Blockchain wallet wiki
Try to avoid creating change addresses, for example when funding a lightning channel spend an entire UTXO into it without any change (assuming the amount is not too large to be safe).If lightning is unavailable, use a wallet which correctly implements CoinJoin.Use Lightning Network as much as possible.Broadcast on-chain transactions over Tor, if your wallet doesn't support it then copy-paste the transaction hex data into a web broadcasting form over Tor browser.
#Blockchain wallet wiki full#
Use a wallet backed by your own full node or client-side block filtering, definitely not a web wallet.Try to reveal as little information as possible about yourself when transacting, for example avoid AML/KYC checks and be careful when giving your real life mail address.Addresses should be shown to one entity to receive money, and never used again after the money is spent from them. Note that transaction surveillance companies exist which do large-scale surveillance of the bitcoin ecosystem. Think about what you're hiding from, what is your threat model and what is your adversary.To save you reading the rest of the article, here is a quick summary of how normal bitcoin users can improve their privacy: 9.35 Real life example - 2018 paper on analysis of bitcoin ransomware transactions.9.34 Bad privacy example - Data fusion of blockchain data and IP address transaction broadcasting data.9.33 Bad privacy example - Centralized mixers being easily unmixed with amount correlation.9.32 Bad privacy example - Data fusion of blockchain data and web cookies when online shopping with Bitcoin.9.31 Real life example - Hacker hides destination of 445 btc with CoinJoin.9.30 Real life example - Freelance IT contractor has his co-workers figure out his salary.9.29 Real life example - Rare multisignature scripts.
9.22 Real life example - Public donation address combined with the common-input-ownership heuristic.9.21 Bad privacy example - Lightweight wallet over Tor used multiple times.9.20 Example - Single-use lightweight wallet over Tor.9.19 Bad privacy example - Bitcoin-stealing malware spied on with mystery shopper payments.9.18 Real life example - Bitcoin-stealing malware using static addresses.9.17 Bad privacy example - Receiving donations spied on with mystery shopper payments.9.16 Bad privacy example - Sending to a static donation address without precautions.9.15 Example - Daily commerce with Lightning Network.9.13 Bad privacy example - Privacy altcoin mixing failing due to amount correlation.9.12 Bad privacy example - Using a blockchain explorer.9.11 Example - Withdrawing casino winnings to a bitcoin exchange without either entity knowing the source or destination of funds.9.10 Example - Stopping incoming payments from different sources from being linked together.9.9 Example - Storing savings privately.9.8 Example - Receiving donations privately.9.7 Example - Donation without anyone knowing.9.6 Example - Donation without your employer knowing.9.5 Example - Transacting with your online poker buddies without revealing your real name.9.3 Bad privacy example - Savings revealed with data collection.9.2 Bad privacy example - Savings revealed with address reuse.9.1 Bad privacy example - Exchange front running.7.6 Probing payments to reveal channel states.7.1.1 Onion routing overlaid with network topology.6 Methods for improving privacy (blockchain).5.4.4 Receiving bitcoin data over satellite.5.4 Countermeasures to traffic analysis.5 Methods for improving privacy (non-blockchain).4.5 Revealing data when transacting bitcoin.4.3 Wallet history retrieval from third-party.3.4.2 Exact payment amounts (no change).3.4.1 Input amounts revealing sender wealth.