LLM 恐破壞網路匿名與隱私:AI 能找出中本聰是誰嗎?

一份最新學術研究指出,大型語言模型 (LLM) 已具備在大規模情境下「去匿名化」網路使用者的能力。只憑公開發文內容,模型便可能推測出匿名帳號背後的真實身份。這項發現不僅引發外界擔憂,也在加密社群掀起關於「是否能揭開中本聰真實身份」的討論。

研究揭示:LLM 讓個資去匿名化變得更簡單

這篇題為《使用 LLMs 進行大規模線上去匿名化》的研究指出,LLM 已能從非結構化文字中抽取身份線索,並在龐大資料庫中進行語意搜尋與比對,實現高度自動化的去匿名攻擊。

研究團隊設計一套四階段流程:抽取 (Extract)、搜尋 (Search)、推理 (Reason) 與校準 (Calibrate),模擬攻擊者如何從公開發文中重建個人特徵,進而比對真實身份。

大規模去匿名化研究框架概覽

在實驗中,研究人員將 Hacker News 帳號與 LinkedIn 檔案進行交叉配對,在 99% 精準度 (precision) 下仍可找回約 45% 真實身份;在 Reddit 帳號的實驗中,即使經過時間區隔與內容過濾,模型仍在高精準條件下識別出一定比例的用戶。

論文作者 Simon Lermen 認為,LLM 並非創造新的識別能力,而是大幅降低原本需要人工追蹤的成本,或將實現去匿名化攻擊的規模化。

「假名保護」失效?AI 將挑戰網路匿名性

過去,網路假名 (pseudonymity) 之所以被用作保護措施,並非因為無法識別,而是因為識別成本過高。Lermen 指出,LLM 改變的正是這一點:「模型能在短時間內處理數萬筆資料,將人類調查流程自動化。」

他強調,這並不代表所有匿名帳號都會立刻被曝光,而是代表「只要留下夠多文本線索」,模型就有機會重建身份輪廓。換句話說,文字可能在未來成為被挖掘的微型數據 (micro-data) 目標,即使沒有姓名或帳號連結,興趣、背景或用語習慣等訊號,也可能成為識別依據。

加密世界的隱憂:鏈上透明性會成為監控工具?

這項研究迅速在加密社群引發討論。Helius Labs 共同創辦人 Mert Mumtaz 認為,區塊鏈本質依賴假名身份,而所有交易紀錄永久公開,一旦 AI 能將鏈上地址與現實身份連結,就能夠建立長期的金融活動檔案。

他擔憂,區塊鏈原本被視為去中心化金融基礎設施,卻可能在這種情境下成為高透明度的監控工具。

(比特幣公開收款不再裸奔!靜默支付 (Silent Payments) 如何實現便利性與隱私保護)

中本聰會被 AI 找出來嗎?文體分析成新變數

同時,Castle Island Ventures 合夥人 Nic Carter 也提出另一個問題:若 LLM 可進行高階文體分析 (stylometry),是否可能比對中本聰過去的電子郵件、論壇貼文與白皮書文本,推測其真實身份?

他認為,理論上若存在可對應的公開著作樣本,模型或可進行機率匹配;然而這仍屬於統計推論,而非確證工具。一旦創作者改變文筆風格或未曾以真名公開寫作,基本上難以識別。

(艾普斯坦檔案揭露比特幣早期權力網路,這位性犯罪者會是中本聰嗎?)

當 AI 衝擊隱私:加密與匿名技術仍待升級

Lermen 在結論中強調並非要引發恐慌,而是指出傳統加密與匿名機制需要更新。過去僅對結構化資料感到憂慮,如今連非結構化文字也可能被識別。隱私不再只是技術問題,也涉及平台政策、資料揭露習慣與社會規範。

在 AI 能力快速進展的背景下,用戶隱私如何被重新設計與保護,也成了各家企業的重要課題。

這篇文章 LLM 恐破壞網路匿名與隱私:AI 能找出中本聰是誰嗎? 最早出現於 鏈新聞 ABMedia。

Disclaimer: The information on this page may come from third parties and does not represent the views or opinions of Gate. The content displayed on this page is for reference only and does not constitute any financial, investment, or legal advice. Gate does not guarantee the accuracy or completeness of the information and shall not be liable for any losses arising from the use of this information. Virtual asset investments carry high risks and are subject to significant price volatility. You may lose all of your invested principal. Please fully understand the relevant risks and make prudent decisions based on your own financial situation and risk tolerance. For details, please refer to Disclaimer.

Gerelateerde artikelen

EtherRAT Malware Recently Identified Combining Credential Theft and Cryptocurrency Wallet Attacks

According to LevelBlue SpiderLabs researchers, EtherRAT, a recently identified malware, combines credential theft, remote access, and cryptocurrency wallet attacks in a single coordinated campaign. The malware is distributed through fake Tftpd64 installers hosted on fraudulent GitHub repositories de

GateNews32m geleden

Hundreds of Dormant Ethereum Wallets Drained by Single Address

According to ChainCatcher, hundreds of Ethereum wallets dormant for over seven years were drained by a single address today (May 2), according to crypto analyst Wazz. Aragon team member @TheTakenUser confirmed their wallet funds were transferred without authorization. The cause of the incident

GateNews58m geleden

Zcash Foundation Releases Zebra 4.4.0, Fixes Consensus-Level Security Vulnerabilities

According to Zcash Foundation, Zebra 4.4.0 was released today, fixing multiple consensus-level security vulnerabilities and urging all node operators to upgrade immediately. The vulnerabilities include a denial-of-service flaw that could halt block discovery permanently, sigops counting errors

GateNews2u geleden

Wasabi Protocol's EVM Deployment Hit by Security Incident on April 30, Now Contained

According to Wasabi Protocol's official statement, the protocol suffered a security incident affecting its EVM deployment on April 30, which has now been fully contained. The Solana deployment and Prop AMM remained unaffected. The project has closed attack vectors, rotated credentials and keys, and

GateNews3u geleden

Hundreds of Ethereum Wallets Simultaneously Hacked, Assets Transferred

Hundreds of Ethereum (ETH) wallets, including some inactive for over seven years, were simultaneously compromised in an unusual transaction event on the Ethereum network, according to Coin Bureau and the cryptocurrency community. Assets from the affected wallets were moved to the same address,

CryptoFrontier11u geleden

Digital Asset Security Moves Beyond Keys as Bitgo Adds 5-Layer Checks

Bitgo is pushing digital asset security beyond private keys with a five-layer transaction model designed to stop manipulation before execution. The system checks intent, device, identity, behavior, and policy, targeting risks before transactions are finalized. Key Takeaways: Bitgo introduced five

Coinpedia13u geleden
Opmerking
0/400
Geen opmerkingen