- keeping public keys anonymous
- a new key pair should be used for each transaction to keep them
from being linked to a common owner. - if the owner of a key is revealed, linking could reveal other transactions that belonged to
the same owner
-
What is the basic method of maintaining anonymity? The BTC whitepaper indicates that the basic method of maintaining anonymity is primarily by keeping public keys anonymous, and by decoupling that public key to any kind of personal identifiers to the individual(s) who are operating it
-
What additional method does Satoshi suggest? Satoshi suggests that another means of enhancing privacy would be to create a new key pair upon use for each transaction (as a means of preventing people from seeing transactions linked to a common wallet.
-
What weakness does this additional method have? The weakness is that, of course, if the owner were to be discovered, the multiple links would implicate that owner to said transactions.
-
Anonymity can be achieved by keeping public keys anonymous
-
Additional method by satoshi is to use a new key for every transaction.
-
A risk would be if one key was traced to an identity, all other transactions could be linked to the same owner
Hello Grant and everyone!
1. What is the basic method of maintaining anonymity?
By using a private key that is hashed to produce a public key, used to approve a transaction sent with a signature created also with the public key and transaction hash.
2. What additional method does Satoshi suggest?
By implementing a new key pair for each transaction to keep them from being linked back to the same owner.
3. What weakness does this additional method have?
With some linking being unavoidable, this shows some transactions being linked to the same owner, risking them being traced back to them.
-
by making sure that your identity isn’t linked to a public key.
-
creating an additional Key pair per transaction
-
exposing if you key pair on one transaction will possibly expose the ownership of other transactions.
1. What is the basic method of maintaining anonymity?
Privacy can still be maintained by breaking the flow of information, keeping public keys anonymous. The public can see that someone is sending
an amount to someone else, but without information linking the transaction to anyone.
2. What additional method does Satoshi suggest?
A new key pair should be used for each transaction to keep them
from being linked to a common owner.
3. What weakness does this additional method have?
If the owner of a key is revealed, linking could reveal other transactions that belonged to
the same owner.
- Public Key is anonymous, no one knows who own that address.
- Generating a new key pair for each transaction.
- In the case that a public key is revealed, linking could reveal other transactions that belonged to the same owner
-
Breaking the flow of information by keeping the public key annonymous.
-
use a new key pair for every transaction.
-
the ower of the keys ge get linked together
- By keeping public keys anonymous. The public can see that someone is sending an amount to someone else, but without information linking the transaction to anyone.
- As an additional firewall, a new key pair should be used for each transaction to keep them from being linked to a common owner.
- With multi-input transactions, which necessarily reveal that their inputs were owned by the same owner. The risk is that if the owner of a key is revealed, linking could reveal other transactions that belonged to the same owner.
-
Breaking certain flow of information keeping public keys anonymous. The public can see that someone is sending an amount to someone else, but without information linking the transaction to anyone.
-
Using a new key pair for each transaction to keep them from being linked to a common owner.
-
Some linking is still unavoidable with multi-input transactions, which necessarily reveal that their inputs were owned by the same owner.
The risk is that if the owner of a key is revealed, linking could reveal other transactions that belonged to the same owner.
- What is the basic method of maintaining anonymity?
By keeping public keys anonymous. - What additional method does Satoshi suggest?
Use of a new key pare for each transaction. - What weakness does this additional method have?
Risk is that the owner of the key can be revealed.
-
What is the basic method of maintaining anonymity?
Keeping the public keys anonymous. -
What additional method does Satoshi suggest?
Using a new public key for each transaction -
What weakness does this additional method have?
Some linking is unavoidable. Therefore, if an owner is identified with a public key, it will tie other transactions back to the same owner.
-
Maintaining anonymity, public can see the transactions between addresses where the addresses doesn’t hold any personal information.
-
a new key pair should be used for each transaction to keep them
from being linked to a common owner. -
The risk is that if the owner of a key is revealed, linking could reveal other transactions that belonged to the same owner
-
What is the basic method of maintaining anonymity?
To keep the private key private and hash out a public key. -
What additional method does Satoshi suggest?
Generate a new public key for every new transaction. -
What weakness does this additional method have?
If the owner of a key is revealed, this could be used to link the owner to other transactions
1.) The basic method of maintaining anonymity is to keep public keys anonymous. Still, the public can see that one person is sending an amount to someone else, but there is no information that links this transaction to anybody.
2.) The additional method that Satoshi suggests is to use a new key pair for every single transaction. This helps maintain privacy further by unlinking any inputs to a common owner.
3.) The weakness in this additional method is that some multi-input transactions can still be revealed as coming from the same owner. If the owner of this key is revealed, linking could reveal transactions that came from the same owner and are trackable.
- the basic method of maintaining privacy is you cant link the transaction to the identify the person including the public key as well.
- additionally satoshi suggested to change the public key after each transaction
- weakness was the multi-input transactions
-
What is the basic method of maintaining anonymity? : By breaking the flow of information in another place: by keeping public keys anonymous.
-
What additional method does Satoshi suggest? : Using new key pair for each transaction to keep them from being linked to a common owner.
-
What weakness does this additional method have? : Multi-input
transactions reveal that inputs were owned by the same owner risking the owner of a key to be revealed linking other transactions to the same owner.
-
Anonymity is achieved by keeping public keys anonymous. The public can see that someone is sending an amount to someone else, but without information linking the transaction to anyone.
-
A new key pair should be used for each transaction to keep them from being linked to a common owner.
-
The risk is that if the owner of a key is revealed, linking could reveal other transactions that belonged to the same owner.
What is the basic method of maintaining anonymity?
The basic method of maintaining anonymity in the Bitcoin Whitepaper is pseudo-anonymous addresses, generated from a hash of a random private key. These address are not tied to any particular identity.
What additional method does Satoshi suggest?
Given that private key’s are able to be generated at will, a sender or receiver of a transaction can generate a new public address for any given transaction if they wish to disassociate themselves from any other (past or future) transaction/s.
What weakness does this additional method have?
Obviously, if some entity wishes to maintain their privacy for several transactions, they will need to maintain several wallets.
For businesses, this can be millions of wallets, and there are inefficiencies for wanting to make subsequent sends for more or less than their receiving UTXO…
For example, if Alice were to send one of Bob’s addresses 0.2BTC, and that address wanted to make a transaction of 0.18BTC to Cathy. The following transaction from that address would:
- Connect Alice’s address to Bob,
- Mean that Bob still has ~0.02BTC UTXO’s (ignoring tx fees).
And if Bob wanted to be completely anonymous, it would be wise to not make further transactions using that address, because Cathy understands it is Bob already connected to that address and can monitor following transactions. Therefore he would have to part ways with the additional 0.02BTC as dust.
It is far more convenient to sum an amount of UTXO’s from one wallet, and so receive/send inequalities are not such an issue.
- By keeping public keys anonymous.
- A new key pair should be used for each transaction, so to protect the owner.
- If a key is revealed, all other transactions of the same owner could be revealed down the chain.