know, doing our best to operate legally and I'm trying not to go to jail. So, you know, we've really been working hard on getting, you know, learning about the regulation in the country and how to operate and accept customer funds. That's definitely been a long learning process, and it's still not finished. Even with talk of a bit license right now, you know, no one really knows what that means. Currently, it doesn't mean anything. So, you know, it's a challenge to operate a business when, you know, you are, you know that you're going to have to pay for regulation.
Starting point is 00:09:50 You know it's coming, but, you know, you're also trying to show investors that you're getting that uptick in business. And so that's something that has a U.S. have been changed. We're not necessarily alone in that. It's one of the challenges that you have to work really hard at. The current environment in the U.S., you know, we're about six to 12 months from a solid regulatory framework. You know, right now you do see second market really leveraging their broker-dealer license, and I think that there's a lot more to come there. But, you know, for most companies, it's still going to be a wait-and-see approach.
Starting point is 00:10:27 the best thing you can do is really prepare your technology for that day that you're allowed to operate. Second, support from banks has continued to deteriorate. We're actually one of the few Bickling companies that have a U.S. bank account. It took us three months to get. It was very, very difficult, and our bank is our alternate regulator. Right now, it's an operating account with a promise to help us get MSB licenses. but, you know, what you're constantly seeing is, you know, most companies aren't getting these bank accounts. And on the other side, you're also seeing traders have a lot of issues.
Starting point is 00:11:04 So, you know, I find us, you know, connecting people with Maltese banks just because, you know, if they're running a Bitcoin trading practice out of, you know, maybe their Chase account, these are getting shut down and, you know, it happens overnight. So, you know, I think the banking situation will improve, but right now we're at a sort of an odd point where, you know, banks are very scared to work with Bitcoin companies. And probably for good reasons, you know, I think compliance low, you have a lot of inexperienced in-experience of Bitcoin space still. Another thing that, you know, we've really learned is, you know, we expect that money transmission, money transmission is obviously, a part of the regulatory mindset that we have to take. But money transferter licenses, as was discussed in the Bit License hearing, really don't
Starting point is 00:12:04 fit Bitcoin companies. One of the biggest issues that I've noticed is in some states, if you hold Bitcoins, you would also have to hold an equal amount of U.S. dollars or be bonded for it. And this is something that really doesn't make a lot of sense, and it would be completely not feasible to run a business like that. So that really shows you that it's not just going to be an overnight process where companies go get money transfer or licensing. The laws are going to have to change, and that's going to take regulators' time to create those laws. Second, you know, I look at, I think there's still a big learning for the regulators.
Starting point is 00:12:44 So looking at, comparing for instance, coin-based blockchain, a regulator will look at both of these companies and say these are companies holding customer funds. and they both need to be regulated. But a deeper look into blockchain will show you that blockchain, as a company, doesn't necessarily hold customer funds. They're actually much more similar to a desktop wallet. So, you know, what is the regulation that Armory would have to face versus blockchain? Should those be different?
Starting point is 00:13:13 In my opinion, probably not. So, you know, really, I think it's also going to take a lot of time for regulators to come to grips with issues like that. I mean, this whole financial revolution that's happening right now is based off of minimizing the place that the third parties have as a trusted third party.
Starting point is 00:13:35 You know, blockchain is a great example of a company minimizing that, and I think that this is still very early days. Regulators are going to have a lot of catching up to do. You know, finally,
Starting point is 00:13:50 another very difficult question. This is brought up in a bit license hearings is dark wallet technology, all point mixing. These are things that are going to exist. While we have one faction of the space really pushing towards getting licenses and creating regulation for companies like ours, you have another faction really working hard on, you know, pushing Bitcoin to the anonymous limits. That's going to happen.
Starting point is 00:14:18 So, you know, how is regulation going to play with that? will companies that don't have public ledgers that are easily that you can decipher, are those technologies going to become illegal? Or will they not? You know, there are a lot of unanswered questions here. And, you know, I think despite all this uncertainty, U.S. companies, first I speak with, you know, Bitcoin is global, and I speak as a U.S. citizen than the U.S. company.
Starting point is 00:14:49 but in the U.S., currently, foreign companies are winning. That's not going to be sustainable. In the end, when you look at the regulation that's going to be coming into the space, U.S. companies are going to win, so the companies that can survive right now with the technology that will be needed to quickly run when regulation starts to kick in,
Starting point is 00:15:10 those are going to be the companies that win. And, you know, I also strongly believe that Sunday banks will acquire Bitcoin exchanges, So while they hate Bitcoin right now, you know, over the long run, they're going to see that there's a strong profitant sector to owning a Bitcoin exchange, especially as this becomes a backbone to period of repayments and even international money transfers. You know, owning that exchange transaction of profits associated with that is going to be very important.
Starting point is 00:15:44 And what, you know, some of the large for its companies and the banks don't see yet, is that we're really creating a customer basis for them, and someday they'll see that. You know, finally, I just want to touch upon a view I have about alt coins. And this is where I start talking about doggie coin and the alt that up. But just kidding. But, you know, when I look at an alt coin, you know, you have a lot of interesting alt coins coming out right now.
Starting point is 00:16:18 What is really important in an all coin for it to succeed over the long run is that it has a useful infrastructure above it. So looking at a lot of the distributed securities exchanges coming out and technologies like that, though those are very big case points. I think we're just touching the beginning of this in general. Ripple would be another system that you look at if banks demand their payment network, the XRP is brought up in value just by consequence. So looking at any sort of distributed public ledger, if you think that that ledger has used to people and will we use, you know, that that's a decent bet, at least that that that alt coin below it may rise the value.
Starting point is 00:17:03 And with that, I'm happy to answer any questions. It didn't depend. You work with this? It wasn't clear. Yeah. No. But, you know, we work with. we work with
Starting point is 00:17:39 Farkasi Bank in Malta, our U.S. Bank, we know. What president? Thank you. Did you say where you're from? Yeah. Alice, I'm from New York. So I was interested
Starting point is 00:17:55 you put up the China Exchange trading volume. How, from an exchange perspective, do you know what's fudged and what's real in terms of volume? There's a lot of accusations of 4B, fudging at volume over the last few months
Starting point is 00:18:09 and, you know, it only dropped when there was a lot of attention. Yeah, Wobie's crazy. You know, we've tried to do a little bit of research, and I think we came up with a very similar thought that possibly the majority of their trading is just completely evaporated.
Starting point is 00:18:28 So, you know, that's a tough thing in showing a global statistic. Someday, I think we'll figure that out, especially as more and more companies linked to exchanges, those issues, you can't really apparent because the actual liquidity there doesn't necessarily match when they're displaying in terms of transaction volume.
Starting point is 00:18:49 Dustin Brandt from Munich. I have a question on the typical American customer. What do you think? How many, what percentage of American customers and the Bitcoin trading volume is handled through American companies like Coinbase or local bitcoins? And tell them how many people and which kind of people are really going overseas to the transactions using Bitsdam or other exchanges? Well, an important thing to think about with Coinbase as well is the backbone to
Starting point is 00:19:19 Coinbase is Bitsam. So, and that's pretty common for any other workers in the space. And pretty much every, you know, Bitsam is a liquidity source for everyone right now, CoinSutter as well. So, you know, I would say, I haven't looked at CoinBase's recent transaction volume, I assume maybe it's something like $60 million a month. I'm sure it's public somewhere. But, you know, I think the important thing to think about is, you know,
Starting point is 00:19:51 if in Sam or a lot of these other exchanges are operating, you know, accepting U.S. customer funds, offering full exchange with Bitcoin, you know, and they are subject to, you know, what FinCEN said laid out in March, I think it's going to be very tough for them to get money transfer their licenses, given that they're not based in the U.S.,
Starting point is 00:20:13 given that they've been operating in legally for so long, and even if they get those licenses, they're going to have a huge, huge fine. So millions of dollars worth. And I know Nate's, he's pretty cheap, so I don't know if he might not go into the U.S., but, I mean, it's pretty early to say, but I think when you look at other industries
Starting point is 00:20:37 that are regulated in the U.S., especially in financial services, it tends to be protective of US companies and they try to push non-US companies out. Yeah, Robert from Sweden. How do you think the environment that will look like in half one year?
Starting point is 00:20:57 It'd be just a few exchanges or a lot of them so you have like one exchange in every jurisdiction. Yeah, I bifurcate the industry into like a full order book exchange That's what the coin setter is. That tends to be the back-the-bone of liquidity,
Starting point is 00:21:16 and that's also excluding maybe futures and options market that companies in the space, such as coin set, maybe working on as well. But, you know, I think the full order book exchange, that will be just a few companies. Those are very difficult to build. You know, I can tell you I thought we're going to build ours in three months.
Starting point is 00:21:41 with many more features. To build a really low latency system that is well tested and works properly, I mean, that takes you nine to 12 months. So I think there will only be a few really good for Word of Book exchanges, half of it, who can get the licenses. On the kind of like cash to Bitcoin side, I think that's going to be a very decentralized market. So we recently saw it happen in the UK, I believe, with Barclays of Boyd, Barclays.
Starting point is 00:22:11 I think you're going to start to see stuff like that happen at Wells Fargo. So I think you're going to see that. You're going to see a lot of Mamasuos pop up. That cache to Bitcoin component, I think that's actually a really important part of the space. I mean, you know, I used my ATM card and pull out euros when I came here
Starting point is 00:22:33 and I really look at more and more people are going to hold Bitcoin or at least use the Bitcoin infrastructure in some form. to pull cash out when they go to a country. And also put it back with that, that's another tough part. So pretty early days, but I think that that side of the business, any company that kind of deals with people in person, those are going to be very decentralized.
Starting point is 00:23:03 Hey, awesome presentation. All right. Thanks a lot. Good job. It seems to be a very popular topic about you with regards to Bitcoin. In another text on Bitcoin exchanges. We actually protect two of the largest bitcoin exchanges that speaks to China and BitStem. So first a little bit about in Capsula, we define itself as a web application delivery in the cloud. So what we do is we offer different services that relate to website security and website acceleration.
Starting point is 00:23:41 That includes Demos litigation, web application firewall, CDN, load balancing, and lots of other services. So first a few words about DDoS in general. Dinos is a very popular and common type of attack on websites. And the purpose of these attacks is to deny
Starting point is 00:24:02 service for real business to the website. And usually it's done by generating false traffic in different ways to the website. So that's a very general definition. Actually, there's hundreds of different ways of how to generate Didos. And it's actually, it's also evolving together with the internet. So the methods that
Starting point is 00:24:20 are used to generate a text and the volume of the text keeps growing and keeps changing all the time. In general, you can divide the type of text, these attacks, through three categories. The first category is called volume-based text, or volumetric attacks.
Starting point is 00:24:36 And the purpose of these attacks is to generate very large amounts of traffic, to send them to a web server or a website, and simply clog the pampments or the capacity of the server. There's different ways to do that, but usually the technique uses
Starting point is 00:24:54 called amplification. So if the hacker has access to a certain amount of bandwidth, say 10 megabits per second, they're actually using, they're not sending it directly to the attack website, they're using other servers, like DNS servers, and they get there to send the traffic to the attack website. And when they do that, they actually increase their capacity. So they can actually generate a much larger attack than the enemies that they control. So the only way to deal with these kinds of attacks
Starting point is 00:25:28 is to have enough capacity or infrastructure to take in the attack. It doesn't matter if you can tell that this is junk traffic or that this is the volumetric attack, you're still going to get clogged. So you need to have enough capacity to take in the attack while letting the legitimate traffic in. The second type is actually the two first categories are sort of similar.
Starting point is 00:25:50 They usually call them network attacks because they all happen on the network there, not on the application there. And the second type is protocol effects. These are the text that try to abuse other resources of the server, not the bandwidth. So it could be networking resources, it could be connections, it could be the firewall, something to do with the networking on the server. The most common type of attack there is called skin floods. That's where the hackers, they open a lot of connections with the attack server,
Starting point is 00:26:23 and they never close them. So you get a server that keeps opening connections until they reach their capacity. Then when real visitors try to connect to the server, they can't. And the third type of attack is called application there. This is where the hackers use usually HTTP traffic. that seems to be like real visits to the website. There's different ways to do that with different levels of sophistication.
Starting point is 00:26:52 But the problem there, these attacks usually are much smaller. They don't require a lot of bandwidths, but they're much harder to mitigate because it requires being able to tell the difference between the fake traffic, the robotic traffic, and the real visitors to decide. So you don't want to block everyone
Starting point is 00:27:07 when you're under attack that defeats the purpose. We want to be able to let the real visitors in and blocked the robotic so I'm going to present the case here of one of the attacks we recently mitigated it was one of the most sophisticated attacks we had to deal with
Starting point is 00:27:25 it actually lasted a long time, it lasted several weeks. It really never died down, it's still happening on occasions, but the major waves have managed to mitigate. The target of this attack, I'm not going to be able to say the name of the company
Starting point is 00:27:45 it's one of our customers. They're a trading platform, versus a trading platform. And they're actually a multi-tenant environment. So they allow businesses to open a trading platform on their infrastructure. And that creates vulnerability for them because if one of the tenants in the environment gets hit, everyone suffers.
Starting point is 00:28:05 This is actually what happened with this effect. One of the brands, one of the trading brands on their platform got hit. And that caused problems for the entire system. So the first wave of this attack was a volume-based attack. It was a seam flag of 30 gigabits per second. That's actually quite a lot of traffic, but it's not a huge attack in their standards. We see attacks of 100 gigabits per second,
Starting point is 00:28:32 and we can evolve that. But the thing that was interesting about this phase of the attack is that the hackers weren't used in amplification. So what they told us is they have access to a lot of resources. If you can generate 30 gigabits per second, second of traffic, just using your own resources without amplifying the traffic that means you have
Starting point is 00:28:50 a huge amount of resources which in this context it means they have possession of a very large botanids where they used to generate the attack. Sorry to interrupt but can you please explain what DNS amplification could you please explain what
Starting point is 00:29:07 DNS amplification is? The DNS amplification is one of the methods I talked about before to generate polymetric attacks and what they do is they query open DNS servers with queries that the response for which is very large. Like they ask, all the information you can give me about the DNS. And then they spoof the return after. So instead of you getting the answer back, you spoof it to the attack website.
Starting point is 00:29:32 So what you get is a lot of DNS servers sending answers to a website that never asked the question. Okay, so what we need to mitigate this phase of the attack. is what we usually do with the volumetric attacks, we divide the traffic. I mentioned we are CDN, so we have data centers all around the world, and we use networking protocols
Starting point is 00:29:56 to divide the attack traffic between them. So this is how we can absorb. Now, each one of the servers, we have redundant servers that are meant to take in DDoS traffic. So this is how we managed to take the attack. Also, we did some blacklisting of the IPs that we could identify to me.
Starting point is 00:30:15 generating the attack. So then the second phase of the attack, and here the actors already started to use application bare attack. So what they did is they used adject requests to access a resource, a very heavy resource
Starting point is 00:30:36 on a customer's application. So the reason they used adjax is not by coincidence. Some of the techniques that we use to teleport box from humans, you can't use them with Ajax. Because what we do a lot of the times if we send JavaScript code to a visitor, and we try to see whoever is on the other side
Starting point is 00:30:58 can process the JavaScript. So real browsers can process JavaScript. What's usually we can't. But when it comes to Aljavs, we cannot use this means because Ajax inquest don't process JavaScript. So the hackers were already becoming aware that the customer is on PAPSula and they became aware of some of the means.
Starting point is 00:31:17 that we were using, so they used objects to confuse us. Also, the resource they were accessing was something that only registered users from the application would access. So what they did is they got a hold of a list of registered users, so they can use them to access the resources. That was another indication that this attacker was well prepared for the attack, and then they prepared an attack. So the way we blocked this part of the attack is, since we could,
Starting point is 00:31:49 use the normal means of use, which is JavaScript and cookie tests. What we did is we used behavioral detection. So this is a filtering method we use where we try to identify behavioral aspects of the visits that tell us that there are bots. So, for example, we could look at the rate that the request are coming, at the variance of the rate of requests of someone is accessing the reasons every second that tells us, you know, maybe it's a robot, maybe it's not a human. It's also about the parameters that go into that.
Starting point is 00:32:24 Also reputation techniques, so we will start identifying IPs or combinations of IPs, headers, and so on. And that helped us identify the attack of the crisis. So they took care of the second phase of the attack. And after a while, it was the third phase of the attack. And what happened in these phases, the others were starting to use their botnet, were actually opening out real browsers on infected computers on the bottom that they were controlling. So the way it was supposed to work is the browser was supposed to open without a UI.
Starting point is 00:33:03 So whenever got infected by the virus, we actually open up a lot of browsers, but the users would not see them. But it turns out that the hackers, they had a bug in the virus, and on Vista machines, it opened out the browsers with the UI. So what we had is a lot of people that started seeing 20 browsers open up at the same time. And since we were already mitigating the attack, they would see Capsula's logo on the browsers. So what that caused is a lot of people thought we were the virus that was affecting them. So we got started getting a lot of hate calls. A lot of angry people calling us saying, I never installed in Capsula, why are you with my computer?
Starting point is 00:33:47 Why are you opening browsers on my computer? So how we did we handle that part of the attack? So what we did eventually is we got in touch with one of the people who were infected and we got a hold of the trojan, of the virus itself. Then we started reverse engineering it to see how it worked. So they gave us some information about how the control center for the attack was sending comments to the bots. And using that and started to create signatures to identify the bots.
Starting point is 00:34:22 So that helped us block this wave in the attack also. So when the end up died down came the fourth wave of the attack, that was the most intense part of it. And what the hecklers used in this case, they use something called headless browsers. So headless browsers are software that imitated browser. It's more advanced than a simple bot because it can really do anything in browser can do,
Starting point is 00:34:49 including they perform JavaScript. with hand of cookies and so on. The specific type of headless browser used here was the phantom JS. This is the open source code. Usually it's used for a low test team and stuff like that. But in this case it was used for an attack.
Starting point is 00:35:09 And the traffic sent in this place of the attack was huge. So it was 150 hours where we saw 180,000 different IPs used. 700 million requests per day. And you can see in the animation that I was also distributed globally. And also we noticed that the packets were also getting more and more sophisticated,
Starting point is 00:35:34 and they noticed that we were using behavioral filters to block Bintech. So what they did is they started to try and counter our behavioral filters by adding a lot of randomality in how the bots were used. So things like the rate of requests were randomized, the IPs that were used, everything was randomized to seem like real people. So what we did actually in this case to mitigate the attack is what we couldn't use, again,
Starting point is 00:36:05 we couldn't use the JavaScript test and cookie tests we usually do because headless browsers can handle them. And we couldn't use behavioral, who was hard to use behavioral, because the hackers were trying to avoid that. Luckily, we're not used to phantom JS, or it's not new to us.
Starting point is 00:36:24 We have a lot of information about non-bots like Phantom DS. And we create what we call signatures for these kinds of bots. So a signature can be a combination of attributes like headers, whether the header is written in lowercase or uppercase, you know, in coding how the output handles encoding, and then that helps us identify these blocks. So this is a filter that exists in our system, been there for a long time.
Starting point is 00:36:55 So we can easily identify that the requests were coming from Phantomjs. Now, with the regular customer, we don't usually block that, because it could be a legitimate request. But since this was a huge attack being allowed to our customer, we changed the rules so every Phantom GS would
Starting point is 00:37:13 pop up a CAPTCHA for the visitor. So this gave a chance for people who were falsely identified as Phantom JAS to redeem themselves by giving up the capture. Surprisingly, that hardly happened. Most of the, almost all the requests were blocked and managed to fill up the capture.
Starting point is 00:37:34 So this is how we blocked this phase of the attack. Okay, so, and this was the last major phase of the attack. They're actually, this customer keeps getting hit by smaller waves. So the hackers never entirely give up. But nothing that really has an effect on the customer. So I'm going to mention some, because the five commandments of Divis mitigation is, are like conclusions from this case, and other cases that help mitigate, of what you should look for in the Divis litigation service.
Starting point is 00:38:10 So the best commandment is absorb all that is cast upon you. That means that that relates to the volumetric attacks. And really the only thing you can do against this attacks is have enough infrastructure. If you get in a solution, a business mitigation solution that has under, 100 gigabits per second capacity, you're not doing anything. So you need to get a service that has a very large capacity to take these attacks. Second commandant, doubt should be invisible. So that means your regular visitors should be unaware that you're being attacked.
Starting point is 00:38:47 Otherwise, if you're mitigating an attack and the regular visitors get locked or they have some negative effect on their browsing experience, and again, you're not doing anything. Especially when it comes to trading systems, you don't want people thinking that you're being attacked, it gets them worried when they know that you're under attack. So we call it false positives. With every mitigation process,
Starting point is 00:39:14 some of the real visitors are going to get identified as bots and blocked. But you should try and get a service that minimizes the rate of false. positive. The third amendment that he used innocent step forward. So in those cases
Starting point is 00:39:32 that do happen when real people get blocked, you need to give them a chance to redeem themselves. That usually would be a capture,
Starting point is 00:39:38 feeling up a capture. Or if they get completely blocked, you need to give them a chance to contact you or someone and say that they didn't block.
Starting point is 00:39:46 So just blocking them without any message or any information on why they can block is not going to work. The fourth commandment,
Starting point is 00:39:57 respect the Internet God. So, So just categorically blocking all the bots. It's also not a good solution because there are those bots that you do want to let in, like Google Bot and other search engines. And if you block them for, say, several days,
Starting point is 00:40:11 you're going to get hurt. Your website is going to get hurt just as much as from the GIMS. So you need to be aware of the kind of bot that accesses your website and only block those, you know, what we call the bad points. And if it's a commandment, if a precise detection, is divine. that means we usually don't want to be in Ditos mode
Starting point is 00:40:35 always. Our customers they're either on a regular mode or Didos mode. So if you're always on DOS mode you're going to get a lot of false positives and you're going to pop up catches to people. You don't want that but you also don't want to monitor your website all the time. So we need some sort of
Starting point is 00:40:51 an automated system that will trigger DOS mode when it's required. Usually it's a rate limit. It's something that measures the number of bots that enter your web website per second and then when a certain level gets exceeded, you should go into new slot. That's it. Questions?
Starting point is 00:41:15 Since we are handling with Bitcoin, I wonder if these mitigation services, they have to know the actual traffic, right? So you have to read a cookie or something like that. Since you are using these cookies for instance to use. instance to check if user has open the capture and something like that. But then if we are the business, we want to protect our customers from
Starting point is 00:41:59 the daily ceiling, we use H-S and so the traffic has to be routed to your services, right? So you know the content of the users. So if they put in their password, for instance, you know their password, right? We know it, but we don't keep you. We don't save the information on our service. We filter it and we let it through.
Starting point is 00:42:19 Okay, I probably do that, but in Bitcoin it's always about provable trust. So how can we prove to the user that the password is not stored in any other places? Well, the first of all is, if it's HTTP and it's going to be HTTP also while you want encapsula. So it's going to be encrypted from the visitor to be it from encapsula to your server. So that's, you know, just like any other HTTP communications, it's encrypted. And as I said, that part of the way where we decrypted and filter the traffic, we don't say it. So that's dead on our reputation. Okay, thank you.
Starting point is 00:43:00 This is all about DOS. All about something like additional security, like clouds that it has, like a SQL injection, cross-site scripting, and DOS is just a base, it's primitive, I mean, it's all, it's been around for a long time. out that there's a much bigger trust than just lost. I mean, if you, if we go with them, your DNS, change the NS is there any additional airsa security? Yeah, well, actually, the topic of this presentation was Dinos,
Starting point is 00:43:40 but we do a lot more than that, and it's a good question. We do, what you're talking about is a web application file. That's the thing that blocks SQL injections, prox-sidesprick and all that. We're actually, I haven't spoken about it, but we're a subsidiary of Imperba, which is a provider of web application firewall and it's a well-known company in this field.
Starting point is 00:44:01 And we started as a company that offers their web application firewall technologies for the cloud. Only then we added DDoS and the other services. But that's still, that's a major part of our service. And any enterprise account gets the web application firewall is wrong. Hi.
Starting point is 00:44:21 This is service tailored in any way to Bit ecosystem or exchanges over just a generic indoor convention service? It's generic, but it can be tailored, not Bitcoin in general, but to a customer. So the part
Starting point is 00:44:39 that's a web application by what that has spoken about is customizable to your specific application. So if you have certain patterns in your API then seem to be a tech. You can exclude them or you can add other patterns that you worry about.
Starting point is 00:44:54 So it's very customizable. Part of it is done by us where we have managed service. But you can also do it yourself. So you have custom rules that you can add to the webbiscan file and then feed them to your specific application. Actually, I got the mic.
Starting point is 00:45:11 Can I ask you a great question? You mentioned that you don't really store any packets, but in cases, but you host the SS Hub certificate, right? Yeah. And what about cases where a client has an EB certificate?
Starting point is 00:45:23 Does that invalidate a EB certificate if you're the one who's actually hosting a certificate? So we have two options of how to host a certificate. One of them is a encapsula generated certificate, in which case the visitor is not going to see your branded certificate, and see ours. And it's a son certificate, so it's going to be joined with a lot of other remains. But for enterprise customers, you have an option to upload your own certificate to our servers, and then the user is going to see your certificate,
Starting point is 00:45:52 Just as the same as they have to get directly to your side. Thank you. And what is the source of one number that I got right? I think it's something like 10,000 layer 7 web protocol requests per second. I'm asking because I'm like the rest to me that seems something that on a system that scales out, I could be easily handled. But I'm worried will tomorrow or next, nearer we see an attack
Starting point is 00:46:31 plus 10 million sub-requess per second right so if you have a mitigation service especially a cloud-based mitigation service and it doesn't matter from your point of view because these requests are another money
Starting point is 00:46:45 in the cloud before the intervention server so it's actually our problem it's a request where I think if you just else said there's a high risk of both models Oh? Yeah, but the rate of false positive doesn't depend on the number of the press.
Starting point is 00:47:03 It depends on how well we know to tell them apart from real ones. It's a measurement that we use to check ourselves to see how well we can tell apart what from humans. But it doesn't, it depends on how well our rules do that doesn't depend on the number of Congress. Yeah, thanks for the presentation. Just a very small short question. Is there any way to get these guys? To get this guy? Yeah.
Starting point is 00:47:36 We don't deal with that. We don't even try to get them. We try to only block the attacks. I'm not aware of any service that has the approach of trying to identify the source and then getting them. It's too complicated, it's too hard, and a lot of ways to identify themselves.
Starting point is 00:47:53 It's just a matter of blocking. Let me just put a question for my question. What is better typically the motivations for these kind of attacks? The two main motivations are commercial, so competitors, business and political. Another question, if, for the web front end, we would use an mitigation service like yours. Is it any possible to get, like, with an API ID addresses or something like that, all the bots you think are that are bots right now,
Starting point is 00:48:33 so we can just block on our other services that are not webbexed. if they try to attack us from the same locations. Is it possible to get this IPs? Yeah, I'm sorry, I said to get APIs to what? API is to get the IP addresses, for instance, from the services that you think right now are trying to attack us, so it can block on other and all the framework gateways on other, for that.
Starting point is 00:49:02 So yeah, first of all, we offer APIs. You can also, we have a dashboard for users. You can see we have like an API. then we're going to see exactly who try to add to the divorce server and you get the IP list for there or even the APIs well congratulations
Starting point is 00:49:24 of keeping people's interests this later today right before the drink reception so we're not sure. Let's give it on the ground we hope you enjoyed this episode about Inside Bitcoins Berlin. If you liked our coverage of the conference please consider tipping us
Starting point is 00:49:44 at Epicentorbitcom slash tips. You can also subscribe to a weekly newsletter at epistenderbidcoin.com slash newsletter. We really enjoyed providing you coverage of this conference. We're excited about the journey we're on with Epicenter Bitcoin. And we're grateful to have you as our listener.

There aren't comments yet for this episode. Click on any sentence in the transcript to leave a comment.