-
As suggested in the Bitcoin whitepaper, the basic method of maintaining anonymity would be by “keeping public keys anonymous”.
-
Satoshi Nakamoto also suggests “as an additional firewall, a new key pair should be used for each transaction to keep them from being linked to a common owner”.
-
A weakness of this additional method is if multi-input transactions are broadcast and the owner of one of the involved multi-sig inputs is revealed, then the linking could reveal other transactions belonging to the same owner.
- By keeping the public key anonymous
- By creating a new public key for each transaction
- If a public key is linked to a person then all transactions can be “coined” to you and your address/public key
- Keeping the public key anonymous.
- Generating a new key pair for each transaction.
- Anonymity of the public key can be compromised in multi-input transactions
-
The basic method of maintaining anonymity is keeping public keys anonymous, meaning that the public key can’t be linked to the identity of the party involved in the transaction.
-
As an additional method of privacy, Satoshi Nakamoto suggests adding a new key pair for each transaction to prevent them from being linked to a common owner.
-
The weakness of adding a new key pair for each transaction is that linking is still unavoidable with multiple input transactions, which reveal that their inputs were owned by the same owner. If the owner of a key is revealed, other transactions belonging to the owner could also be revealed.
-
What is the basic method of maintaining anonymity? | Keeping public keys anonymous.
-
What additional method does Satoshi suggest? | Changing the key pair for every transaction, i.e., New public key, new private key.
-
What weakness does this additional method have? | If there are a lot of inputs on a transaction, you could potentially connect a pattern between the information to find the owner of the coins
- Anonomous public keys is the method used
- new keys for new transactions to stop a key being linked to an individual account.
- The multip;e inputs can suggest there all from the same owner, therefore previous txs could be correlated to the same owner.
- What is the basic method of maintaining anonymity?
– public keys are kept anonymous - What additional method does Satoshi suggest?
–new keys pairs should be used for each transaction - What weakness does this additional method have?
– multiple input transactions can reveal that several of the inputs were owned by the same owner
1.Keep public keys anonymous. Someone knows that transaction occurred but doesn’t know anything then that.
-
Using a different key pair for every transaction
-
If there is a multiple input transaction, the fact becomes apparent it belong to the same owner. In general if the owner of the key is releveled, it becomes possible to link other transactions to that specific owner.
-
Ensuring a public key cannot be linked to an individual entity.
-
Creating a new private / public keypair for each transaction made.
-
Once a public key can be linked to an individual, so can all the transactions and potentially other addresses used by them.
Already Done i posted twice
- Keeping the public key anonymous
- It is suggested to use new key pairs for other transactions, in order to avoid connections with previous ones.
- If the owner of a key is revealed, linking could reveal other transactions that belonged to the same owner.
-
What is the basic method of maintaining anonymity?
Keeping the public keys anonymous. -
What additional method does Satoshi suggest?
Having a centralized party hiding the p instead informations while publishing the « outcomes ». -
What weakness does this additional method have?
You have to trust that third party.
1. What is the basic method of maintaining anonymity?
Making Identities private, meaning to make public keys anonymous but making all transactions public
2. What additional method does Satoshi suggest?
“A new key pair should be used for each transaction to keep them from being linked to a common owner” - Satoshi Nakamoto
3. What weakness does this additional method have?
Multi input transactions can reveal that their inputs were owned all by the same owner. If an owner of a key is revealed, that could link and reveal other transactions that belonged to the same owner
1.You can’t link the hash to anyone, you can see the tx tho
-
A new key pair used for each tx so you can’t link it to the owner
-
It might be possible to link txs together.
- What is the basic method of maintaining anonymity?
By keeping public keys anonymous.
- What additional method does Satoshi suggest?
As an additional countermeasure, a new key pair should be used for each transaction to keep them
from being linked to a common owner.
- What weakness does this additional method have?
Some linking is still unavoidable with multi-input transactions, which necessarily reveal that their inputs were owned by the same owner. The risk is that if the owner of a key is revealed, linking could reveal other transactions that belonged to the same owner.
- “privacy can still be maintained by breaking the flow of information in
another place: by keeping public keys anonymous.” - “As an additional firewall, a new key pair should be used for each transaction to keep them
from being linked to a common owner.” - “Some linking is still unavoidable with multi-input
transactions, which necessarily reveal that their inputs were owned by the same owner”
extracted from the Bitcoin whitepaper
-
The identities of the involved parties are unknown. “Only” the transfered amount and date of issuance is known.
-
Changing key pair for each transaction.
-
In case the owner of a public key gets revealed, linking to past transactions would become possible.
1.keeping public keys anonymous
2. use a new key pair for each transaction
3. multi-input transactions can still reveal different addresses have the same owner
- By keeping public keys anonymous.
- Using a new key pair for each transaction
- Though if the owner of a key is revealed, linking could reveal other transactions that belong to that owner
-
What is the basic method of maintaining anonymity?
Delegate privacy function to the trusted third party which will conduct asset transfer but will protect personal data. -
What additional method does Satoshi suggest?
Satoshi sugges that public key does not contain any information about it’s owner. So you don’t know who sends assets to you and you may not know who do you send assets to. -
What weakness does this additional method have?
If public key’s owner was revealed we can track his multi-input transfers.