Questions tagged [privacy]
Questions regarding the information that is leaked through cryptocurrency transactions or related processes, when subject to analysis and attempts of identification of sources and other properties.
401
questions
0
votes
1
answer
144
views
Does it affect bitcoin's privacy if I create an explorer that works differently?
Does it affect bitcoin's privacy when I create an explorer that works differently and tracks inputs based on LIFO (Last In First Out)? Does it affect bitcoin protocol's fungibility?
Context: FIFO is ...
1
vote
2
answers
35
views
Why would I prefer a full client over a light client that depends on a centralized server?
There are Bitcoin wallets like "Sparrow" which use a central service for maintaining the Blockchain, so I don't have to download 400GB to start using Bitcoin.
Now, why should I use Bitcoin ...
2
votes
1
answer
56
views
What is the standard or best practice for bitcoin wallet address labeling, if any?
Transferring wallet address labels from different wallets is non-trivial today, as there is no standard for this metadata it seems.
Could address labelling be included in wallet config files at ...
0
votes
0
answers
18
views
Mobile wallet with unnecesary input heuristic
The iOS wallet I use leaks privacy by not implementing an option to use the unnecesary input heuristic.
I would prefer a wallet that defaults to the unnecesary input heuristic, or at least allows an ...
0
votes
1
answer
83
views
Why criminals still use bitcoin mixers when there is other blockchains?
I came across the following article
Allen Goldmann, A person is trying to hide $5 million in stolen Bitcoins from a Darknet marketplace, Forbes, November 28, 2022
where some criminal tried to ...
1
vote
1
answer
67
views
Can I create an entirely new m-of-n multi-sig wallet with the same seed phrases as an existing one by increasing n and discarding the new seed phrase?
If I were to create a 2-of-4 multi-sig wallet using the 3 seed phrases of an existing 2-of-3 wallet, plus a new seed phrase that I instantly destroy, would I then effectively have a new completely ...
1
vote
0
answers
25
views
What are the privacy implications of sharing or publishing the .onion address of a bitcoin node?
Some tutorials redact the .onion address of their nodes for privacy reasons: https://coldcard.com/docs/img/econoalch/Sparrow47.png
What are the attack vectors that they are defending themselves from?
...
1
vote
1
answer
125
views
Descriptors of potentially fraudulent bitcoin transactions
I'm looking into suspicious bitcoin transactional patterns and I was wondering whether there is someone with experience in that area.
If we consider transactions as iid data, then what descriptors (...
3
votes
3
answers
124
views
What is the risk involved in fedimint?
I want to know the risks involved in fedimint? Fedimint is something that was shared as improving privacy for bitcoiners.
0
votes
1
answer
38
views
What actually did Alexander Vinnik / BTC-e do?
As far as I undesrstood, Vinnki / BTC-e just allowed anonymous operations, nothing more. They didn't steal money, Vinnik didn't launder it himself. Other criminals just used BTC-e for their activities,...
1
vote
1
answer
38
views
Is it possible to determine what node a transaction originated from?
Let's say node-A is propagating a transaction to it's peers on the network: node-B, node-C, etc. Is there any way for the other nodes to know that node-A is the originator of that transaction, as ...
3
votes
2
answers
284
views
Is it possible to identify UTXOs signed by HD wallets?
I was wondering if the fact that a transaction was created by an HD wallet can be somehow read off from the UTXO, or any other data available in the blockchain.
Theoretically, it is not required in ...
0
votes
2
answers
56
views
Determining change address
hoping to gain a bit more clarity on how change addresses work here.
In the attached example, can the change address be identified with 100% certainty? Is there a potential scenerio where it could be ...
0
votes
0
answers
115
views
Encryption for Mempool Privacy
Ferveo: Threshold Decryption for Mempool Privacy in BFT networks - https://eprint.iacr.org/2022/898
This paper describes some methods to encrypt transactions when in mempool and decrypt on inclusion ...
1
vote
1
answer
113
views
Using online exchange like ChangeNOW or FixedFloat to create anonymity?
Online exchanges like ChangeNOW, SimpleSwap and FixedFloat, unless they keep records for a long period, which theoretically might be later accessed by authorities, might offer considerable privacy. I ...