Wasabi Wallet White Paper How Cognyte can help you get your investigation back on track Due to its wide usage among criminals, the detection of the Wasabi Wallet and the identification of its illicit users are highly prioritized by law enforcement and other government agencies. While the use of Wasabi is not illegal in most jurisdictions, identifying suspects who use it can be a valuable tool in confirming a suspicion of money laundering via Bitcoin, especially in conjunction with additional evidence pointing to illegal activity. It is easy to visually identify Wasabi Wallet transactions on the blockchain using traditional tracing tools and blockchain analytics methodologies. But while these tools and methodologies can identify most of the crypto addresses involved, they cannot de-mix the transactions and attribute the inputs and outputs or reveal the real identity of illicit transaction makers. Cognyte’s blockchain analytics platform is a revolutionary cryptocurrency de-anonymization solution. This groundbreaking, patent pending technology helps investigative organizations clarify crypto investigations and gain valuable new insights into complex cases. Cognyte’s blockchain analytics advanced algorithm inspects Wasabi wallets’ distinctive patterns, providing a unique solution to de-anonymize Wasabi users. Cognyte’s solution delivers crypto-centric analytics and intelligence, derived from leveraging siloed data sources and analytics techniques, such as blockchain analytics and open-source analytics, to track blockchain transactions and tag services and malicious addresses. The solution harnesses additional sources and techniques to enhance financial investigations with zero dependency on collaborative exchanges. Cognyte’s blockchain analytics and advanced algorithms do more than detect criminal activity on the blockchain and identify the use of Wasabi for this criminal activity, they also de-anonymize illicit Wasabi transaction makers. Moreover, our solution enables financial investigators to accelerate crypto investigations by: Revealing both historical and ongoing transactions performed by suspects. Uncovering connections between known suspects and other entities to pinpoint new areas for investigation. To find out how you can fight crypto-enabled crime and terror, we invite you to schedule a demo Identifying crypto activity performed by suspects across hundreds of cryptocurrency services on diverse platforms, wallets and coins. 12