The words "anonymity" and "cryptocurrency", since the appearance of the second, are quite closely related. Even when creating bitcoin, Satoshi Nakamoto said that it is now possible to anonymously make cross-border payments, and even with minimal commissions. But people understand it in different ways. Transactions in the bitcoin blockchain can indeed be made privately, but this means that you are not required to enter any personal data to send funds. This does not mean that you can conduct illegal activities and no one will know about it, since the bitcoin network is not just called a “glass safe”: you can see from which wallet, where and in what quantity funds were sent, but it is impossible to have any impact on the transaction or the coins themselves. In addition to this, many cryptocurrency exchanges are beginning to introduce mandatory identity verification, which allows you to track the transfer from a confirmed exchange account to an "anonymous" bitcoin wallet. Back in 2018, Bitfury conducted research that proved that more than 16% of all existing bitcoin wallets can be deanonymized.
The need for privacy in the digital age was discussed long before the first cryptocurrency appeared. Back in 1992, a group of people calling themselves “Cryptobunters” or “Cipherpunks " appeared, which included:
"Privacy is essential for an open society in the digital age. Confidentiality is not secrecy. Confidential is something that a person does not want to show to the whole world, and secret is something that no one should know about. Privacy is the ability to selectively reveal yourself to the world".
With each passing month, the group grew and it was decided to conduct an e-mail newsletter in order to unite like-minded people around the world, and not just in San Francisco. This "mailing list “is interesting because in 2008, an unknown Satoshi Nakamoto sent a bitcoin WhitePepper to it and, initially, was severely criticized by ”Cipherpunks". However, the Creator of bitcoin continued to work and, as we can see, not in vain.
The lack of complete anonymity in bitcoin has prompted the crypto community to create various encryption methods that have found application in other cryptocurrencies. In this article, we will tell you what methods you can use to get, if not full, then at least partial privacy.
When choosing a cryptomixer, be careful and use proven and well-known services, as fraud cases are not uncommon. Given the fact that the main task of such services is to “cover up” all traces for tracking currency, it is unlikely that you will be able to prove that your funds were stolen.
In addition to unscrupulous companies, there are also those that provide their services poorly: you will pay money for services, and when conducting a thorough audit, information about you will still be revealed.
CoinJoin Method
This method involves creating a single shared transaction from multiple users. here's an example: Masha, Pasha and Tanya decided to pay for freelance services in bitcoins, but they don't want their transactions to be tracked by competitors, because they can “spy” on how much and to whom they pay. In this case, all three interested parties join forces and apply to the service. The service creates one General transaction that has three inputs, three outputs (for each of the freelancers), and three “false” outputs. All outputs are mixed together in random order, after which each of the senders checks the received transaction and if it is correct, then signs the input they need. If all three transactions were confirmed by the senders, it is sent to the blockchain and waits for confirmation from the network. For communication between participants in the process, you need to use a VPN. This method greatly complicates the ability to track transactions, because it can have a thousand origin options, but it does not completely remove it. This method has several modifications:
Confidential Transactions Method
This method has the following principle of operation: a third party will not be able to find out about the transaction amount at the input and output, but the output amount can not be greater than the input amount. Confidential Transactions is based on a cryptographic proof of zero-knowledge proof - which allows you to find out only a fraction of the information about the transaction.
The Method Of Ring Confidential Transactions
This method is known as "Ring signatures" - it allows you to confuse the history of cryptocurrencies in the following way: several outputs are presented, one of them is marked with a ring signature, but only the sender of funds knows which one. This method is used in the Monero cryptocurrency. For the first time, ring signatures were used in the CryptoNight algorithm.
The Stealth Addresses Method
The process is as follows: you want to send a payment to your partner, and to do this, you take their public key, as well as their own public and private keys. They are used to generate a new one-time public key, which is specified in the transaction as an address. It turns out that no one will know the exact destination address except you and your recipient, which significantly increases the confidentiality of the transaction.
The first step is to create an email with strong encryption, such as ProtonMail. Reasons why you should choose this particular service:
Then, after registering an encrypted mailbox, select a cryptocurrency exchange that does not require identity verification, for example, Yobit - there are no daily restrictions on currency input/output, KYC and AML are not present. We connect a VPN, but be careful-on most cryptocurrency exchanges, VPN is prohibited, up to the ban of your account with the freezing of funds. You can try to buy a VPN with a static address, that is, you will always be on the same IP address, but not on your own, which will attract much less attention from the exchange. The Yobit exchange is also suitable for this purpose, because we did not find a ban on VPNs in the user agreement.
Procedure of actions:
On Binance, without a verification procedure, you can start and trade any volume, but withdraw no more than 2 BTC per day. In principle, if you are not a crypto oligarch and you do not need almost a million rubles a day, then this will be quite enough. Binance is also convenient because if necessary, you can use Fiat funds to Deposit and withdraw, as well as dozens of other cryptocurrencies and tokens.
Even more anonymous for using bitcoin is BitMEX, where the verification procedure is not required at all. You can start, trade and withdraw any volume, but BitMEX does not have the ability to work with Fiat currencies.
Does this keep the investor completely confidential? Yes, if you are not a notorious criminal who is wanted by the police or other law enforcement agencies. Exchanges will disclose your data and even block your account only if they receive an official request from regulators or law enforcement agencies. If you are an ordinary trader, even with good capital, or, for example, a freelancer who receives payment in crypt, then you have nothing to fear, most likely, you are simply not interesting to either the security forces or anyone else. At least until the full and strict regulation of the crypto industry.
Another category of people is those who, for some reason, do not seek to disclose their income:
So who values anonymity the most and is willing to pay for it?
At the same time, you can adjust the level of confidentiality yourself, from very superficial and conditional, to the most complete anonymity, which will not allow even the most powerful law enforcement agencies and other persons to reach you.
The need for privacy in the digital age was discussed long before the first cryptocurrency appeared. Back in 1992, a group of people calling themselves “Cryptobunters” or “Cipherpunks " appeared, which included:
- Timothy May. Former top Manager of Intel;
- Eric Hughes. Professor of mathematics at the University of California;
- John Gilmore. One of the founders of the Electronic Frontier Foundation, a strong specialist in computer science.
"Privacy is essential for an open society in the digital age. Confidentiality is not secrecy. Confidential is something that a person does not want to show to the whole world, and secret is something that no one should know about. Privacy is the ability to selectively reveal yourself to the world".
With each passing month, the group grew and it was decided to conduct an e-mail newsletter in order to unite like-minded people around the world, and not just in San Francisco. This "mailing list “is interesting because in 2008, an unknown Satoshi Nakamoto sent a bitcoin WhitePepper to it and, initially, was severely criticized by ”Cipherpunks". However, the Creator of bitcoin continued to work and, as we can see, not in vain.
The lack of complete anonymity in bitcoin has prompted the crypto community to create various encryption methods that have found application in other cryptocurrencies. In this article, we will tell you what methods you can use to get, if not full, then at least partial privacy.
How can I anonymize my transactions?
As mentioned above, the lack of anonymity in most cryptocurrencies has led many crypto enthusiasts to develop methods and solutions to this problem. Let's start with the simplest of them.CryptoMixer
There is no such service on the Internet, but in recent years, state regulators have begun to actively fight them, because they can be used to launder cryptocurrencies obtained by criminal means. This process occurs as follows:- You send the cryptocurrency that you want to anonymize to the address provided by the service.
- The service takes all the funds received at the moment and applies various algorithms to mix them, after which it sends them to different wallets.
- From these wallets, you get your cryptocurrency back, minus the 1-3% commission.
- If the process of mixing cryptocurrencies from the service is carried out correctly, it will be very difficult to track your funds.
When choosing a cryptomixer, be careful and use proven and well-known services, as fraud cases are not uncommon. Given the fact that the main task of such services is to “cover up” all traces for tracking currency, it is unlikely that you will be able to prove that your funds were stolen.
In addition to unscrupulous companies, there are also those that provide their services poorly: you will pay money for services, and when conducting a thorough audit, information about you will still be revealed.
Obfuscation and cryptographic methods
To understand exactly how the methods that will be described below work, let's analyze what parts the transaction consists of. Any transaction is initially divided into three parts:- Entrance. Indicates where the funds that the transaction Creator wants to use came from;
- Exit. Indicates where the transaction Creator wants to send funds;
- Service and technical information (we will not go into details here, they are not needed in the context of this article).
CoinJoin Method
This method involves creating a single shared transaction from multiple users. here's an example: Masha, Pasha and Tanya decided to pay for freelance services in bitcoins, but they don't want their transactions to be tracked by competitors, because they can “spy” on how much and to whom they pay. In this case, all three interested parties join forces and apply to the service. The service creates one General transaction that has three inputs, three outputs (for each of the freelancers), and three “false” outputs. All outputs are mixed together in random order, after which each of the senders checks the received transaction and if it is correct, then signs the input they need. If all three transactions were confirmed by the senders, it is sent to the blockchain and waits for confirmation from the network. For communication between participants in the process, you need to use a VPN. This method greatly complicates the ability to track transactions, because it can have a thousand origin options, but it does not completely remove it. This method has several modifications:
- Chaumian CoinJoin. This involves an operator whose task is to mix inputs and outputs, as well as create the final transaction. The operator does not have access to the funds of the participants in this process, because they “blind” all information before sending it, and only after receiving the transaction back, the sender removes the “blindness”. The process of "blinding" itself is similar in principle to a regular electronic signature. To perform this process, you need to use a VPN;
- CoinShuffle. This method no longer requires a strict VPN. Here, users can create the desired transaction themselves, with the desired number of outputs. Generated false addresses where you want to get the means of each of the participants, all of them know, but not talking about it to each other. Next, each participant in the process generates a new key pair, after which public keys are exchanged. After all this, a certain chain is formed, during which each participant signs the transaction he needs with a private key.
Confidential Transactions Method
This method has the following principle of operation: a third party will not be able to find out about the transaction amount at the input and output, but the output amount can not be greater than the input amount. Confidential Transactions is based on a cryptographic proof of zero-knowledge proof - which allows you to find out only a fraction of the information about the transaction.
The Method Of Ring Confidential Transactions
This method is known as "Ring signatures" - it allows you to confuse the history of cryptocurrencies in the following way: several outputs are presented, one of them is marked with a ring signature, but only the sender of funds knows which one. This method is used in the Monero cryptocurrency. For the first time, ring signatures were used in the CryptoNight algorithm.
The Stealth Addresses Method
The process is as follows: you want to send a payment to your partner, and to do this, you take their public key, as well as their own public and private keys. They are used to generate a new one-time public key, which is specified in the transaction as an address. It turns out that no one will know the exact destination address except you and your recipient, which significantly increases the confidentiality of the transaction.
Anonymous cryptocurrencies
As we found out, there are enough methods to obfuscate transaction paths. But there are also those who do not want to deal with all the proposed methods, but simply buy cryptocurrency and be sure that their transactions will be anonymous. Especially for such people, we will present a list of the most anonymized cryptocurrencies.Monero
Monero (XMR ) is an anonymized cryptocurrency, a fork of Bytecoin (Bytecoin). The main difference that makes XMR a unique cryptocurrency is the use of ring Signatures and Stealth Addresses for fungible coins. The private address mechanism means that a participant has one public address that can be shared with anyone, and all the others are private or private. In The monero address subsystem, two such keys are used: for viewing (viewkey) and spending (spendkey). A private spendkey is used to sign transactions, just like Bitcoin. The private viewkey will help you view transactions related to your Monero address. Ring signatures hide the real transaction inputs, and they do not allow you to identify all the links in the block chain, so you will not be able to track transactions even with specialized SOFTWARE. Monero was founded by Ricardo Spagni and Francisco cabanas in 2014.Dash
Dash ( DASH) is an anonymous and fully decentralized cryptocurrency developed on the basis of the Bitcoin source code, but unlike the first cryptocurrency that uses the SHA-256 encryption algorithm, the Dash cryptocurrency is based on the X11 algorithm. the X11 Algorithm consists of a" mix " of 11 different cryptographic encryption methods that you will need to bypass everything to crack the network, which is almost impossible.Zcash
Zcash (ZEC) is one of the first anonymous cryptocurrencies to use the zero - proof proof Protocol. The Protocol works according to the following principle: one of the two parties can verify the mathematical correctness of the other party, but any other information about the other party will not be available. Zcash acts either as a completely anonymous cryptocurrency, or selectively transparent, which of these is decided by the user himself. ZEC was developed as a result of the bitcoin fork, but with the addition of the Zerocash Protocol. The founder and ideological leader of the company is Zuko Wilcox. Edward Snowden commented on the coin: in his opinion, it is the most interesting altcoin.Ways to buy, sell, and invest anonymously
Let's look at how you can maintain privacy in the digital space and not have serious consequences.The first step is to create an email with strong encryption, such as ProtonMail. Reasons why you should choose this particular service:
- Thanks to end-to-end encryption, the recipient of your email will not be able to read it until you tell them the passcode. Third parties will also not be able to read the email.;
- IP address registration is disabled by default in ProtonMail. you can enable it if necessary;
- When creating a mailbox, you don't need to enter any personal information;
- ProtonMail is created and located in Switzerland and user data is stored on servers there. Any information about the service's customers can only be obtained if, in the opinion of the local authorities, the user has violated Swiss laws. Requests from other countries are most often rejected.
- In 2015, a series of powerful DDoS attacks were committed on the service, after which an agreement was signed with the company, which to this day successfully protects their servers from cyber threats.
Then, after registering an encrypted mailbox, select a cryptocurrency exchange that does not require identity verification, for example, Yobit - there are no daily restrictions on currency input/output, KYC and AML are not present. We connect a VPN, but be careful-on most cryptocurrency exchanges, VPN is prohibited, up to the ban of your account with the freezing of funds. You can try to buy a VPN with a static address, that is, you will always be on the same IP address, but not on your own, which will attract much less attention from the exchange. The Yobit exchange is also suitable for this purpose, because we did not find a ban on VPNs in the user agreement.
Procedure of actions:
- We start bitcoins on the exchange;
- Change to one of the presented anonymous cryptocurrencies;
- We withdraw and run it through several cryptocurrency wallets;
- We start a new one on the exchange and exchange it for bitcoins;
- We display it in a convenient way for you. If you also want to anonymize these bitcoins, use one of the encryption methods suggested above.;
Where can I trade anonymously?
You can trade anonymously on the largest cryptocurrency platforms, such as Binance and BitMEX.On Binance, without a verification procedure, you can start and trade any volume, but withdraw no more than 2 BTC per day. In principle, if you are not a crypto oligarch and you do not need almost a million rubles a day, then this will be quite enough. Binance is also convenient because if necessary, you can use Fiat funds to Deposit and withdraw, as well as dozens of other cryptocurrencies and tokens.
Even more anonymous for using bitcoin is BitMEX, where the verification procedure is not required at all. You can start, trade and withdraw any volume, but BitMEX does not have the ability to work with Fiat currencies.
Does this keep the investor completely confidential? Yes, if you are not a notorious criminal who is wanted by the police or other law enforcement agencies. Exchanges will disclose your data and even block your account only if they receive an official request from regulators or law enforcement agencies. If you are an ordinary trader, even with good capital, or, for example, a freelancer who receives payment in crypt, then you have nothing to fear, most likely, you are simply not interesting to either the security forces or anyone else. At least until the full and strict regulation of the crypto industry.
Who cares about privacy?
Why do people value privacy? And who appreciates it the most? First, the desire to preserve the confidentiality of financial transactions is quite a natural desire. If a person is clean before the law, he has every right to protect his funds from other people's attention by any means.Another category of people is those who, for some reason, do not seek to disclose their income:
- Optimization or tax evasion, including offshorization;
- Corruption, fraud, and proceeds of crime;
- Disagreement with the modern banking and economic model in principle.
So who values anonymity the most and is willing to pay for it?
- Politicians, officials and their families;
- Law enforcement officers and their families;
- Owners of large volumes of cryptocurrency;
- Individuals who have problems with the law and a bad reputation in the eyes of banks;
- Persons engaged in shadow business;
- All the other people who want to maintain the confidentiality of financial transactions.
At the same time, you can adjust the level of confidentiality yourself, from very superficial and conditional, to the most complete anonymity, which will not allow even the most powerful law enforcement agencies and other persons to reach you.
Last edited: