* screenshot of the back office application
* OSX and Windows back office application binaries
* btc_xfer_total_summary.txt
* CV-Mark_Karpeles_20100325.pdf
* home_addresses.txt
* trades_summary.txt
* btc_xfer_report.csv containing every deposit and withdraw
* mtgox_balances containing the balances of all user wallets
* trades.zip containing monthly csv files of all trades within mtgox & coinlab between 2011-04 to 2013-11
* trades csvs have fields:
Trade_Id Date User_Id User User_Id_Hash
Japan Type Currency Bitcoins Money
Money_Rate Money_JPY
Money_Fee Money_Fee_Rate Money_Fee_JPY
Bitcoin_Fee Bitcoin_Fee_JPY User_Country User_State
From this data you could reconstruct every trade within the site, and identify the address from transaction values.
This dataset could lead to loss of anonymity to a significant number of people in the cryptocurrency world.
If what you say is true and this data is sufficient to recreate and de-anonymize the trades on gox against withdrawals from their addresses shouldn't we be able to see if coins were actually stolen through tx malleability?
This dataset could lead to loss of anonymity to a significant number of people in the cryptocurrency world.