paint-brush
Models of blockchain privacyby@viewnodes
215 reads

Models of blockchain privacy

by Viewnodes3mDecember 20th, 2018
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Given that blockchain transactions are pseudonymous, not anonymous, and that blockchains themselves are transparent, numerous protocols exist for the incorporation of greater privacy to protect individuals from those seeking to connect them with their transactions. It goes without saying that the motives behind this include facilitating protection from legal entities, but also the desire to grant individuals privacy from those who might wish to steal funds or identify those with large holdings for the purpose of solicitations or more serious crimes. With that in mind, not all privacy protocols are alike. There are different methods to achieve the goal at hand — namely obscuring transaction histories to the point where tracking someone’s balance history becomes prohibitively resource intensive, if not completely impossible. Here we discuss the three most common methods of achieving this, and their applications thus far.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail

Coins Mentioned

Mention Thumbnail
Mention Thumbnail
featured image - Models of blockchain privacy
Viewnodes HackerNoon profile picture
Viewnodes

Viewnodes

@viewnodes

L O A D I N G
. . . comments & more!

About Author

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite