Skip to content

Latest commit

 

History

History
78 lines (46 loc) · 4.7 KB

4-is_bitcoin_private.md

File metadata and controls

78 lines (46 loc) · 4.7 KB
This section analyses patential identifiers and information users leak as they interact with the bitcoin network, mainly thorugh wallet and node behavior.
It also introduces meatspace, non-blockcahin, dimenstion of the problem for example KYC and custodial scenarios, blockexplorers, online unit conversion etc

Is Bitcoin Private?

source status
node related ------
transaction rebroadcasting
Map of the Bitcoin Network
BIP 37 proablems
Client-side block filtering
Attacks on privacy (blockchain)
Wallet related ------
Bitcoin Script
Bitcoin Transactions
mastering bitcoin - transactions
mastering bitcoin - advanced transactions (multisig segwit)
external information ------
Attacks on privacy (non-blockchain)
other
Privacy on Lightning
Miner Privacy
'taint'

discussion questions

  • If there was an ideal money, what properties would it possess?

  • Discuss the privacy concerns towards the "store of value" and "medium of exchange" property of bitcoin.

  • What is BIP 37, why was it problematic? How was the problems later addressed?

  • How does receiver/sender anonymity compare in bitcoin and lightning?

  • What is"-noboroadcast" option, why does some users recommend enabling it?

  • What are federated structures (in bitcoin & lightning), what are the benefits and drawbacks for users?

  • Do 'unannounced channels' in lightning network provide better privacy in reality?

  • Does using taproot transactions (instead of segwit) provide better privacy to users and why? Is this true in practice?

  • Consider the case of a "privacy nihilist" what are the worst practices an individual can follow to obtain the least amount of privacy for themselves and their transaction parties?

  • what might be some reasons for a miner to be concerned about their privacy?

  • what trade-offs a miner might consider before joining a central mining pool?

  • Looking at the idea of 'taint', do you think it is an enforceable mechanism for censoring certain UTXOs?

other resources

RBF, CPFP

bip69 input output ordering

nodes don't support encrypted p2p communications,

TODO: txgraph heuristics

TODO: KYC and transaction timing and amount knowledge

Link Probability & Entropy of a transaction

wallet fingerprinting (similar to browser fingerprinting)

https://b10c.me/observations/