Hacker News new | past | comments | ask | show | jobs | submit login

The network doesn't automatically obfuscate transactions, but it's easy to do using tumbling services.



If the FBI were following a trail involving my wallet, I would also want to avoid being linked to the tumbling services.


I suppose the question is how recognizable are tumbling services? Do they create new wallets regularly, and does the resulting traffic leave a fuzzy line between what is "in" the service and what is "out"? It could be that using a tumbling service looks fairly similar to giving money to somebody/somebodies who themselves uses the service.




Consider applying for YC's Spring batch! Applications are open till Feb 11.

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: