Questions tagged [privacy]

Questions regarding the information that is leaked through cryptocurrency transactions or related processes, when subject to analysis and attempts of identification of sources and other properties.

0 votes
1 answer
144 views

Does it affect bitcoin's privacy if I create an explorer that works differently?

Does it affect bitcoin's privacy when I create an explorer that works differently and tracks inputs based on LIFO (Last In First Out)? Does it affect bitcoin protocol's fungibility? Context: FIFO is ...
1 vote
2 answers
35 views

Why would I prefer a full client over a light client that depends on a centralized server?

There are Bitcoin wallets like "Sparrow" which use a central service for maintaining the Blockchain, so I don't have to download 400GB to start using Bitcoin. Now, why should I use Bitcoin ...
2 votes
1 answer
56 views

What is the standard or best practice for bitcoin wallet address labeling, if any?

Transferring wallet address labels from different wallets is non-trivial today, as there is no standard for this metadata it seems. Could address labelling be included in wallet config files at ...
  • 23
0 votes
0 answers
18 views

Mobile wallet with unnecesary input heuristic

The iOS wallet I use leaks privacy by not implementing an option to use the unnecesary input heuristic. I would prefer a wallet that defaults to the unnecesary input heuristic, or at least allows an ...
  • 637
0 votes
1 answer
83 views

Why criminals still use bitcoin mixers when there is other blockchains?

I came across the following article Allen Goldmann, A person is trying to hide $5 million in stolen Bitcoins from a Darknet marketplace, Forbes, November 28, 2022 where some criminal tried to ...
  • 101
1 vote
1 answer
67 views

Can I create an entirely new m-of-n multi-sig wallet with the same seed phrases as an existing one by increasing n and discarding the new seed phrase?

If I were to create a 2-of-4 multi-sig wallet using the 3 seed phrases of an existing 2-of-3 wallet, plus a new seed phrase that I instantly destroy, would I then effectively have a new completely ...
1 vote
0 answers
25 views

What are the privacy implications of sharing or publishing the .onion address of a bitcoin node?

Some tutorials redact the .onion address of their nodes for privacy reasons: https://coldcard.com/docs/img/econoalch/Sparrow47.png What are the attack vectors that they are defending themselves from? ...
1 vote
1 answer
125 views

Descriptors of potentially fraudulent bitcoin transactions

I'm looking into suspicious bitcoin transactional patterns and I was wondering whether there is someone with experience in that area. If we consider transactions as iid data, then what descriptors (...
3 votes
3 answers
124 views

What is the risk involved in fedimint?

I want to know the risks involved in fedimint? Fedimint is something that was shared as improving privacy for bitcoiners.
0 votes
1 answer
38 views

What actually did Alexander Vinnik / BTC-e do?

As far as I undesrstood, Vinnki / BTC-e just allowed anonymous operations, nothing more. They didn't steal money, Vinnik didn't launder it himself. Other criminals just used BTC-e for their activities,...
  • 129
1 vote
1 answer
38 views

Is it possible to determine what node a transaction originated from?

Let's say node-A is propagating a transaction to it's peers on the network: node-B, node-C, etc. Is there any way for the other nodes to know that node-A is the originator of that transaction, as ...
  • 21
3 votes
2 answers
284 views

Is it possible to identify UTXOs signed by HD wallets?

I was wondering if the fact that a transaction was created by an HD wallet can be somehow read off from the UTXO, or any other data available in the blockchain. Theoretically, it is not required in ...
0 votes
2 answers
56 views

Determining change address

hoping to gain a bit more clarity on how change addresses work here. In the attached example, can the change address be identified with 100% certainty? Is there a potential scenerio where it could be ...
  • 1
0 votes
0 answers
115 views

Encryption for Mempool Privacy

Ferveo: Threshold Decryption for Mempool Privacy in BFT networks - https://eprint.iacr.org/2022/898 This paper describes some methods to encrypt transactions when in mempool and decrypt on inclusion ...
1 vote
1 answer
113 views

Using online exchange like ChangeNOW or FixedFloat to create anonymity?

Online exchanges like ChangeNOW, SimpleSwap and FixedFloat, unless they keep records for a long period, which theoretically might be later accessed by authorities, might offer considerable privacy. I ...
  • 11

15 30 50 per page
1
2 3 4 5
27