When Bitcoin first became a thing, some people began calling it anonymous because funds live in alphanumeric addresses rather than accounts named by personal names.
But, because every Bitcoin transfer is recorded on it’s perfectly public blockchain or ledger, it’s only a matter of time, tools and dedication to eventually de-anonymize all or most of bitcoins transactions.
In fact, there are well-funded companies cropping up right now that intend to do this very thing.
Some cryptocurrency users don’t mind this, but others are utterly repulsed by the idea of the entire world being let in on their finances.
For the latter group, there are currently three primary ways to restore the anonymous nature of cryptocurrency transactions with varying degrees of effort involved.
This is not a full list of privacy focused coins. There are a lot of those nowadays: Monero, Dash, Verge, Anoncoin, Zcash, NAV, Stealthcoin, Zcoin, Byteball, Spectre, Cloak, Pivx, Zencash, Hush, Deep onion, Particl, Zclassic, Digitalnote…
In this artcile, we will be dealing only with the most known coins.
First, let’s say you want to anonymize your bitcoins. There’s currently no protocol level way to do this so you’ll need to choose a mixing service with a fine reputation.
Say you want to mix funds right from within your wallet. In this case you’d want to use cryptocurrency like DASH. I can pay a small fee to use a feature called Darksend.
I start by telling my wallet that I’d like to darksend and mix my funds. It will begin to break them up into denominations of a hundreds of – ten – one – point one – then when I’d like to actually send a transaction I tell my wallet to send it darksend style.
Before the funds reach their destination they will be mixed at masternode hubs with the denominations of other darksend users before landing in their final destination.
Here is an interesting article on how DASH faired vs bitcoin.
The third way is a way that doesn’t require manual iximng of any kind if we use a cryptocurrency like Monero.
We’ll see that block explorers don’t allow us to see the transaction histories or balances of other Monero users. This is because by default all payments have multiple possible senders and multiple possible recipients. Only the holder of a special private key called the view key of any Monero address can see that address’ full history or grant permission to others to do so.
So at this tender young stage of cryptocurrencies, the three options for anonymous sending cryptos:
- using a centralized mixer for Bitcoin
- using decentralized mixing within DASH or
- just using Monero.
These are the main ways that you can really even imitate in your crypto currency transactions so whether privacy is important to you or not in cryptocurrency consumers have a choice to send their money privately.
Here is a comparison of privacy focused coins – first appeared on Reddit.
Monero (XMR) vs. Bitcoin (BTC) vs. Zcash (ZEC) vs. Dash (DASH) vs. Verge (XVG)
This comparison chart between Monero, Bitcoin and the largest so-called “privacy coins” strives to be unbiased and wholly factual.
If you believe there is information worth correcting, please send a message here.
|Private||The amount of coins you own, send and receive are not observable on the Blockchain. There should be no “rich list” (a list of the largest coin holders).|
|Untraceable/Unlinkable||The coins you send and receive are not traceable (to or from), nor linkable by way of transaction history.|
|Fungible||Every coin is worth the same value and is thus mutually interchangeable. No coin risks potential blacklisting nor devaluement due to deprecating transaction history.|
|Decentralized||All nodes have equal power and control; there are no nodes that have more influence than others, i.e. masternodes. The currency is not created, maintained nor represented by any one person or company, i.e. a central authority.|
|Pass||Fail||Questionable (Read Below)|
- Privacy, Traceability, Linkability
Monero is cryptographically private by default, utilizing several privacy features – most prominently being stealth addresses and ring confidential transactions (RingCT).
A recipient is able to receive multiple payments through a single address, while at the same time ensuring there are no links on the blockchain between their address and anybody else’s address. This is made possible by stealth addresses, where a random one-time address is automatically created for each transaction being made by the sender. In other words, all payments sent to the recipient are routed to unique addresses on the blockchain, which in turn prevents any links – masking the recipient, and providing no way to see if anybody else has sent coins to the recipient.
While stealth addresses prevent linkability on the blockchain, when and where the coins are then moved by the recipient (if ever), is able to be traced by the original sender of the coins, by identifying outputs on the blockchain. This issue of traceability is solved by the utilization of ring signatures. With ring signatures, outputs are masked, so the sender is not able to tell if it’s their coins that are then moved by the recipient, ultimately providing untraceability. This is done by grouping the transaction being sent, with other transactions from the blockchain, to obfuscate the outputs being spent and allowing for plausible deniability.
On January 2017, Monero implemented ring confidential transactions (RingCT), introducing an improved version of ring signatures, and combining with the improvements, confidential transactions – a cryptographic tool that conceals the amount being transacted, while still allowing for the network to verify the amount without having to reveal any actual details. “Confidential Transactions include a cryptographic proof that the sum of the input amounts is the same as the sum of the output amounts, without revealing the actual numbers.” Source.
The Monero Project is currently developing Kovri, a C++ implementation of the I2P network. Kovri will allow for an extra layer of security and privacy, most importantly being the disassociation of IP addresses from transactions, among many other things. Kovri is currently in development and is coming soon.
With stealth addresses, the recipient is masked and linkability is prevented. With ring signatures, outputs are masked, so the sender is not able to trace when and where the coins they have sent to the recipient are further moved to – obfuscating traceability and providing plausible deniability. With RingCT (i.e. confidential transactions), the amount being transacted is cryptographically concealed, while still allowing for the network to verify the amount without having to reveal any actual details. With Kovri, a user’s IP address is masked and thus not associated with their transaction.
Although Monero is private by default, transactors are afforded the option of selective transparency, where a user can decide who is able to view their hidden balance by sharing their view key. Monero is private by default and optionally semi-transparent, affording a transactor the choice to prove their payment or to allow for the divulgence of their balance with a key.
Because of Monero’s cryptographic privacy, untraceability and unlinkability features, coins avoid the potential of being tainted by deprecating transaction history. There is no risk of blacklisting nor devaluement of Monero, therefore all coins are worth the same value and are mutually interchangeable.
Monero is truly decentralized and led by volunteer work. Developers are funded by user contribution through the Forum Funding System. Development decisions are open to public discussion, and developer meeting logs are published in their entirety for all to read. The Monero Project’s source code and all changes are available on the official Monero GitHub.
- Privacy, Traceability, Linkability
Bitcoin does not offer privacy and has never claimed to do so. The Bitcoin blockchain is completely transparent; every transaction, its history, and the amount being sent or received is public and easily viewable by an observer. Thus, Bitcoin transactions are easy to trace and link. Although your Bitcoin address is “anonymous” in that no identifying information (e.g. name, address, etc.) is attached to it, it is presumed that at some point you will cash out your Bitcoins (e.g. through an exchange) or you will purchase an item with your Bitcoins (e.g. from a merchant), and you will at that point risk connecting your identity to your Bitcoin address(es), your Bitcoins, and their entire transaction history.
Not all Bitcoins are worth the same value. Due to Bitcoin’s transparent blockchain, the transaction history connected to your Bitcoin is liable to devalue it. Although it would require a substantial amount of power to deny or blacklist your Bitcoin (and all addresses associated with it, regardless of whether or not you are innocent), there have already been cases where exchanges have “blacklisted” Bitcoins and the addresses associated with them:
“As of today, we have taken measures to blacklist all addresses associated with the WannaCry attackers that are known to the ShapeShift team, as is our policy for any transactions we deem breach our terms of service. We are closely watching the situation as it continues to unfold as to block any further addresses associated,” the spokesperson added. Source.
Bitcoin is decentralized. Notably, it is the first decentralized peer-to-peer payment network.
- Privacy, Traceability, Linkability
Zcash uses a new method of cryptographic privacy called “zk-SNARKs” (zero-knowledge Succinct Non-interactive ARgument of Knowledge). At the basic level, zero-knowledge proofs allow for a way to prove that the information you are sending to the other party (e.g. the amount of funds) is true, without having to broadcast said information besides the fact that it is true. In other words, “you can verify the correctness of computations without having to execute them and you will not even learn what was executed – just that it was done correctly.” Source. The cryptography behind zk-SNARKs allow for all transaction data to be private and encrypted – “Instead of publicly demonstrating spend-authority and transaction values, the transaction metadata is encrypted.” Source.
Although Zcash’s privacy components on the cryptographic level raise no doubts (even though zk-SNARKs are a fairly recent development and lack peer review), there are other concerns regarding Zcash’s handling of privacy that are worth examination. Zcash offers the choice of optional privacy. In other words, privacy (“shielding”) is not on by default. According to Zcash’s blockchain, as of writing, only an approximate 5.05% of funds are held in z-addresses (private addresses utilizing zero-knowledge proofs to ensure privacy) – on the contrary, a majority of Zcash transactions are not private, and are easily viewable by an observer. According to Zcash’s usage statistics, as of writing, in the past month, only ~500 transactions have opted to be “fully shielded” – masking the recipient, sender and the amount being transacted on a comparable level to Monero’s default transaction privacy. Out of ~148541 transparent transactions, and ~20818 partially-shielded transactions, only a total of ~0.3% of transactions within the past month have utilized the optional “full shielding” feature that is tantamount to Monero’s default privacy features.
Zcash is not “private by default” particularly due to the inefficiency of zk-SNARKs. The process of creating a transaction with zero-knowledge proofs (zk-SNARKs) is slow and costly – requiring that you run a full node, while demanding up to 4GB of RAM “for a minute or two” until the transaction is sent. Source. It is also the case that, because a majority of the blockchain is transparent, those who do use the privacy features stand out, and there may be the potential risk for an attacker to “isolate the few users who are using the privacy features. In Bitcoin, transactions appear suspicious if mixing services are used. For ZCash, this is basically the same story. For Monero, few transactions appear suspicious because they all look similar.” Source.
This information, however, is rejected by proponents of Zcash. One of the arguments brought up against the claim that “Zcash is not private by default” is that, supposedly, “the first thing that must be done before [a] block reward can be spent is [that] the ZEC must be sent to a private address. It is coded that way and cannot be bypassed, that is the very definition of ‘default’ [privacy].” Proponents even reject the “only less than 10% of Zcash transactions are private” claim, by arguing that “23% of all network transactions are shielded.” Source. These arguments, however, are misleading. In a presentation at Coinbase, Bitcoin Core Developer Greg Maxwell has stated:
“Zcash couldn’t plausibly make the private transactions mandatory, so they’re optional, and as a result, very few of the transactions in the Zcash chain actually use the private transaction feature. If you just look at the raw numbers, it’s 24%, but that number is a bit misleading, because miners are required to pay to a private address – but most miners are mining pools, and the mining pools immediately unblind those coins, and if you sort of separate out the mining load, then maybe it’s in the order of 4% of Zcash transactions are private. And as a result, that anonymity set that this ‘perfect’ anonymity system is achieving, isn’t really all that good. I think it’s a cool thing, and I’m really glad that people are trying it out, but it’s not the kind of proposal I’d want to take to something like Bitcoin today.” Source.
Because of Zcash’s overwhelmingly transparent blockchain, “It is thus possible to correlate transactions when a transparent address sends a given amount to a shielded address and later that amount is transferred to a transparent address. What was private can now be inferred through indirect knowledge thanks to knowing the ‘inputs and outputs.'” Source.
Matthew Green, author of Zerocoin – whose protocol was then improved and transformed into Zerocash, which gave birth to the currency we know today as Zcash – is a current team member at Zcash. He has previously stated, “Zerocoin would give you this incredible privacy guarantee, then we could add on some features which let the police, for instance, to be able to track money laundering. A back door.” Source.
Because the blockchain and its transactions are not private by default, there is the potential, similar to Bitcoin, for an entity to deny or blacklist Zcash. This means that Zcash is not fungible, even if you “mix” the coins by way of sending it to a shielded address and then to a transparent address. As cited above, “It is thus possible to correlate transactions when a transparent address sends a given amount to a shielded address and later that amount is transferred to a transparent address. What was private can now be inferred through indirect knowledge thanks to knowing the ‘inputs and outputs.'” Source.
The company takes 20% of all coins mined for the first four years as a “founders reward” – “distributed to the stakeholders in the Zcash Company — [the] founders, investors, employees, and advisors.” With 50 coins being generated every 10 minutes for the first four years, an approximate 10,512,000 coins will be created, with the founders owning 2,102,400 (20%) of what is in circulation. After those first four years, coin generation will be reduced to 25 coins per 10 minutes, and only then will miners receive 100% of what is mined. Once the cap of 21,000,000 coins is reached, the “founders, investors, employees, and advisors” can potentially own up to approximately 10% of all coins in circulation. Source.
The Zcash company (i.e. the Zerocoin Electric Coin Company, based on the original project, Zerocoin, that conceded the Zerocash protocol, which then yielded the Zcash currency) was sponsored by several corporate entities and sectors of government, notably being the U.S. Defense Advanced Research Projects Agency (DARPA), the Air Force Research Laboratory (AFRL), the Israeli Centers of Research Excellence I-CORE program, and the Israeli Ministry of Science and Technology. Source.
Zcash was launched by way of something called the “multi-party computation” – also known as a “trusted setup.” “The public parameters (zk-SNARK providing and verifying keys)” for Zcash’s launch were constructed in a ceremony spearheaded by six individuals:
- Andrew Miller (Zcash advisor)
- Peter Van Valkenberg (Zcash “board member” Source.)
- John Dobbertin (pseudonym, “The identity of ‘John Dobbertin’ has not yet been revealed, and I don’t yet know when John and I will be ready to do that.” Source.)
- Zooko Wilcox (Zcash founder, CEO)
- Derek Hinch (NCC Group, a cyber security consulting group)
- Peter Todd (Bitcoin Core Developer)
“The ceremony used a multi-party computation protocol with the property that the resulting parameters are secure unless all of the participants were dishonest or compromised during the ceremony.” Source.
“The Zcash protocol needs a special trusted setup phase for technical reasons. The secret key (“cryptographic toxic waste”) generated during this phase can be used to steal money – currently in the form of creating counterfeit coins, stealing from everyone collectively. For the secret key to leak, all six participants need to collude or be compromised. Emphasis on the latter: there are a lot of ways that the participants could be compromised against their will.” Source.
In short, there is the potential risk – if all six participants of the trusted setup were to collude – that would enable them to generate an unlimited, undetectable amount of coins. Along with this concern, with Zcash, “the total number of coins in circulation is not guaranteed from the outset, and it may not be possible to know how many there are.” Source. Nick Szabo, father of smart contracts, stated long ago that “trusted third parties are security holes.” Source. There is no way to audit Zcash to ensure whether or not the trusted setup has failed, will ever fail in the future, or was compromised from the start. The trusted setup “multi-party computation ceremony” took place between October 21-23, 2016. Source.
On November 1, 2016, Peter Todd, a Bitcoin Core Developer and one of the six individuals who participated in Zcash’s trusted setup, stated:
Let’s be 100% clear: the @zcashco trusted setup is a backdoor, with no way of proving it has been disabled. 100% unlike other systems. 3:44 PM – 1 Nov 2016 Source.
The zcash trusted setup is exactly that: trusted. In no way is it trustless. 10:34 PM – 1 Nov 2016 Source.
Later in May, 2017:
Thinkpad T520 I used for the @zcashco trusted setup was 100% vulnerable to this: https://arstechnica.com/security/2017/05/the-hijacking-flaw-that-lurked-in-intel-chips-is-worse-than-anyone-thought/ … See: https://support.lenovo.com/it/en/product_security/len-14963#ThinkPad … 4:19 PM – 8 May 2017 Source.
Just the networking computer, not compute node, so the airgap should have protected the setup. But shows the paranoia was 100% justified. 4:22 PM – 8 May 2017 Source.
Without the airgap the Intel AMT backdoor could have 100% compromised the @zcash trusted setup. 4:22 PM – 8 May 2017 Source.
In response to a tweet: does this change anything in your mind regarding the sanctity of the zcash ceremony?
Yes: an attacker may have compromised the DVD’s, which were burnt and verified on vulnerable laptops. 4:34 PM – 8 May 2017 Source.
I’m going to have to recheck them on a clean computer, and even then it’s a bit dubious: DVD’s are not read-only – can be further burned. 4:34 PM – 8 May 2017 Source.
In response to a tweet: how are you going to recheck the DVDs? I guess it’s possible to backdoor DVD via twin sector method https://en.wikipedia.org/wiki/Compact_Disc_and_DVD_copy_protection#Twin_sectors … 1/2
At minimum finding a few DVD drives without burn capability, and rechecking w/ diverse controlling computes seems like a good idea. 4:56 PM – 8 May 2017 Source.
In response to a tweet: Even then, the ISO could’ve been compromised in subtle ways (specific known-bad libraries for e.g.), or the MPC implementation could be bad.
Yeah, there hasn’t been enough attention paid to that IMO. Although at least that’s stuff that can be determined after the fact. 3:35 AM – 9 May 2017 Source.
In a presentation at Coinbase, Bitcoin Core Developer Greg Maxwell has stated:
“Zcash isn’t unconditionally sound, and cannot be made unconditionally sound with current technologies – not even close. In fact, Zcash requires a trusted setup, meaning that a number of trusted parties have to get together, and if they cheat, they can break the crypto and create unbounded, undetectable inflation. So, if there’s a crypto break, or the trusted setup were broken – very bad news. Now they did a bunch of stuff – in the Zcash altcoin – with having a good ritual to increase trust – that the trusted setup is trustworthy – but they may have to redo this procedure to upgrade the crypto overtime, so it’s a vulnerability.” Source.
In a Twitter discussion regarding the WannaCry ransomware attack and the difficulty of cashing out illicitly-obtained cryptocurrencies to fiat currency, Zcash’s founder and CEO, Zooko Wilcox stated:
And by the way, I think we can successfully make Zcash too traceable for criminals like WannaCry, but still completely private & fungible. … 6:22 PM – 12 May 2017 Source.
… At least for as long as criminals want to cash out to fiat (years? decades?). … 6:23 PM – 12 May 2017 Source.
… I know to techies and ideologues that sounds contradictory or suspect, but I think it’ll work in the real world, at least for now. ៚ 6:25 PM – 12 May 2017 Source.
Later, he backtracks:
How bout we just pretend I never said this. 4:56 PM – 13 May 2017 Source.
- Privacy, Traceability, Linkability
Dash is not cryptographically private whatsoever. Dash promises “privacy” through mixing, utilizing a modified version of CoinJoin – a method initially created to “anonymize” Bitcoins. Dash functions similar to Bitcoin, in that the blockchain is transparent by default, while offering optional privacy by way of mixing. To mix the coins, the “PrivateSend” feature must be employed, which sends the coins through a series of chained CoinJoins. In other words, the PrivateSend feature mixes the coins that are being sent, with other users whose coins are sent through PrivateSend. The more users the coins mix and “chain” with, the “more private” the coins end up.
A server called a “masternode” is required to expedite the mixing process, which in turn “requires users to trust that the server is not recording details on where each user’s outputs are ending up.” A masternode requires a deposit of 1,000 Dash coins to run, which in theory, “prevents someone from creating an arbitrary number of nodes for the purpose of recording CoinJoin details.” Source. However, this does not prevent the potential for an attacker with great means (e.g. a government, or group of hackers) from consolidating masternodes for nefarious purposes. Furthermore, there is nothing preventing these masternodes from logging the user’s output destinations, and there is no way to audit whether or not a masternode is logging anything at all. This threat is further exacerbated by the fact that most masternodes are hosted on a limited range of VPS providers – which presents the possible, unknowable vulnerability of the VPS providers being able to log information without the masternode owner’s consent or awareness. Moreover, from a practical standpoint, the PrivateSend mixing process is liable to take up to several hours or days to complete, depending on the amount of rounds the coins are chosen to mix through.
Dash’s blockchain is transparent and offers a rich list. It is the case that transactions are easily viewable by an observer, and coins which are mixed through the PrivateSend feature end up looking suspicious in comparison to a regular transaction.
Because Dash’s blockchain is transparent by default, and only optionally utilizes mixing “privacy,” there is the potential for an entity to deny or blacklist Dash coins and addresses.
Dash offers incentivized nodes called masternodes – a setup required for the PrivateSend feature to function. Not only do masternodes require a deposit of 1,000 Dash coins to run, but masternodes have more power, control and influence over regular nodes. In other words, a limited, affluent group of people consolidate more power and control, therefore Dash is not wholly decentralized.
Furthermore, Dash utilizes a mechanism called “sporks” (multi-phased forks), which allows the Dash development team to update its code and release it to the entire Dash network. Sporks are variables based on different features and functions, meaning that the Dash development team, by way of a private key held by the development team, can arbitrarily enable and disable different features and functions effective to the entire network.
Case in point, on August 30, 2017, a Dash Core Developer announced a potential exploit that would allow an attacker “with 6 or more Masternodes” to perform a double spend or a network fork. In response, the development team remotely disabled the vulnerable feature in question (InstantSend), by way of sporks, to ensure that the attack would not be performed until a fix was released. Source. According to “strategy advisor” Evan Duffield, “this is something you simply can’t do with a hard fork or a soft fork because it’s – it’s [sic] something that the administrators need to… to [sic] have some – some [sic] power over.” – “The – the [sic] only issue with the Sporks is that it’s a singular key. And it’s – it [sic] is controlling a decentralized network.” Source.
As a fallback, Dash has introduced a governance tool called Sentinel, where the maintainers of masternodes are able to vote, and through majority vote, trigger a spork a certain direction. Source. As pointed out by @fluffypony – with the power of sporks, the Dash development team is able to – for example – invalidate the past 24 hours of blocks for the sake of invalidating all transactions in those blocks, opening up the vulnerability for the Dash team to “deposit Dash on an exchange, sell it, and then flip a switch invalidating the deposit under the guise of a ‘fix’.”
Dash is not only dependent on the sporks trusted system, but the private keys that are required to utilize sporks are held by the development team, making Dash centralized.
Furthermore, miners and masternodes are required to split block rewards, with each group earning 45% of coins generated per block. The “Dash Treasury” retains the remaining 10% of coins generated per block, “allocated monthly to any independent contractor or service provider who wants to be ‘hired’ by the network to provide services including programming, marketing, graphic design, or any other services that help improve and promote the Dash currency.” Source.
- Privacy, Traceability, Linkability
Verge is not cryptographically private whatsoever. Verge only offers “privacy” by way of Tor and I2P routing, to obfuscate traffic and conceal a user’s IP address when transacting. Source.There are no cryptographic privacy features with regards to the blockchain, the linkability and traceability of transactions and addresses, nor the concealment of the amounts being transacted. All information, including the destination of transactions and the amounts being transacted, are transparent on the blockchain, and are easily viewable by an observer. Moreover, the privacy, traceability and linkability of transactions and addresses on the Verge blockchain are exceptionally worse than Bitcoin, because the Verge blockchain contains less transactions overall. Furthermore, Verge offers a rich list, thus it is not private at all.
On September 4, 2017, a video was put out (and was then removed and reuploaded by another entity) announcing the implementation of stealth addresses – however, there is no proof that this implementation is underway, nor do stealth addresses provide sufficient privacy, especially when it comes to the traceability of coins and the privacy respective to the amounts being transacted.
Because of Verge’s transparent blockchain, there is the potential for an entity to deny or blacklist Verge coins and addresses.
Verge is a Bitcoin clone, and therefore it carries Bitcoin’s attribute of decentralization.
Join Our Telegram Channel or Follow @CaptainAltcoin