Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

At some point, Bob will want to spend the coins on something that he needs. At that point, you'll be able to trace the whole chain of transactions and know that Bob got the coins from Alice. Sure, you won't know that Alice transferred the private keys to Bob, but you'll still see a chain of transactions that starts with money in a wallet associated with Alice and ends in a wallet associated with Bob. The private key transfer doesn't achieve anything at all: Bob could just as easily have opened a new wallet and asked Alice to transfer money there instead of his known wallet, nothing in the analysis would have changed.




True, but only if you monitor Bobs purchases. Funds are anonymous until you see them leave network. And that might be years or decades in the future. And one sale/purchae on uncontrolled exchange breaks the chain.

The chain is unbroken. If at any point you identify the owner of a wallet, you then find out the full transaction history of that person. That is the problem with putting all of the data in an append-only ledger that is pseudonymous.

Yeah, try to tracm down chain that went through russian crypto exchange wallet. Then Thailand then Venezuela.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: