Network Level Privacy


Zooming Out

  1. Private UTXO Retrieval
  2. Private Transaction Broadcasting

Bitcoin Core

Private UTXO Retrieval

Private Transaction Broadcasting

Adversaries Identified

  • Malicious Peer
  • Supernode

Bitcoin Core + Tor

Adversaries Identified

  • Tor Breaker

Wasabi Wallet

Private Transaction Broadcasting

  • We did it in a way that we only connect to onion nodes, so end to end encryption is now enforced between us and our peers. All this without involving any exit node.
  • We connect to each peer through a different Tor stream.
  • This enabled us to replace our transaction broadcasting mechanism. Now, we broadcast transactions to only one peer over Tor and immediately after that we disconnect the peer.

Private UTXO Retrieval

Adversaries Identified

  • ISP
  • Tor Breaker Sybil Attacker With Thousands Of Full Nodes Over Onion

Wasabi Wallet + Full Node

Private UTXO Retrieval

Putting It All Together


To be useful, security metrics should reflect the difficulty an adversary has in overcoming them. — entropist

 by the author.




Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

Exploring Insolar’s groundbreaking technology in detail

Tokensoft and Anchorage Partner to Support SEC Registered Blockchain Securities

June Monthly Report — Descartes SDK & The New Beginning

We can’t afford to be disinterested in Governance!

Insurance insChain

SecretSwap Partners with ApeSwap

How To Invest In NFT Tokens?

Can PoS is an Alternative of Alarming Environmental Issues with PoW?

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store


More from Medium

Konomi Oracle Decentralised Validator

Aleph Zero to Partner with Skynet Trading

OTBalance — AI DEX Ecosystem.

The Intelligent Bitcoin Miner, Part II.