{"version":1,"type":"rich","provider_name":"Libsyn","provider_url":"https:\/\/www.libsyn.com","height":90,"width":600,"title":"\u0411\u0411-039: \u0410\u043d\u043e\u043d\u0438\u043c\u043d\u043e\u0441\u0442\u044c \u043d\u0430 \u0441\u0435\u0442\u0435\u0432\u043e\u043c \u0443\u0440\u043e\u0432\u043d\u0435: \u043f\u0440\u0438\u043b\u043e\u0436\u0438\u0442\u0435 \u043e\u0434\u0443\u0432\u0430\u043d\u0447\u0438\u043a","description":" Evaluating User Privacy in Bitcoin An Analysis of Anonymity in the Bitcoin System Hiding the Rumor Source Evaluating User Privacy in Bitcoin  An Analysis of Anonymity in Bitcoin Using P2P  Network Traffic Deanonymisation of clients in Bitcoin P2P network Bitcoin over Tor isn't a good idea Discovering Bitcoin\u2019s Public Topology and Influential Nodes Anonymity Properties of the Bitcoin P2P Network Dandelion: Redesigning the Bitcoin Network for Anonymity Dandelion++: Lightweight Cryptocurrency Networking with Formal Anonymity Guarantees  Dandelion - Privacy Enhancing Routing (BIP draft)  basicblockradio.com ","author_name":"\u0411\u0430\u0437\u043e\u0432\u044b\u0439 \u0411\u043b\u043e\u043a: \u043f\u043e\u0434\u043a\u0430\u0441\u0442 \u043f\u0440\u043e \u0431\u043b\u043e\u043a\u0447\u0435\u0439\u043d","author_url":"https:\/\/basicblockradio.com\/","html":"<iframe title=\"Libsyn Player\" style=\"border: none\" src=\"\/\/html5-player.libsyn.com\/embed\/episode\/id\/6795947\/height\/90\/theme\/custom\/thumbnail\/yes\/direction\/forward\/render-playlist\/no\/custom-color\/88AA3C\/\" height=\"90\" width=\"600\" scrolling=\"no\"  allowfullscreen webkitallowfullscreen mozallowfullscreen oallowfullscreen msallowfullscreen><\/iframe>","thumbnail_url":"https:\/\/assets.libsyn.com\/secure\/item\/6795947"}