* stealth addresses (receiving privacy, can be reused and don't reveal all txs)

* ring signatures (obfuscates which utxos are being used)

* confidential transactions (amounts are encrypted but still add to 0 for each tx and can be verified using zero knowledge proofs)

* network level anonymity by blinding ips using dandelion++

Reply to this note

Please Login to reply.

Discussion

No replies yet.