Stealth address guide: Keeping crypto transactions private | CoinLoan Blog (2024)

Stealth address guide: Keeping crypto transactions private | CoinLoan Blog (1)

While public blockchain records show only wallet addresses and amounts, they do not fully protect users' identities. Stealth addresses use public-private key combinations to hide flows of funds from prying eyes. This method of shielding incoming transactions has faced scrutiny, but it may soon increase privacy on Ethereum. Here is the lowdown on stealth addresses.

What are stealth addresses?

A common misconception is that all cryptocurrencies are impenetrably anonymous. After all, a sender only needs a recipient's address. Each address is a randomly generated string of alphanumeric characters depending on the cryptocurrency. For instance, a Bitcoin address includes 27-34 characters beginning with 1, 3, or bc1. The address of the first-ever BTC user is 1A1zP1eP5QGefi2DMPTfTL5SLmv7DivfNa.

Yet the identity protection features of blockchain technology are not flawless. As a distributed ledger, a blockchain network is like a shared database. The parties' addresses and amounts are publicly available – anyone can see them via a blockchain explorer site like Blockchair. Thus, anonymity is lost if an address owner's identity is discovered.

Suppose you set up a crowdfunding campaign. Through crypto, you can receive funds from anywhere in the world. But there is a catch: once you make your address public, it is associated with your identity so that anyone can track all the incoming and outgoing payments.

Stealth address guide: Keeping crypto transactions private | CoinLoan Blog (2)

Stealth addresses solve this problem through a unique identifier for each transaction. Such wallet addresses are used only once, even when multiple transactions reach the same recipient. Serving as a proxy, they boost anonymity in the crypto space.

The concept of one-time addresses involving dynamic public and private keys was proposed by Peter Todd in 2014. Some stealth addresses are generated via the elliptic-curve Diffie-Hellman protocol, a scheme for establishing shared secrets over insecure channels.

With stealth addresses, parties transact privately while the recipient accesses their transactions using a special spending key. As Ethereum CEO Vitalik Buterin put it, "Stealth addresses give the same privacy properties as… generating a fresh address for each transaction, but without requiring any interaction."

Reasons for generating one-time addresses

The public ledger technology provides pseudonymity, not anonymity — it is still possible to discover the identities of the parties. Security is compromised when your name or other data is linked to your cryptocurrency wallet publicly. These cases are not limited to sharing addresses online – if you transfer crypto from a platform where you have undergone KYC verification, that address is a point of privacy failure.

The possibility of tracing transactions to wallets could seem disappointing, but there is nothing inherently sinister about it. This peculiarity lets blockchain analytics firms and law enforcement spot and thwart scams, money-laundering schemes, and other financial crimes. Unfortunately, it also attracts malevolent actors.

Placing your address behind a stealth address will confuse any would-be trackers. It will work like a post office box for mail or a VPN network that masks your computer's IP address. With your personal information reliably hidden, incoming transactions won't be traceable anymore.

Benefits of stealth addresses

Using a stealth address is not the only way to protect privacy, but it outshines existing alternatives. For example, coinjoin – batching transactions with other users – is imperfect. This method only works for Bitcoin and requires finding another BTC holder for a joint transaction.

Another workaround is a coin mixer. For example, Tornado Cash, recently blacklisted by the US Treasury, uses smart contract technology. Its mixer contract splits the deposited crypto into smaller denominations and lumps them with other users' deposits. However, it can only hide mainstream ERC-20 tokens and has also been involved in crypto heists.

Stealth addresses could unlock privacy for many use cases, including transactions with NFTs, POAPs (digital badges or collectibles created via the namesake protocol), and ENS domains. Vitalik Buterin explains, "For example, if Bob wants to receive POAPs, then Bob could give his POAP wallet (or even a not-very-secure web interface) his viewing key to scan the chain and see all of his POAPs, without giving this interface the power to spend those POAPs."

How stealth address system works

Stealth addresses are created via various protocols, such as Monero. They are also generated within some crypto wallets. However, adding this feature to wallets is controversial, as many providers are wary of regulatory implications.

Existing stealth address schemes: Monero

Monero – a blockchain with enhanced privacy – relies on a three-tier system. Aside from stealth addresses, it includes ring signatures and RingCT. Its obfuscation methods make transfers untraceable and complicate tying them back to individual users.

Ring signatures conceal transactions by involving multiple public keys, or outputs, pulled from the blockchain via triangular distribution. As all ring members are equal, no observer can deduce which one belongs to your account. The true spend is thereby muddled.

RingCT (Ring Confidential Transactions) is a feature adopted by Monero in 2017. It conceals amounts, origins, and destinations via enhanced ring signatures – Multi-layered Linkable Spontaneous Anonymous Group signatures.

Stealth address guide: Keeping crypto transactions private | CoinLoan Blog (3)

Monero users do not have to create a new stealth address for each transaction, and they can adjust the level of transparency based on their needs. Upon creating an account, they receive the following:

  • A private view key for displaying all transactions to their account.
  • A private spend key for initiating payments.
  • A Public Address for receiving payments, generated using the two keys above.

To receive funds privately within the Monero ecosystem, a user publishes their Public Address once. All incoming transactions then go to shielded addresses on the blockchain. On the other hand, a sender creates a unique, single-use destination address for each transaction. No interaction with the recipient is required.

Only the parties involved know where the funds go. There is no way of connecting those transactions to the recipient's Public Address or any other addresses involved.

Users may share their view key to let others see their balance. On the other hand, some wallets are set up as "view-only" – i.e., without a spend key. As a result, they can neither sign transactions nor see outgoing payments. The use cases include validating transactions to hardware wallets (creating transactions to be signed offline) and monitoring incoming donations. Developers also use such view-only wallets when they write libraries for payment validation.

Stealth address guide: Keeping crypto transactions private | CoinLoan Blog (4)

Vitalik's stealth address vision

In January 2023, Vitalik Buterin proposed adding them to the Ethereum ecosystem to address privacy concerns, one of its largest remaining challenges. Here is how he describes this scheme in his "Incomplete guide to stealth addresses," reviewed by Ben DiFrancesco, Matt Solomon, Toni Wahrstätter, and Antonio Sanso.

Creating stealth addresses on Ethereum

Suppose Alice wants to send some ETH to Bob privately. It is impossible to hide the transfer, but concealing Bob's identity is more feasible. Either party to this transaction can create a stealth address that the recipient (Bob) will control. For Alice, this requires a special public key and a key only the sender knows.

Bob does not have to generate a new address for each transaction, and he does not have to interact with Alice at all if he registers his meta address on ENS — Ethereum's Domain Name System. Here is how such stealth addresses work.

Stealth address guide: Keeping crypto transactions private | CoinLoan Blog (5)
  1. Bob generates a root spending key and a stealth meta address for his Ethereum name (e.g., bob.eth). He passes the meta address to Alice or records it in ENS.
  2. Knowing the meta address (or after looking it up in ENS), Alice creates Bob's stealth address via a computation involving a single-use ephemeral key only she knows.
  3. Alice transfers ETH to Bob's stealth address. In the process, Alice generates and publishes an ephemeral public key – an on-chain piece of cryptographic data.
  4. Bob scans the registry of all ephemeral public keys to discover the recipient address. In the process, each ephemeral public key is combined with his root spending key to generate a stealth address and check if it holds any assets. Once a match is found, Bob generates and memorizes the spending key for that address.
Stealth address guide: Keeping crypto transactions private | CoinLoan Blog (6)

What about transaction fees?

One of the obstacles to this implementation is the Ethereum gas fees. When digital assets, whether fungible or non-fungible, land in a stealth address, it is otherwise empty. The owner cannot transfer what he received elsewhere. As their stealth address only contains what the sender transferred, they have no ETH to pay for the network gas.

Sending ETH from the main wallet is possible but undesirable. Such a transaction would create a publicly visible link, defeating the purpose of the stealth address. Buterin mentions two solutions – a type of zero-knowledge proofs (ZK-SNARKs) and specialized transaction aggregators. The first option is prohibitively expensive – "hundreds of thousands of gas just for a single transfer."

Aggregators (aka "searchers") let you buy a set of "tickets" at once and use them to pay for transactions on-chain. To transfer assets from a stealth address, one would submit an encoded pre-paid ticket to the aggregator. The latter would include their transaction in a bundle repeatedly until it was accepted in a block. This method does not involve additional fees and has few trust and regulatory concerns due to its purpose.

Spending and viewing keys

Thanks to the elliptic curve technology, users do not have to manage everything with one root spending key. Instead, they may use a spending key and a viewing key, with the latter showing its owner's stealth addresses without enabling spending.

More efficient scanning

Adding a view tag to each ephemeral public key makes scanning their sets easier. This view tag may be minuscule – just one byte of the shared secret. According to Buterin's estimates, this would speed up Bob's calculations to create and check the full address to 1/256 of the original time. Computing the shared secret would only require one elliptic curve multiplication for each ephemeral public key.

Ethereum stealth addresses vs. quantum threat

The advent of quantum computers could make elliptic curves vulnerable to interference. If this threat materializes, cryptocurrencies would have to adopt quantum-resistant algorithms. Buterin suggests two alternatives – elliptic curve isogenies and lattices.

The first option would provide immunity to discrete logarithm attacks. On the downside, it uses highly complex mathematics that attackers might exploit. The mathematics in lattices is far more straightforward, but such stealth address schemes may require larger keys.

Finally, creating a stealth address scheme may be possible using "generic black-box primitives: basic ingredients that lots of people need for other reasons." In cryptography, the term "black box" means users can only determine a system's input and output behavior, but not its internal workings.

This method is not ideal, either. The first problem lies with the parallel algorithms ensuring the sender, not the recipient, can generate the spending key. Secondly, the ingredients will not be basic after all – they may not be simpler than those required to build a public-key encryption system.

Regulatory issues and other concerns

Stealth addresses have drawn heat from regulators and tax authorities as they break tracking heuristics. Theoretically, such non-public addresses may be used for all kinds of illicit behavior, from money laundering to terrorist financing to drug trade.

Tax evasion is another concern. Governments and regulators are developing measures to detect violators, such as Operation Hidden Treasure. This Internal Revenue Service (IRS) initiative launched in 2021 is aimed at taxpayers who under-report crypto-related transactions.

Any obfuscating technique is a double-edged sword. While boosting anonymity in line with crypto's initial promise, it may benefit dishonest or nefarious parties. Yet despite crypto scams making headlines, most users are honest – per Chainanalysis’ estimates, only 0.15% of all transactions in 2021 were used for illicit activity. The next year, while illicit volumes reached an all-time high amid the sanctions, it only rose to 0.24%.

Banning privacy coins

In January 2023, the Dubai authorities announced plans to ban all "anonymity-enhanced cryptocurrencies", following suit after Japan and South Korea. If more governments may implement similar measures, citing financial crime concerns, this could hinder mass adoption of crypto. Instead, CoinLoan CTO Max Sapelov says, "there should be more projects like Monero, as there is currently nearly no competition."

The need for simplification

Another problem with stealth addresses is the complexity for the user. In the absence of convenient front-end solutions, it may result in lag issues and high cost of multiple transactions unless they are batched. In the future, enhanced Layer 2 networks and Ethereum upgrades could make this method default and hassle-free. Meanwhile, Ether may eventually become a privacy coin.

Disclaimer:

The information provided by CoinLoan ("we,” “us” or “our”) in this report is for general informationalpurposes only. All investment/financial opinions expressed by CoinLoan in this report are from thepersonal research and open information sources and are intended as educational material. All outlinedinformation is provided in good faith, however we make no representation or warranty of any kind,express or implied, regarding the accuracy, adequacy, validity, reliability, availability orcompleteness of any information in this report.

Stealth address guide: Keeping crypto transactions private | CoinLoan Blog (2024)

FAQs

How to keep crypto transactions private? ›

If you want to engage in Bitcoin transactions without getting traced, one of the basic ways is to use an anonymous Bitcoin wallet. Such a wallet is private, and it is specifically designed to ensure your privacy. As there are no KYC checks, you do not have to worry about the revelation of your actual identity.

How do I make crypto transactions untraceable? ›

To protect your privacy, you should use a new Bitcoin address each time you receive a new payment. Additionally, you can use multiple wallets for different purposes. Doing so allows you to isolate each of your transactions in such a way that it is not possible to associate them all together.

How do I hide my crypto wallet address? ›

To conceal your identity behind a Bitcoin wallet address, you can use methods like using a VPN to mask your IP address, creating multiple wallets to obfuscate the trail of transactions, and utilizing privacy-focused cryptocurrencies like Monero or Zcash for increased anonymity.

How do you store crypto anonymously? ›

Monero Wallets

Monero (XMR) is a privacy-focused cryptocurrency, and wallets supporting Monero, such as Monerujo and Cake Wallet, offer excellent anonymity features. Transactions on the Monero network are inherently private, thanks to ring signatures and stealth addresses.

Can you hide a crypto transaction? ›

Since all transactions are on the blockchain (that's how they become transactions), you can't hide the fact that the transaction was completed. What is hidden is where it went, what wallet and the physical address the wallet has. There are ways to pretty-much guarantee anonymity of that information.

Can crypto transactions be traced? ›

Yes, transactions in cryptocurrency can be traced, but the level of traceability depends on the specific cryptocurrency being used. Most cryptocurrencies, including Bitcoin and Ethereum, operate on public ledgers called blockchains.

Which crypto wallet cannot be traced? ›

Exodus is a non-custodial anonymous Bitcoin wallet that requires no KYC and doesn't store private keys, giving users full control over funds. It supports 300+ cryptocurrencies, including Bitcoin and Ethereum, and doesn't track personal information. The wallet features a built-in exchange for convenient crypto swapping.

Is there an untraceable crypto wallet? ›

Top Anonymous Crypto & Bitcoin Wallets

Exodus – A Great Option for Diversification With 50+ Supported Networks. Margex Wallet – Popular Exchange Wallet that's Fully Anonymous. Zengo – One of the Most Secure Crypto Wallets for Mobile Users. ELLIPAL Titan 2.0 – Top-Rated Hardware Wallet With Air-Gapped Security.

How do you stay anonymous in crypto? ›

There are methods to buy Bitcoin anonymously with cash, such as LocalCoinSwap or Bitcoin ATMs. Furthermore, there are places that require minimal identification and not necessarily your true identity. Best Wallet, Margex, MEXC, Zengo, StealthEX, HodlHodl, or Bisq all offer ways to purchase Bitcoin without KYC.

How do stealth addresses work? ›

Stealth Addresses increase security and anonymity by creating a unique, one-time address for each transaction. Consequently, even if a recipient gets multiple transactions, each is linked to a different address, enhancing privacy.

Is crypto wallet address traceable? ›

Yes, a cryptocurrency wallet address can be traced to its owner through blockchain analysis and linking transactions to identifiable information. Methods include tracking IP addresses, exchange records, and linking wallet activity to real-world identities.

Is a crypto wallet address public? ›

This can be done through various platforms, including hardware wallets, hosted wallets, and non-custodial or self-custody wallets. Once your wallet is created, your wallet address will be displayed within the wallet for easy access. Crypto wallet addresses are public, similar to email addresses.

What is the most anonymous crypto? ›

Monero. Monero (XMR) is the undisputed king of privacy-focused cryptocurrencies. Launched in 2014, it has established itself as the most private, secure and untraceable digital currency available. Monero's advanced privacy features make it virtually impossible to trace transactions or connect them to individual users.

Where is the safest place to keep crypto? ›

The answer to the question “what is the safest way to store crypto” is a self-custody cold storage wallet. As covered earlier, options include hardware wallets and paper wallets. But that's not to say that holding 100% of funds in cold storage is right for everyone.

How do you keep crypto hidden? ›

The best way to protect your bitcoins and other digital assets from being stolen is to keep your private keys stored in a cold wallet. Cold wallets are not connected to the internet or even another device.

How do I send crypto without being tracked? ›

How to Make Anonymous Crypto Payments
  1. Use Bitcoin ATMs. ...
  2. Purchase crypto with cash. ...
  3. Use P2P crypto exchanges with no KYC. ...
  4. Hide your IP using Tor Browser. ...
  5. Use a VPN. ...
  6. Avoid SPV and hosted crypto wallets. ...
  7. Do not reuse Bitcoin addresses.
Mar 20, 2023

Which crypto is not traceable? ›

Unlike traditional cryptocurrencies, Monero uses ring signatures, stealth addresses, and confidential transactions to obfuscate the sender, recipient, and transaction amount. This means that transactions made with Monero are virtually untraceable, making it difficult for anyone to uncover your financial activities.

How do you secure crypto transactions? ›

Best Practices Which Can Help the User to Send and Receive Cryptocurrencies Safely
  1. Sending Small Amounts first. ...
  2. Use multiple number of Wallets. ...
  3. Hardware Wallet and Hot Wallets. ...
  4. Increase Security with Password Managers. ...
  5. Choose secure exchanges if you are not comfortable being responsible.
May 16, 2024

Top Articles
Anxiety in Dogs | Cummings School of Veterinary Medicine
Natural Ways to Treat Anxiety in Older Dogs
Navicent Human Resources Phone Number
Where are the Best Boxing Gyms in the UK? - JD Sports
Swimgs Yuzzle Wuzzle Yups Wits Sadie Plant Tune 3 Tabs Winnie The Pooh Halloween Bob The Builder Christmas Autumns Cow Dog Pig Tim Cook’s Birthday Buff Work It Out Wombats Pineview Playtime Chronicles Day Of The Dead The Alpha Baa Baa Twinkle
Unit 30 Quiz: Idioms And Pronunciation
New Slayer Boss - The Araxyte
Overnight Cleaner Jobs
La connexion à Mon Compte
Chase Bank Operating Hours
Nwi Police Blotter
Bed Bath And Body Works Hiring
Cube Combination Wiki Roblox
Call Follower Osrs
Erin Kate Dolan Twitter
Sport Clip Hours
Caresha Please Discount Code
Lenscrafters Huebner Oaks
735 Reeds Avenue 737 & 739 Reeds Ave., Red Bluff, CA 96080 - MLS# 20240686 | CENTURY 21
Vanessa West Tripod Jeffrey Dahmer
Mbta Commuter Rail Lowell Line Schedule
WEB.DE Apps zum mailen auf dem SmartPhone, für Ihren Browser und Computer.
Richland Ecampus
Sprinkler Lv2
Recap: Noah Syndergaard earns his first L.A. win as Dodgers sweep Cardinals
Hyvee Workday
How to Download and Play Ultra Panda on PC ?
683 Job Calls
Rapv Springfield Ma
Unity Webgl Car Tag
How do you get noble pursuit?
Gunsmoke Tv Series Wiki
Meggen Nut
2487872771
How Much Is An Alignment At Costco
Urban Blight Crossword Clue
Nail Salon Open On Monday Near Me
Joplin Pets Craigslist
Marine Forecast Sandy Hook To Manasquan Inlet
Goodwill Houston Select Stores Photos
Western Gold Gateway
Reading Craigslist Pa
Mta Bus Forums
Frank 26 Forum
Myql Loan Login
Davis Fire Friday live updates: Community meeting set for 7 p.m. with Lombardo
Armageddon Time Showtimes Near Cmx Daytona 12
Mcalister's Deli Warrington Reviews
22 Golden Rules for Fitness Beginners – Barnes Corner Fitness
bot .com Project by super soph
Latest Posts
Article information

Author: Aron Pacocha

Last Updated:

Views: 6291

Rating: 4.8 / 5 (68 voted)

Reviews: 91% of readers found this page helpful

Author information

Name: Aron Pacocha

Birthday: 1999-08-12

Address: 3808 Moen Corner, Gorczanyport, FL 67364-2074

Phone: +393457723392

Job: Retail Consultant

Hobby: Jewelry making, Cooking, Gaming, Reading, Juggling, Cabaret, Origami

Introduction: My name is Aron Pacocha, I am a happy, tasty, innocent, proud, talented, courageous, magnificent person who loves writing and wants to share my knowledge and understanding with you.