Understanding TumbleBit Part 3: Not Even The Tumbler Can Breach Your Privacyby@nopara73
1,227 reads
1,227 reads

Understanding TumbleBit Part 3: Not Even The Tumbler Can Breach Your Privacy

by nopara733mDecember 30th, 2016
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

In <a href="https://hackernoon.com/understanding-tumblebit-part-1-making-the-case-823d786113f3" target="_blank">Part 1: Making the Case</a> I talked about the importance of privacy in general, the state of privacy in Bitcoin and compared TumbleBit with other alternatives. In <a href="https://medium.com/@nopara73/understanding-tumblebit-part-2-the-endgame-instant-anonymous-scaleable-payment-system-on-top-479e7eb9ca24" target="_blank">Part 2</a> I outlined the endgame, highlighting the potential of what can TumbleBit eventually achieve, <strong>a trustless, instant, free, anonymous, scalable payment system on top of Bitcoin</strong>. You do not need to read them in order to understand this article.

Company Mentioned

Mention Thumbnail
featured image - Understanding TumbleBit Part 3: Not Even The Tumbler Can Breach Your Privacy
nopara73 HackerNoon profile picture
nopara73

nopara73

@nopara73

L O A D I N G
. . . comments & more!

About Author

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite