BLOCKCHAIN ANALYSIS, TRACKING AND TRACEABILITY
OF CRYPTO TRANSACTIONS
A blockchain is the cryptocurrency equivalent of a bank statement, it is a record of all real-time transactions that take place around the world. There are only two differences with a bank record: it's public, anyone can go in and see it; and only the addresses of the sender and recipient of the transaction are reflected (the equivalent of a bank account number) but it is not known who it is the address's owner.
And this is where we come in: through a process of inspection, identification, grouping and visual representation of data, we analyze the different blockchains with the aim of discovering useful information about the different actors involved in specific transactions in order to be able to trace them and trace its movements.
The information is always there and is usually public, you just have to know how to access it to extract it. And we have the knowledge and the tools to do it.
BLOCKCHAIN ANALYSIS
A Blockchain is a database based on blocks of information designed so that, once published by validators, they cannot be modified. Furthermore, each block is linked to the block before and after it (hence the concept of a 'chain of blocks') so that if an attempt is made to modify any block, the block before and after it must also be modified, and retort, the entire string, which makes it impossible to modify any element of the string because to do so, everything else would have to be modified. That's why if you know how to analyze, a blockchain is an immutable source of information and provides a lot of information, and very precise, about the activity of any person.
TRACK OF CRYPTOCURRENCY TRANSACTIONS
Detractors of cryptocurrencies allege that they are used to carry out illicit operations, but they do not take into account that any movement made with public blockchain cryptocurrencies, such as Bitcoin can be, is fully trackable (and that doese'nt happens with, for exemple, fiat cash money...). By looking at a node or a block explorer website, anyone can see the content of transactions, and with the necessary knowledge and tools it is possible to map all transactions. In fact, this is how the police catch many criminals using Bitcoin as a payment method. But, of course, the detractors of cryptocurrencies won't tell you that...!
CRYPTOCURRENCY TRACEABILITY
We have already said that the vast majority of Blockchains are usually public, which is why it is possible to track cryptocurrency transactions. In the same way, then, you can make a "family tree" of the paths that have been followed to reach a specific portfolio. And in fact, this is what all banks look at before banking euros or dollars from cryptocurrency sales, to make sure they don't come from illicit activities.
We make private reports detailing all this information to present them in Compliance banking requests, so the client will know in advance and exactly what the path has been taken by the your cryptoassets before they reach your wallet, and before the bank analyzes their provenance.
Any human action leaves a track. It is a matter of finding it.
X. Towers - Gatxan CEO
INTEGRAL INVESTIGATION RESEARCH ON THE NETWORK AND FIELD RESEARCH
Often it is not enough to find out which wallet has made which transfers, it is necessary to link it to a specific activity to associate it with situations that have occurred and to be able to relate everything to a specific person. And that's what we're all about too: we help investigative teams and collaborate with lawyers and private investigators to track, follow and investigate all kinds of people and suspected criminals and cybercriminals from of OSINT public sources with the commitment to always comply with current legislation, both in legal matters and private security, guaranteeing the legal security of our clients and our reports.
PASSIVE RESEARCH
Passive research is always done from open OSINT sources and with the intention of collecting all the information necessary to obtain evidence about specific facts.
ACTIVE RESEARCH
The active investigation is carried out if you want to expand and deepen the results of the passive investigation of the facts investigated.
The information is always out there,
it is only necessary to have the knowledge and the correct tools to find it.
X. Towers - Gatxan CEO
FAQ
Despite trying to explain our services in detail, there is always the possibility that you may have doubts or that we have not been able to explain ourselves in the best possible way. For this reason, here is a list of frequently asked questions to try to resolve any doubts you may have.
-
Why the GATXAN Ecosystem and not any other service that offers online privacy?
The Internet is full of services that wrap themselves in the banner of privacy and the protection of their users' data, but when the truth comes it is shown that it is not true, they always end up giving away data, voluntarily or involuntarily At Gatxan, unlike other services you can find on the web, we prioritize user privacy and the security of their information above all else. And we can all be victims of computer attacks, but that's why we make encrypted and replicated backups, and strictly apply the "Zero-knowledge" policy, d this way the data is always preserved and, if the User uses the "Zero-knowledge" tools, we avoid having to access their information without encryption because we only store information that 'User has previously encrypted his computer.
In addition, at Gatxan we will NEVER transfer your data or metadata to third parties and NEVER DO BUSINESS WITH YOUR INFORMATION, and this commitment will always be protected by contract. -
...and how do you ensure the REAL "Zero-knowledge" PRIVACY you offer?
Because if the user chooses to use the "zero-knowledge" tools, we are not the ones who encrypt the data that is uploaded to our servers, but we provide those tools to them so that it generates its own encryption keys from its own terminal and, once the information is encrypted on its computer, that is when it is uploaded to our servers. In this way the advantage is twofold: We never have to have the User's information unencrypted and, moreover, we have no way of knowing the keys because we are not the ones who generated them and, therefore, even if we wanted to, we will not be able to access it because we will not have had access to the keys at any time, only the user will be able to facilitate their decryption.
IF ONLY YOU HAVE YOUR KEYS. ONLY YOU HAVE YOUR DATA. -
Is it necessary to buy any specific program to use the services of the GATXAN Ecosystem?
No, all the software we use is always OPEN SOURCE, OpenSource.
This also assures the user that there will never be any extra cost other than the service subscription itself. -
What does it mean that the software you are using is Open Source?
One of the most important concepts in computer security is the transparency of the software used: to avoid possible leaks of information and improper access, the tools used must not be commercial products that work in the face of private interests of the companies that create them, as happens, for example, with the products of Microsoft, Google or Apple. To achieve this transparency, standard OPEN SOURCE software and tools are used, in the public domain, that is, FREE, and which are continuously tested, verified and audited by the developer community, who would alert them to any improper modifications that could be made. This gives the user the guarantee that the software will be used for the purpose for which it was created and not for the provider's corporate or private interests.
In addition, this also protects GATXAN from any possible attempt at interference, appropriation or improper access to the data that we keep. -
If the ecosystem tools are open source, i.e. public domain and free, why do I need to hire Gatxan's services?
Security is not only provided by the software used, but the way it is used and, above all, the infrastructure and the knowledge to implement them in the form of services At Gatxan we have this knowledge and the necessary infrastructure, therefore we can use this software to create the services and ecosystem we offer, adding, in addition, a clear and understandable interface for the user , to, in a simple and effective way, make available to as many people as possible the opportunity to recover the privacy that large corporations have stealthily stolen from them in recent years.
-
Do you accept customers from all countries? a>
Obviously! We do not discriminate against any country, but you should keep in mind that if your country applies restrictions on internet access, you may find it difficult to access our service ecosystem.
If this is your case, contact us and we'll help you get access. -
Do you offer customized services?
Of course, both for individuals and for companies! We have many clients that we have installed their own servers or even developed custom software specifically for them because they couldn't find anything on the market that fit their needs. Tell us what you need and we will study it together and we will make you a proposal to make it a reality!
-
In which case can I need the services of GATXAN?
You can always use the services of the Gatxan ecosystem, but especially if what you want is to recover the privacy that large corporations have stealthily stolen from users in recent years.
- If you want a secure Webmail service with the possibility of sending encrypted messages with PGP.
- If you prefer a encrypted cloud with REAL "Zero-knowledge" privacy.
- If you need a fully CUSTOM cloud PREMIUM service with REAL "Zero-Knowledge" PRIVACY and unlimited storage.
- If you prioritize REAL PRIVACY in the tools for daily individual or workgroup (shared folders, video conferences, online document edition, etc).
- If you need a personalized consulting service on cyber security, cyber defense and online privacy preservation.
- If you want personalized advice on cryptocurrencies, blockchain and their applications.
- If you need to integrate secure payments with cryptocurrencies in a physical or online store.
- If, in case of theft of data or cryptocurrencies, need to identify transactions, or investigate the trail left by cybercriminals on the network.
- If you have to bank cryptoassets and you want to know their traceability to make sure that the bank will not decline your transaction.
- If you have to host your website and your own email securely.
- If you need customized cyber security solutions according to your needs.
If with all these questions we still haven't solved your doubts, contact us and ask us whatever you need!
The information is the building block of your company. Regain its control.
X. Towers - Gatxan CEO
OPINIONS ABOUT US
In GATXAN we are a team of highly qualified professionals with long experience in what we specialize in:
computer security, cyber research, protection of privacy on the internet and, since 2012, research in blockchain networks.
If only YOU have your keys, only YOU have your data.
X. Towers - Gatxan CEO