The most frequent cryptocurrency question I answer relates to the cryptocurrency Verge and why it fails to offer realistic privacy. Verge is a project which claims to be secure, anonymous, and private.
When we’re talking about privacy, the canonical group to focus on are law enforcement and government targets. They are journalists, dissidents, political activists, and criminals (sometimes subjective to a government). Their safety and freedom depends on their anonymity as they make and receive payments from associates, employers, merchants. In this scenario, receiving a regular set of payments from Wikileaks could get you killed in Russia.
Today it is not a secret how government and law enforcement operates. There is a long history of arrests from using Bitcoin (see: https://shouldhaveusedmonero.xyz/). All existing forms of compromise have come from ways of connecting real world identities to transactions by tracing the transactions through the blockchain. Not a single case has ever involved someone revealing their IP address when sending a transaction.
This fact should be alarming. We know how arrests happen today and Verge’s main privacy feature does not address this and never did. This is a huge disconnect between Verge’s claims and privacy in the real world. Any government target could have been using Verge and it would not have made a different.
Running Bitcoin over Tor (that’s pretty much what Verge is) has been studied from a privacy perspective, underscoring my point that this combination was hardly a new idea with Verge. It turns out not to be entirely safe: https://arxiv.org/abs/1410.6079. The attack outlined in the paper is setting up malicious Tor nodes, and the spamming the Bitcoin network with mal-formed transactions through Tor. The honest nodes will get blocked from the network as an anti-spam feature and only the malicious nodes remain. This attack is easy to execute and it makes running Bitcoin over Tor more risky than just over the clearnet.
The Wraith Protocol is actually a well-known feature called stealth addresses. It has been known for several years, at least 2015: https://github.com/genjix/bips/blob/master/bip-stealth.mediawiki. It was even a candidate for Bitcoin at one point. (It was not integrated due to performance issues.)
Stealth addresses allow the sender to generate a unique address for the recipient that they can detect and control without any cooperation from them. One way to think of this is if the recipient generated a unique Electrum address for each transaction. Same concept. This provides privacy only for the recipient. With blockchain analysis, when a stealth payment is made it is impossible to tell who the recipient is at the time of the transaction.
Stealth payments alone are weak privacy. This is because people need to combine inputs for most of their payments, especially if they have one address per transaction for maximum privacy. However, if Wikileaks were to accept stealth payments, and send all of those stealth payments to an exchange (which follows AML/KYC laws), then all of those stealth payments lose their anonymity. Now it’s clear you just donated to Wikileaks. This is why privacy is hard. There is no silver bullet.
In practice when users are given the option to use privacy, they stick with the transparent default and only use private features when they need it. The result is that anyone using the privacy features are now a much smaller pool, so when you do use the private feature, you both stick out and have a smaller pool of people to hide in. It is analogous to wearing a ski-mask outside on a warm day. Nobody knows who you are, but you stick out and wearing the mask draws attention to you.
Default privacy is considered a necessity by privacy experts. This way, the pool of people you blend in with is much bigger, like a herd of Zebras running together. It is hard to see individual Zebras because they all give each other cover. And with default privacy the people who do need it do not draw attention to themselves because their behavior does not change. Everyone blends in with each other and is indistinguishable. Everyone wears the Guy Fawks mask.
Tor is just an anonymous proxy network. What this means is that it takes internet packets and just re-routes them through different servers, so that no single server knows both the content you are transmitting and your IP address at the same time. It is possible to connect your full-node to a Tor entry-node and broadcast your transactions through the Tor network. If you wanted, you could also have your full-node operate as a hidden service so that incoming transactions have no way of knowing your IP address as well.
What Verge provides is just a convenience. It is not a new feature that hasn’t been thoroughly explored already. It’s just taking something everybody already knew about, and packaging it in a way that sounds flashy to a non-technical audience who has never heard of Tor before.
Monero has had stealth addresses since its inception in 2014. Shadowcash also had this feature. Spectrecoin has this feature. Even Vertcoin, a cryptocurrency which doesn’t even claim to be a private one, has had it since 2014. There are likely many other projects with this feature, and they don’t take years to implement it or hype it up as the last private feature the world will ever need. The Wraith Protocol has been an oversold feature that is actually an existing feature of many of the same projects that Verge claims to outcompete.
This is why Verge is so universally hated. It’s not because anybody is afraid. It’s not because anybody is trying to hurt the price. It’s because Verge could get someone hurt with their false claims.
There are parts of the world where people depend on privacy for their safety. Journalists, dissidents, political activists, criminals, citizens under oppressive regimes. For them, their privacy means their safety and freedom. If any of these people believe the claims of Verge and use this project for their transactions, they could get hurt or killed. Exercising caution in the name of safety limits into Verge’s marketing and by extension profitability, and they seem to prefer profits over the safety of people in other parts of the world. Experts are deeply worries about these efforts of Verge to shill their insecure technology to cryptocurrency investors because it contributes misinformation into the space that could get someone killed (see: comments section of this article dismissing this analysis, claiming I have hidden motives, attacking my character, presenting false counterarguments all because it threatens Verge).
Some of Verge’s better-known false claims are:
Verge is not private. It never was. This is not subjective. It fails to provide privacy in any meaningful way that would protect you from the people trying to violate it who could compromise your freedom or safety. It is no better than Bitcoin, which is considered dangerous to use for these purposes. This is enough to call Verge vaporware.
Verge makes strong claims about their privacy that are not true. They make false claims about the privacy provided by legitimate projects for their own benefit. They make these false claims despite knowing that it could get someone hurt. It is clear that the team is marketing on false information for self-serving purposes. These are not honest intentions. They do not care about the safety and freedom of people who need privacy. They are claiming to fight for a cause they clearly don’t care about, and putting others at risk for financial gain. If they are somehow not a scam, which seems probable, then they are indistinguishable from one.