Network Level Privacy

Terminology

Bitcoin Core

Bitcoin transaction propagation does not hide the source of a transaction very well, especially against a “supernode” eavesdropper that forms a large number of outgoing connections to reachable nodes on the network [1,2,3].

Bitcoin Core + Tor

Wasabi Wallet

Wasabi Wallet + Full Node

Putting It All Together

Conclusion

To be useful, security metrics should reflect the difficulty an adversary has in overcoming them. — entropist

 by the author.

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store