* stealth addresses (receiving privacy, can be reused and don't reveal all txs)
* ring signatures (obfuscates which utxos are being used)
* confidential transactions (amounts are encrypted but still add to 0 for each tx and can be verified using zero knowledge proofs)
* network level anonymity by blinding ips using dandelion++