Skip to main content

Is Bitcoin fully anonymous?



Bitcoin is not entirely anonymous. Each user has public address that can be tracked theoretically, through proper network analysis.    

Bitcoin are stored in wallet and wallet have your personal data.

When we transfer bitcoin, a message is broadcast In public about the transaction, we declare that bitcoin in been exchange so that miner can confirm our transaction and put it in the bitcoin blockchain network. This data is publicly broadcast and permanently stored on the bitcoin blockchain which has the address from where it came from and amount transfer.

Using this hacker can reach to your wallet and get all personal detail, amount of bitcoin you have, and also have access to see your future transaction.

To remain private though, this thing bitcoin mixing was introduced.

How bitcoin mixer works?

How it maintains our privacy?

That will be explained in the next blog.

Thanks for reading the content.
If you like the content share it with your friends.
For getting notified for new blog. Subscribe our Blog.

See you time , until then peace out.


Comments

Popular posts from this blog

Hustle

The innate hunger to build,create,do something & try. Hustle isn't just working on the things you like,it means doing the things you don't enjoy so you can do the things you love. Hustle:The ability to make things happen in light of knowing,how to get there ,but operate with the general principle that action breed results. Hustle stands for: H - How U - U  S -  Survive T -  The L - life  E - Everyday Some days I'm Humble. Some days I  Struggle. But everyday I Hustle. Remember Every Boss started as a worker.

TCP Segment

A TCP segment is made up of a TCP header and a data section. Source Port :  A source port is a high numbered port chosen from a special section of ports known as ephemeral ports. A source port is needed so that when the web server replies, the computer making the original request can send this data to the program that was actually requesting it. It is in this way that when it web server responds to your requests to view a web page that this response gets received by your web browser and not your word processor. Destination Port : port on which the client in request the data( The destination port is the port of the service the traffic is intended for ) Sequence Number :This is a 32-bit number that's used to keep track of where in a sequence of TCP segments this one is expected to be.There are limits to the total size of what we send across the wire. In Ethernet frame, it's usually limited in size to 1,518 bytes, but we usually need to send way more data than that. At the transp...

Troubleshooting and debugging

Troubleshooting is the process of identifying, analyzing, and solving problems.  Debugging is the process of identifying, analyzing, and removing bugs in a system. We sometimes use troubleshooting and debugging interchangeably.  But generally, we say troubleshooting when we're fixing problems in the system running the application, and debugging when we're fixing the bugs in the actual code of the application. Debuggers let us follow the code line by line, inspect changes in variable assignments, interrupt the program when a specific condition is met, and more. System calls are the calls that the programs running on our computer make to the running kernel.   A reproduction case is a way to verify if the problem is present or not. Where to check for log file in OS? On Linux , you'd read system logs like /var/log/syslog and user-specific logs like the .xsession-errors file located in the user's home directory. On MacOs , on top of the system logs, you'd go through...