The Most Anonymous Cryptocurrencies | Privacy Vs Security
Bitcoin emerged as an ongoing attempt to create and control the finances of ordinary people. First, it was a major innovation in terms of security and privacy . But over time many problems appear.
As a result, more and more members of the crypto community are continuing the debate between privacy and security, with plans to create more private encryption.
Privacy and security
Although the concepts of security and privacy are sometimes seen as a false separation, there is a difference when it comes to managing data and information online. Indeed, in an online ecosystem, a system can function securely but without privacy, but no system can provide privacy without security.
What is security?
The easiest way to understand security is to back up your data. On the security side, the system and its administrators prevent attackers from extracting, changing and deleting data.
For example, when you open a Facebook account, you can enter all of your personal information, from your date of birth to the city you live in or who your parents and relatives are.
While anyone can see this information, Facebook ensures that no one can go to your profile page and edit it.
Additionally, they seek to improve authentication by continuously configuring access notifications, including connecting to physical devices and environments.
You can assume that Facebook is completely safe. However, talking about privacy in this case is a more sensitive topic.
Since it is a social media platform, any information you share on Facebook will be available to everyone. In addition, the platform stores all information that can be used to show you targeted advertising based on your interests from the date of your Facebook registration.
Facebook also reads your conversations. Analyze the links and images you send or receive in conversations with friends on Facebook Messenger, and read chats when moderators report them.
However, Facebook offers certain privacy settings so that you can control how other Facebook members interact with you. But those options come down to your business, your timeline, your accounts, and how you reach out and communicate.
But when it comes to advertising, Facebook is a haven for spammy ads, and there's not much you, as an average user, can do about it. Believe it or not, a travel agency can target you with travel ads based on whether you took a vacation last summer.
What is privacy?
Security is about protecting data, and privacy is about protecting the identity and activities of users.
Facebook is an example of flawless security with little or no privacy, so we need to take a closer look at how this issue is handled in relation to cryptocurrency.
"Do users really have privacy when a central authority controls the financial system?" This is one of the fundamental dilemmas that cryptocurrencies are trying to solve through decentralization.
It provides your finances to the bank management using a regular bank account. So all your transactions are reviewed, approved and managed by the bank.
Often we all don't know that we pay high fees for international transactions (which can take days), we don't know that we can only use our funds in limited amounts and with providers approved by the bank.
But thanks to cryptocurrency, all information about the distribution of funds and transactions will have hash data with a digital signature to avoid double spending.
Therefore, thanks to cryptocurrency, everyone should be able to buy from anyone with unlimited transaction amounts and even make international transactions in minutes.
By eliminating the use of most personal information by implementing public and private key systems, cryptocurrencies have been able to create highly secure ecosystems with a high level of privacy.
And at first, Bitcoin was considered a very private cryptocurrency and an anonymous way to send money. But the community has realized that Bitcoin is not as anonymous as previously thought. But we will talk about that later.
Problems with cryptocurrency
Cryptocurrency is a new field, and with every new project that hits the market, developers find new challenges and opportunities for improvement.
But if we look at the matter realistically, we have to admit that most cryptocurrencies are risky and quite difficult to use. You may not be hearing this for the first time, but the cryptocurrency market is in a "Wild West" phase.
Of course, there are hackers and scammers. There are also usability issues that prevent the general public from using cryptocurrencies. And of course, very volatile prices don't help.
In terms of security and privacy, cryptocurrencies are rated based on the strength of distributed networks and the degree to which a person can maintain their identity and transactions.
A blockchain built with a proof-of-work protocol can be extremely robust in terms of security as long as it has enough nodes to protect against 51% attacks.
Many post-bitcoin altcoins have failed here.
There have been a few 51% attacks recently that have actually succeeded. The last one was completed in August 2021 when Bitcoin SV had this problem. According to some insiders, the first reorganization was around 100 blocks and 570,000 transactions were reversed. After an attack, the stolen value can increase in value by about 5% of the original value.
In 2019, Bitcoin Gold (BTG) was hacked on two different dates between January 23rd and 24th with a 6-hour period. The first cost $19,000 and removed 14 blocks and added 13. The second cost over $53,000 and removed 15 blocks and added 16.
If some cryptocurrencies can fail in terms of security, at least they are anonymous, right?
Well, not really. This is because cryptocurrencies offer more control and privacy, but are not 100% anonymous.
Note that every transaction is permanently recorded in a public ledger containing public addresses.
Governments are also highly suspicious of cryptocurrencies due to reports of their use in illegal activities. So they started working with cyber security companies to monitor and track cryptocurrency transactions.
For example, on October 19, 2019, an American cybersecurity company called SipperTrac announced that its extensive platform allows customers to track more than 87% of the transaction volume of the top 100 cryptocurrencies such as Ether, Tether, Bitcoin Cash, and Litecoin. . This means that the authorities can use surveillance methods not only for criminals, but also for ordinary people.
Also, due to AML and KYC regulations, most crypto exchanges and wallets require their users to go through self-identification processes. This means that a public address can be linked to a person's wallet and identity.
But isn't Bitcoin anonymous?
Bitcoin was considered a privacy-preserving crypto that uses bitcoin addresses that cannot be linked to real individuals. But being a public blockchain, it was easy to observe the public address and transaction usage, and identify relationships with individuals.
Additionally, when nodes publish transactions to the blockchain, they reveal their own IP address.
Bitcoin Security and Privacy
Bitcoin security is based on a block in a distributed ledger. Each block contains information about each previous block. That way, when a user makes a transaction, the node that writes the transaction can immediately see where the money came from.
After confirming the origin, the transaction is transferred to a new block. Miners are always adding new blocks to a blockchain that has many blocks. And if an attacker tries to create a new chain that deviates from the legitimate blockchain, the PoW algorithm must complete the puzzles to add new blocks to the fork.
For a fork to become the main blockchain, it must execute an algorithm faster than the entire community to find the longest chain.
While a resource hacker might be lucky enough to add a few blocks, it is impossible to generate the amount of computing power needed to bypass legitimate nodes.
What happens when a transaction is written to a fork?
Well, nothing! Because accidental or malicious forks can occur, to avoid double spending, once a transaction is added to the blockchain, it must receive multiple confirmations until it becomes permanent and irreversible.
The first confirmation is the Miner, which transfers the transaction to the Internet. Subsequent confirmations come in blocks that include that transaction, as they have done throughout blockchain history. Therefore, if a transaction is saved in a fork, it will not be included in the main block.
From a privacy perspective, Bitcoin can be considered a pseudo-currency in which a public address replaces a person's identity. A block is public and contains the coin's transaction history since its creation.
But the privacy of submitted pseudonyms is somewhat compromised by KYC and AML regulations. Additionally, services such as Chainalysis, CipherTrace, and Elliptic are currently demystifying blockchains to detect money laundering, fraud, and compliance violations.
And in response to Bitcoin's deteriorating privacy, coining/mixing services like CoinJoin have been created to improve anonymity in Bitcoin.
In CoinJoin, users create different transactions in small amounts at different times, transferring ownership of their coins and making it difficult to track each transaction. Adding to the problem, this process is repeated between different users.
However, the mixture of parts has its disadvantages. According to a 2017 study, 67% of CoinJoin transactions were traceable to researchers, largely because each transaction had an average of only 2-4 participants.
Welcome to Privacy Coins
As work on the privacy of Bitcoin is still ongoing, other developers have taken the initiative to create cryptocurrencies to support private transactions and call them privacy coins.
Here are some interesting examples of established privacy coins.
- monero
- edges
- Zcash;
- a dash
- Comodo
The best coins for privacy
Monero (XMR) is an anonymous digital exchange that resists blockchain analytics. It is considered by many to be the leading cryptocurrency when it comes to privacy.
Monero's goal is to create a fully decentralized digital currency where funds are processed and not tied to public addresses.
The coin uses a form of PoW called the Crypto Knight Hashing Algorithm, which uses hidden addresses, ring signatures, and a system to share transaction data. Thanks to this protocol, the quantity and destination information is hidden in the transactions.
Another feature of Monero is that it has no fixed block size limit, so it theoretically supports 1700 TPS.
Additionally, Monero does not have the option of transparent transactions; So no one knows what the current offering is, and it's only a $4.61 billion market cap estimate.
One of the main problems with Moneero is that if someone manages to break the privacy protocol, all transaction data will be publicly available. This happened between 2014 and 2016.
Additionally, in 2018, researchers took it upon themselves to analyze the Monero blockchain and were able to anonymize 62 percent of Monero transactions. And in 2020, the IRS awarded $500,000 contracts to Chainalysis and Integra to build a tracking tool for Monero, with each company receiving $125,000 if successful.
On the other hand, Monero has been a favorite cryptocurrency of the dark markets in recent years due to its main purpose of protecting the privacy and popularity of users.
Some crypto exchanges have removed privacy coins due to this type of privacy and regulatory pressure to ensure compliance with anti-money laundering regulations. However, regulations governing privacy controls vary from state to state.
Edge (XVG)
Verge is a private digital currency that does not rely on cryptographic techniques, but uses various anonymity-oriented networks such as TOR and I2P. It uses TOR to send messages over an anonymous distributed network of nodes created by an international group of volunteers, and encrypts the data via I2P before sending it over the global network.
Verge uses a public ledger to verify transactions without tying them to IP addresses or other identifying information. It has unique features such as atomic swaps or fast transactions, can support 100 TPS, and has a market capitalization of over $170.75 million.
Zcash (ZEC)
Zcash is an open source cryptocurrency that uses the core code of Bitcoin and a variation of the PoW algorithm, which is an interactive topic with no knowledge.
Zk-SNARK refers to the constructive proof that someone has access to certain information without revealing the secret key and without interaction between the verifier and the verifier. However, decentralization is questionable as the voting system also allows some nodes to be excluded.
The goal of Zcash was to create a fungible altcoin that would not lose value due to usage history while also providing maximum privacy.
By making the parts movable, one part can easily replace another to limit the applicant's ability to identify and identify their owners.
Zcash supports 75 TPS and has a market cap of $2.223 billion.
However, Zcash is not private by default, which undermines the concept of a privacy coin. Additionally, in 2018, researchers were able to link 69% of transactions secured by Zcash to founders and miners.
a dash
Dash is a decentralized open source cryptocurrency derived from Litecoin and uses the PoW algorithm.
The main goal of Dash developers is to achieve mass adoption. It is now already accepted by some legitimate traders. And through a third party, he can count directly on FIAT and transfer funds to MasterCard or Visa credit cards.
It supports 35 TPS and has a market cap of $1.14 billion.
Dash offers a transparent transaction option and a private transaction option.
However, the high level of transparency offered by Dash is questionable. PirvateSend is the simplest coin mixing service managed by masternodes. In addition, there have been several complaints that the entry process is too slow.
Komodo (KMD)
Comodo is a lesser-known private cryptocurrency that derives from Zcash and uses zk-SNARK. The developers are said to have implemented a better build verification algorithm for security, but Comodo still has the same limitations compared to private Zcash transactions.
Some of Comodo's privacy enhancements include purchasing new currencies on Comodo's blockchain in terms of anonymity and decentralized exchange while remaining anonymous.
Comodo in 2010. It reached 20,000 TPS in 2018 and the developers are aiming to reach 1 million TPS. It currently has a market capitalization of $54.3 million.
How legal are they?
Recently, the rules have started to change and it seems that this type of cryptocurrency may be banned in some regions. However, they are still available and legal in the United States.
In contrast, countries such as South Korea and Japan have completely banned the trading and holding of private funds, eliminating the possibility of financial crimes or terrorist financing.
For example, Bittrex, a leading cryptocurrency exchange, removed Monero and Zcash from its platform in 2021.
Kraken did the same in November 2021, according to the guidelines of the UK Financial Markets Regulator.
How to be completely anonymous online in the world of cryptocurrencies?
Although they provide a high level of privacy, even privacy coins cannot anonymize your identity.
And the false argument that if no one has anything to hide, then there is no need to hide one's identity, is fundamentally wrong. The UN Declaration of Human Rights recognizes financial privacy as one of the basic human rights.
In addition, Amplifi CEO Justin Tebb said: “Too much focus on negative uses of anonymity on any platform can lead to the risk of restricting the privacy of all users. In other words, ensuring freedom is healthy anonymity for everyone.
So, to protect your online privacy when using cryptocurrencies, you should also consider the following tips when using private coins.
- Browse the Internet in incognito mode. The most basic level of anonymity is to ensure that your browser does not store cookies, temporary internet files or browsing history. Browse the web in incognito mode or make sure you set your browser to never allow cookies or cache files.
- Выкарыстоўвайце TOR і VPN. TOR хавае ідэнтыфікацыйныя дадзеныя карыстальнікаў і інтэрнэт-актыўнасць ад маніторынгу і аналізу трафіку. І VPN шыфруе трафік вашай машыны ў кропцы выхаду з сеткі VPN. Але схаванне вашага IP-адраса не азначае, што вы цалкам нябачныя. Такім чынам, дадатковы ўзровень абароны з дапамогай антывіруса, абароны ад шкоднасных праграм і брандмаўэра павысіць вашу бяспеку.
- Пазбягайце раскрыцця любой асабістай інфармацыі. KYC і іншыя працэсы ідэнтыфікацыі карыстальнікаў цэнтралізаваных біржаў і вэб-кашалькоў таксама ствараюць уразлівасці для вашай прыватнасці. Лепшы спосаб захаваць вашу канфідэнцыяльнасць у свеце крыптавалют - купляць праз аплату крыптавалютай або P2P. Захаванне стрыманага профілю - гэта таксама супрацьлегласць уплыву на криптовалюту. Таму ніколі не публікуйце свой улоў у сацыяльных сетках.
- Пазбягайце паўторнага выкарыстання адрасоў. Выкарыстоўвайце кашалькі, якія ствараюць новыя публічныя адрасы для кожнай уваходнай транзакцыі, і пераканайцеся, што гэтая функцыя ўключана. Ніколі не выкарыстоўвайце адрас з папярэдняй транзакцыі і заўсёды стварайце новы, таму што камусьці будзе цяжка ўсталяваць шаблон пры спробе знайсці ваш бізнес.
- Выкарыстоўвайце CoinJoins без даверу. Trustless CoinJoins прапануюць больш высокі ўзровень бяспекі, чым традыцыйныя цэнтралізаваныя злучальнікі. Паслугі адвольнага цэнтралізаванага змешвання патрабуюць даверу трэцяга боку, таму вы можаце страціць свае грошы, якія могуць быць скрадзены, выкрадзены або захоплены ўрадам. З ненадзейнымі CoinJoins, нават калі пулы размешчаны на каардынуючых серверах, шыфраванне прадухіляе крадзеж грошай. Яны таксама праводзяць масавыя транзакцыі з вялікай колькасцю карыстальнікаў і запускаюць некалькі змешаных цыклаў.
Паведамленне ប្រ្រង្រ្រ្រ្រ្រ прыватнасць супраць. бяспека ўпершыню з'явілася на Coindoo.
