In January 2021, a dissident in Belarus received a Bitcoin donation from a supporter abroad. The donor meant well — traditional banking channels had been frozen by the Lukashenko regime, and cryptocurrency seemed like the perfect workaround. But...
Learning Objectives
- Explain the transparency paradox: why cryptocurrency is often LESS private than cash despite its pseudonymous reputation
- Describe how chain analysis firms trace transactions and de-anonymize users through clustering heuristics
- Compare privacy technologies (Monero's ring signatures, Zcash's zk-SNARKs, Tornado Cash's mixing) on effectiveness and tradeoffs
- Analyze the legal and ethical implications of the Tornado Cash sanctions for open-source code and privacy rights
- Evaluate both sides of the privacy debate: the right to financial privacy vs. the need for anti-money laundering enforcement
In This Chapter
- The Most Transparent Financial System Ever Built — And Why That's Not Always Good
- 31.1 The Transparency Paradox
- 31.2 Chain Analysis: How Your Transactions Are Traced
- 31.3 Privacy Coins: The Technical Countermeasures
- 31.4 Mixing and Tumbling: Protocol-Level Privacy for Transparent Chains
- 31.5 The Tornado Cash Case: When the Government Sanctioned Code
- 31.6 The Privacy Debate: Both Sides
- 31.7 CBDCs and the Surveillance Risk
- 31.8 Privacy-Preserving Compliance: A Middle Path?
- 31.9 The Philosophical Question: Should Money Be Private?
- 31.10 Summary and Bridge to Chapter 32
- Key Terms Glossary
Chapter 31: Privacy, Surveillance, and the Paradox of Transparent Money
The Most Transparent Financial System Ever Built — And Why That's Not Always Good
In January 2021, a dissident in Belarus received a Bitcoin donation from a supporter abroad. The donor meant well — traditional banking channels had been frozen by the Lukashenko regime, and cryptocurrency seemed like the perfect workaround. But within weeks, the dissident was arrested. The regime's security services, aided by a blockchain analytics firm, had traced the donation from the exchange where it was purchased, through two intermediate wallets, to the dissident's phone. Every hop was recorded permanently on a public ledger that anyone — including authoritarian governments — could read.
That same month, halfway around the world, the FBI was using the exact same transparency to trace ransomware payments to the DarkSide group that had shut down the Colonial Pipeline. The same property of Bitcoin that endangered the Belarusian dissident enabled law enforcement to recover $2.3 million in ransom payments.
This is the paradox at the heart of this chapter. Bitcoin and most public blockchains create the most transparent financial system in human history. Every transaction, from the genesis block to the one confirmed five minutes ago, is visible to anyone with an internet connection, permanently and immutably. For all the popular mythology about cryptocurrency being the money of criminals and the dark web, the reality is almost exactly the opposite: cryptocurrency is, in many ways, less private than the cash in your wallet.
A twenty-dollar bill does not record who held it before you. It does not remember what it was spent on. It leaves no permanent, searchable, publicly accessible trail. Bitcoin does all of these things.
This chapter explores the full landscape of privacy and surveillance in the cryptocurrency ecosystem. We will examine how chain analysis firms have built a multi-billion-dollar industry around tracing supposedly anonymous transactions. We will study the technical countermeasures — privacy coins like Monero and Zcash, mixing protocols like Tornado Cash — and evaluate how effective they actually are. We will confront the legal earthquake triggered when the US government sanctioned a smart contract for the first time. And we will wrestle with the philosophical question that underlies it all: should money be private?
There are no easy answers here. The same transparency that catches ransomware gangs also endangers political dissidents. The same privacy tools that protect activists also shelter money launderers. If you finish this chapter with a clear, uncomplicated opinion on where the line should be drawn, you probably have not thought about it hard enough.
31.1 The Transparency Paradox
Pseudonymity Is Not Anonymity
The single most important concept in this chapter — and arguably the most misunderstood concept in all of cryptocurrency — is the distinction between pseudonymity and anonymity.
Anonymity means that your identity is completely unknown. A truly anonymous transaction would leave no trace connecting it to you whatsoever. Cash transactions, in most circumstances, approach this standard. When you hand a ten-dollar bill to a street vendor, there is no record of that exchange in any database.
Pseudonymity means that you operate under a consistent false name — a pseudonym. Your actions are linked to each other, but not (in theory) to your real-world identity. Bitcoin operates on this model. Your transactions are all linked to your public address (the pseudonym), but that address is not, by default, attached to your legal name.
The critical insight is that pseudonymity is far weaker than anonymity, because if anyone ever connects the pseudonym to the real person, the entire history of actions under that pseudonym is retroactively exposed. When you used the pseudonym "Dread Pirate Roberts" on the Silk Road, every transaction you ever made was linked to that name. Once the FBI identified Ross Ulbricht as the person behind the pseudonym, they gained access not to a single transaction but to the complete financial history associated with that identity.
💡 Key Insight: Pseudonymity is like wearing a mask at a party where every conversation is recorded. The mask hides your face, but if anyone pulls it off, the recordings reveal everything you said all evening.
The Permanent, Public Ledger
Consider what the Bitcoin blockchain actually records for each transaction:
- Sender address(es): The input addresses from which Bitcoin is being spent
- Recipient address(es): The output addresses receiving the Bitcoin
- Amount: The exact quantity of Bitcoin transferred
- Timestamp: When the transaction was confirmed
- Transaction fee: How much was paid to miners
- Script data: The conditions under which the output can be spent
All of this information is:
- Public: Anyone can access it without permission
- Permanent: It cannot be deleted or modified
- Searchable: Block explorers like Blockchain.com and Blockstream.info let anyone search by address, transaction ID, or block number
- Global: No jurisdiction can prevent access to the data
Compare this to traditional banking. Your bank knows your transactions, certainly. But your bank's database is private. A stranger cannot look up your account. Even law enforcement requires a subpoena or court order. The bank can comply with "right to be forgotten" regulations. The data is siloed by institution and jurisdiction.
Bitcoin has none of these protections. Its entire transaction history is, by design, a public good. The blockchain must be transparent for the consensus mechanism to work — nodes need to verify that transactions are valid, that coins are not being double-spent, that the rules are being followed. Privacy was not a design goal; verifiability was.
How Addresses Get Linked to Identities
If Bitcoin addresses are just strings of characters, how do they get connected to real people? Through a surprisingly large number of pathways:
Exchange KYC (Know Your Customer). This is the single largest source of identity linkage. When you create an account on Coinbase, Binance, Kraken, or any regulated exchange, you provide your legal name, government ID, and often a selfie. Every deposit address and withdrawal address associated with your account is now linked to your identity in the exchange's database. And exchanges share this data with law enforcement pursuant to legal process — and increasingly, proactively.
IP Address Logging. When you broadcast a transaction to the Bitcoin network, the node that first relays it can log your IP address. While this is not definitive (you might be using a VPN or Tor), it provides a data point that investigators can correlate with other information.
Address Reuse. Using the same Bitcoin address for multiple transactions links all of those transactions to the same entity. Best practice is to generate a new address for every transaction (HD wallets do this automatically), but many users do not follow this practice.
Social Media and Web Activity. People post their Bitcoin addresses on Twitter for tips, on GoFundMe pages for donations, on forums for reputation building. A single public posting permanently links that address to a known identity.
Merchant Records. When you buy something from a merchant using Bitcoin, the merchant knows your shipping address and the Bitcoin address you paid from. Now those are linked.
Metadata and Behavioral Patterns. Transaction timing (do they consistently transact during US business hours?), amounts (round numbers in a particular currency suggest a user in that country), and spending patterns all provide clues that narrow down the identity space.
⚠️ Warning: Even a single moment of carelessness — one address reused, one exchange deposit without a VPN, one social media post with an address — can retroactively compromise the privacy of hundreds of past transactions. The permanent nature of the blockchain means that operational security must be perfect forever, because the data will be there waiting when a mistake is eventually made.
A Concrete Example
Consider a user we will call Alice. Alice buys 1 BTC on Coinbase (address linked to her identity). She withdraws to her personal wallet (address A1). She then sends 0.5 BTC to a new address (A2) that she uses to buy a VPN subscription. She sends 0.3 BTC to another address (A3) to donate to a political organization. She sends 0.15 BTC to yet another address (A4) to buy goods on a darknet market. She keeps 0.05 BTC as change in a fifth address (A5).
Alice believes she has some privacy because she used different addresses. But:
- Coinbase knows Alice owns A1 (KYC records)
- The transaction from A1 to A2, A3, A4, and A5 is on the public blockchain
- Because A2, A3, A4, and A5 all received funds from A1, a chain analysis firm can cluster them as likely belonging to the same entity
- The change output to A5 further confirms common ownership (we will explain this technique shortly)
- Now Alice's VPN purchase, political donation, and darknet purchase are all linked to her real identity
Alice's mistake was not in using cryptocurrency — it was in assuming that pseudonymity provided meaningful privacy when the blockchain permanently records the flow of funds.
31.2 Chain Analysis: How Your Transactions Are Traced
The Chain Analysis Industry
A multi-billion-dollar industry has emerged around the single proposition that blockchain transparency can be systematically exploited. The two dominant firms are Chainalysis (founded 2014, valued at over $8 billion as of its 2022 funding round) and Elliptic (founded 2013, acquired by Galaxy Digital in 2024). Other significant players include CipherTrace (acquired by Mastercard), Crystal Blockchain, and Nansen.
These companies sell software platforms to law enforcement agencies, financial institutions, and compliance departments. Their tools ingest the entire public blockchain, apply sophisticated heuristics to cluster addresses, and overlay identity information from exchanges, public records, and intelligence sharing. The result is a searchable map of the financial flows of the entire cryptocurrency ecosystem.
Chainalysis alone has contracts with the IRS, FBI, DEA, Secret Service, and dozens of other US government agencies. Its Reactor tool allows investigators to visualize transaction flows, identify clusters of addresses belonging to the same entity, and flag addresses associated with known illicit services (darknet markets, ransomware groups, sanctioned entities).
📊 By the Numbers: Chainalysis reported in 2023 that only 0.34% of all cryptocurrency transaction volume was associated with illicit activity. The company's own success in tracing funds may be one reason — criminals are increasingly aware that Bitcoin is not as anonymous as they thought.
Core Heuristics
Chain analysis firms rely on several well-established heuristics — rules of thumb that are not always correct but are accurate enough, in combination, to build compelling cases.
Common Input Ownership Heuristic. When a Bitcoin transaction has multiple inputs (spending from multiple addresses), it is overwhelmingly likely that all input addresses belong to the same entity. This is because creating a transaction with inputs from different addresses requires the private keys for all of those addresses. While multi-signature transactions and CoinJoin break this assumption, it holds true for the vast majority of ordinary transactions.
If addresses A1, A2, and A3 are all inputs to a single transaction, chain analysis firms cluster all three as belonging to one entity. If any one of those addresses has been identified (say, A1 was used for a Coinbase deposit), then A2 and A3 are also attributed to that entity.
Change Output Analysis. Bitcoin transactions typically consume entire "unspent transaction outputs" (UTXOs). If you have a UTXO worth 1.0 BTC and you want to send 0.3 BTC to someone, the transaction creates two outputs: 0.3 BTC to the recipient and 0.7 BTC back to yourself as "change." Identifying which output is the payment and which is the change reveals the sender's new address.
Several signals help identify change outputs:
- Round number heuristic: If one output is a round number (0.3 BTC) and the other is irregular (0.6997 BTC), the round number is likely the payment and the irregular amount is the change.
- Wallet fingerprinting: Different wallet software creates transactions with different structures. If the change output uses the same address format as the inputs, it is likely the sender's change.
- Fresh address: Change is often sent to a newly generated address with no transaction history.
Temporal Analysis. Transactions that occur within tight time windows — especially immediately sequential transactions — often indicate automated processes or single users moving funds.
Behavioral Clustering. Users tend to exhibit consistent patterns: they transact at certain times of day, they use specific wallet software, they interact with the same set of services. Over time, these patterns form a behavioral fingerprint that aids in attribution even without direct identity links.
Real-World Successes
The effectiveness of chain analysis is not theoretical. A growing list of high-profile criminal cases demonstrates its power:
Silk Road (2013). The FBI's investigation of the Silk Road darknet marketplace relied on both traditional investigation and blockchain analysis to trace Bitcoin flows between the marketplace's hot wallet and servers operated by Ross Ulbricht. While the initial identification came from other investigative methods, blockchain analysis provided the financial evidence needed for prosecution.
WannaCry Ransomware (2017). After the WannaCry ransomware attack that infected over 200,000 computers across 150 countries, chain analysis firms tracked the three Bitcoin addresses that collected ransom payments. When the attackers eventually moved funds through ShapeShift (a cryptocurrency exchange), the transactions were traced to North Korean-linked wallets. The entire flow of funds was visible on the public ledger.
Bitfinex Hack Recovery (2022). In one of the largest cryptocurrency seizures in history, the DOJ recovered over $3.6 billion in Bitcoin stolen from the Bitfinex exchange in 2016. The married couple who laundered the funds (Ilya Lichtenstein and Heather Morgan) used a complex web of wallets, mixing services, and darknet market deposits to obscure the trail. Chainalysis was able to trace the funds through this labyrinth over the course of years — a task made possible only by the permanent, public nature of the blockchain.
Colonial Pipeline (2021). We will examine this case in detail in Case Study 2. The FBI recovered the majority of the $4.4 million ransom paid to the DarkSide ransomware group, demonstrating that even sophisticated criminal organizations cannot easily hide behind Bitcoin's pseudonymity.
The Limits of Chain Analysis
Chain analysis is powerful but not omnipotent. Several limitations constrain its effectiveness:
Attribution Confidence. Heuristics produce probabilistic, not certain, attributions. The common input ownership heuristic fails for CoinJoin transactions and multi-signature wallets. Change output analysis can be deliberately confused by creating fake change outputs. Courts are increasingly scrutinizing the confidence levels of chain analysis evidence.
Privacy Technologies. As we will see in the next section, privacy coins and mixing protocols specifically target the heuristics that chain analysis depends on. Monero, in particular, has proven highly resistant to tracing.
Off-Chain Transactions. Transactions that occur within exchanges (internal transfers between accounts) or on Layer 2 networks (the Lightning Network) may not appear on the base blockchain, creating gaps in the chain analysis firm's view.
International Cooperation. Chain analysis can trace funds to an exchange in a jurisdiction with weak or uncooperative AML enforcement, at which point the trail may go cold. Not all exchanges comply with data requests, and not all countries have mutual legal assistance treaties that facilitate cross-border investigations.
🔗 Connection to Chapter 29: The regulatory framework we examined in Chapter 29 — particularly KYC/AML requirements for exchanges — is the critical complement to chain analysis. Without exchange KYC, chain analysis can trace funds to an address but cannot identify the person. The two work in tandem: regulation forces identity collection at on-ramps, and chain analysis traces funds between on-ramps.
31.3 Privacy Coins: The Technical Countermeasures
The transparency of Bitcoin is not an inevitable property of all cryptocurrencies. A category of projects collectively known as privacy coins was developed specifically to provide transaction privacy at the protocol level. The two most significant are Monero and Zcash, which take fundamentally different approaches to the same problem.
Monero: Privacy by Default
Monero (XMR), launched in 2014, is the most widely used privacy cryptocurrency and takes the most aggressive approach: all transactions are private by default. There is no "transparent mode." Every Monero transaction hides the sender, recipient, and amount. Monero achieves this through three complementary technologies:
Ring Signatures. When you send a Monero transaction, your actual transaction input is mixed with decoy inputs (called "mixins") drawn from other transactions on the blockchain. The ring signature cryptographically proves that one of the inputs in the ring is the real one — but it is impossible for an outside observer to determine which. As of 2024, Monero uses a ring size of 16, meaning each transaction includes 15 decoy inputs alongside the real one. An observer sees 16 possible senders and cannot determine which is genuine.
The mathematical foundation is that a ring signature allows any member of a group to produce a valid signature on behalf of the group, without revealing which member actually signed. The verifier can confirm that a valid group member signed, but gains no information about which one.
Stealth Addresses. When you receive a Monero payment, the sender generates a one-time stealth address derived from your public address. This stealth address appears on the blockchain, but only the recipient can recognize it as belonging to them (using their private view key). An observer scanning the blockchain sees a stream of unique, seemingly unrelated addresses and cannot determine that multiple payments were sent to the same person.
Technically, the sender uses the recipient's public view key and public spend key to generate a unique one-time address via Diffie-Hellman key exchange. The recipient scans each transaction with their private view key to identify incoming payments.
RingCT (Ring Confidential Transactions). Implemented in 2017, RingCT hides the amounts of all transactions using Pedersen commitments — a cryptographic scheme that allows nodes to verify that inputs equal outputs (no coins created from nothing) without knowing the actual amounts. The mathematical properties of the commitment scheme allow addition and comparison without decryption.
The combination of these three technologies means that a Monero transaction reveals essentially nothing to an outside observer: the sender is hidden among decoys, the recipient address is a one-time construct, and the amount is encrypted. This is a fundamentally different privacy model from Bitcoin, where everything is visible by default.
💡 Key Insight: The critical design decision in Monero is that privacy is mandatory, not optional. This matters because optional privacy creates a "privacy set" problem — if only 5% of users use the privacy feature, then using it is itself a suspicious signal, and the anonymity set is small. When privacy is universal, every user contributes to every other user's privacy.
Effectiveness and Limitations. Monero's privacy has proven robust against chain analysis. In 2020, CipherTrace claimed to have developed Monero tracing tools for the US Department of Homeland Security, but the capabilities were limited and contested. Chainalysis has been more circumspect, acknowledging that Monero presents significantly greater challenges than Bitcoin. Academic research has identified some theoretical weaknesses in earlier versions of the ring signature implementation (particularly when the ring size was smaller), but the current protocol with ring size 16 and mandatory RingCT is generally considered to provide strong privacy.
However, Monero is not perfectly private. Metadata leaks (IP addresses, timing analysis), flawed implementations in wallets, and the inherent limitations of finite ring sizes all provide potential attack surfaces. The intersection of Monero with regulated exchanges also creates vulnerabilities — if you buy Monero on an exchange and withdraw it, the exchange knows your identity and the withdrawal transaction, which reduces the effective anonymity set for that initial hop.
Zcash: Optional Privacy via Zero-Knowledge Proofs
Zcash (ZEC), launched in 2016, takes a different architectural approach. Rather than making all transactions private by default, Zcash offers two types of addresses: transparent (t-addresses), which function exactly like Bitcoin addresses with full public visibility, and shielded (z-addresses), which use zero-knowledge proofs to hide transaction details.
The zero-knowledge proof system used by Zcash is called zk-SNARKs (Zero-Knowledge Succinct Non-Interactive Arguments of Knowledge). This is one of the most sophisticated cryptographic constructions deployed in production. A zk-SNARK allows a prover to convince a verifier that a statement is true — for example, "I own enough ZEC to make this payment, and the transaction balances" — without revealing any information beyond the truth of the statement itself.
In a shielded Zcash transaction:
- The sender, recipient, and amount are all encrypted
- A zk-SNARK proof accompanies the transaction, allowing network nodes to verify validity without seeing the details
- The proof is "succinct" (small in size) and "non-interactive" (does not require back-and-forth communication)
The resulting privacy is extremely strong — mathematically, a shielded Zcash transaction reveals zero information about the parties or amounts involved.
The Achilles' Heel: Optional Privacy. The fundamental weakness of Zcash's design is that shielded transactions are optional. In practice, the vast majority of Zcash transactions (historically over 85%) use transparent addresses. This creates several problems:
- Small anonymity set: The privacy of shielded transactions depends on the number of other users also using shielded transactions. A small shielded pool means less privacy for everyone in it.
- Suspicion signal: Using shielded transactions when most users do not is itself a signal that may attract scrutiny.
- Interaction leakage: When funds move between transparent and shielded addresses (called "shielding" and "deshielding"), the timing and amounts can leak information. If 1.5 ZEC enters a shielded address and 1.5 ZEC exits one an hour later, the link is obvious even though the shielded portion was cryptographically private.
Zcash has recognized this weakness and has been working to increase the adoption of shielded transactions, including making shielded-by-default the standard in newer wallet software. The Sapling upgrade (2018) and Orchard upgrade (2022) have also significantly reduced the computational cost of creating shielded transactions, removing a practical barrier to adoption.
Trusted Setup. Early versions of Zcash required a "trusted setup" ceremony — a process to generate the cryptographic parameters needed for zk-SNARKs. If the secret randomness used in the ceremony were compromised, an attacker could create counterfeit ZEC without detection. The original ceremony involved six participants who each contributed randomness, with the requirement that at least one participant had to be honest for the system to be secure. While there is no evidence the setup was compromised, the need for trust was philosophically uncomfortable for a trustless cryptocurrency. The Orchard upgrade moved to the Halo proving system, which eliminates the need for a trusted setup entirely.
Comparison Table: Privacy Properties
| Feature | Bitcoin | Monero | Zcash (Shielded) |
|---|---|---|---|
| Sender hidden | No | Yes (ring signatures) | Yes (zk-SNARKs) |
| Recipient hidden | No | Yes (stealth addresses) | Yes (zk-SNARKs) |
| Amount hidden | No | Yes (RingCT) | Yes (zk-SNARKs) |
| Privacy mandatory | No | Yes | No (optional) |
| Anonymity set | 1 (fully public) | 16 (ring size) | All shielded tx |
| Chain analysis resistant | Low | High | High (when shielded) |
| Regulatory acceptance | High | Low (many delistings) | Medium |
| Computational overhead | Baseline | Low-moderate | Moderate-high |
⚖️ Balanced View: Neither Monero nor Zcash provides perfect privacy. Monero's mandatory privacy creates a large anonymity set but relies on ring signatures with finite decoy sets. Zcash's zk-SNARKs are theoretically stronger but suffer from low adoption of the shielded feature. Both are under constant analysis by chain analysis firms and academic researchers, and both continue to evolve their protocols in response.
31.4 Mixing and Tumbling: Protocol-Level Privacy for Transparent Chains
Privacy coins build privacy into the protocol itself. But what about users of transparent chains like Bitcoin and Ethereum who want privacy after the fact? This is the domain of mixers (also called tumblers) — services or protocols that pool funds from multiple users and redistribute them in a way that breaks the transaction graph.
CoinJoin: Collaborative Mixing for Bitcoin
CoinJoin, proposed by Gregory Maxwell in 2013, is a technique for combining multiple Bitcoin transactions into a single transaction with many inputs and many outputs. If ten users each want to send 0.1 BTC, a CoinJoin transaction creates a single transaction with ten inputs and ten outputs, all of 0.1 BTC. An observer sees the transaction but cannot determine which input corresponds to which output.
CoinJoin works because Bitcoin transactions can have multiple inputs from different signers. Each participant signs only for their own input, meaning no participant needs to trust any other participant or any central coordinator with their funds.
Popular CoinJoin implementations include:
- Wasabi Wallet: A Bitcoin wallet that coordinates CoinJoin transactions using a Chaumian blind-signature protocol. A central coordinator facilitates the mixing but cannot steal funds or learn the mapping between inputs and outputs due to the blind signature scheme.
- JoinMarket: A decentralized CoinJoin market where "makers" offer liquidity for mixing and "takers" pay a small fee to mix their coins. This creates a marketplace for privacy.
- Whirlpool (Samourai Wallet): A CoinJoin implementation that enforces uniform output amounts and provides ongoing mixing through multiple rounds.
Effectiveness. CoinJoin provides meaningful privacy improvements but has several limitations. The anonymity set is limited to the participants in each mix round (typically 5-100 users). Multiple rounds of mixing are needed for strong privacy, which takes time and incurs fees. And the equal-output-amount requirement means that CoinJoin transactions are identifiable on-chain as CoinJoin transactions, even if the specific input-output mapping is hidden. Chain analysis firms can flag CoinJoin transactions and may treat them as suspicious.
Tornado Cash: Mixing for Ethereum
Tornado Cash was a decentralized, non-custodial mixing protocol on Ethereum that represented the state of the art in on-chain privacy until it was sanctioned by the US government in August 2022. Understanding how it worked is essential both for the technical concepts and for the legal precedent its sanctioning established.
Tornado Cash used zero-knowledge proofs to break the on-chain link between depositing and withdrawing funds. The protocol worked as follows:
-
Deposit. A user deposits a fixed amount of ETH (0.1, 1, 10, or 100 ETH) into the Tornado Cash smart contract, along with a cryptographic commitment (a hash of a secret note). The smart contract adds the commitment to a Merkle tree.
-
Wait. The user waits for other users to also deposit the same amount, growing the anonymity set. The longer they wait, the more deposits accumulate, and the larger the anonymity set becomes.
-
Withdraw. The user submits a zero-knowledge proof demonstrating that they know the secret corresponding to one of the commitments in the Merkle tree — without revealing which commitment. The smart contract verifies the proof and releases the funds to a new address. The withdrawal address has no on-chain connection to the deposit address.
The beauty of this design is that Tornado Cash never had custody of user funds. The smart contract was fully non-custodial — it simply held deposits until valid zero-knowledge proofs were submitted. There was no central operator who could steal funds, freeze accounts, or selectively censor transactions. The protocol was, in the truest sense, just code running on Ethereum.
Before its sanctioning, Tornado Cash had processed approximately $7.6 billion in deposits. While the Treasury Department's Financial Crimes Enforcement Network (FinCEN) and OFAC estimated that a significant portion of these flows were related to illicit activity (including funds stolen by North Korea's Lazarus Group), the majority of users were ordinary individuals seeking financial privacy.
📊 By the Numbers: A Chainalysis analysis found that approximately 30% of ETH sent to Tornado Cash came from sanctioned or stolen sources. This means that 70% came from users with no known illicit connection — a majority of legitimate privacy-seekers.
Other Mixing Approaches
Centralized Mixers. Before CoinJoin and Tornado Cash, the primary mixing option was centralized mixing services — websites where you sent Bitcoin and received back different Bitcoin after the service shuffled funds. These required trusting the operator not to steal funds or keep logs. Many were scams or were later revealed to have cooperated with law enforcement. Centralized mixers are now largely obsolete, replaced by non-custodial alternatives.
Cross-Chain Bridges. Moving funds across blockchains (e.g., from Bitcoin to Monero and back) can break the transaction trail, as the two chains do not have a native link between them. This technique, sometimes called "chain hopping," has been used by both criminals and privacy-conscious users. Its effectiveness depends on the specific bridge mechanism and whether the bridge operator maintains records.
Lightning Network. Bitcoin's Layer 2 payment channel network provides some privacy benefits because intermediate routing nodes do not know the ultimate sender and recipient of a payment (they only know the previous and next hop). However, the opening and closing of Lightning channels are on-chain transactions, and sophisticated analysis of channel states can reveal information about payment flows.
31.5 The Tornado Cash Case: When the Government Sanctioned Code
On August 8, 2022, the US Treasury Department's Office of Foreign Assets Control (OFAC) took an action that sent shockwaves through the cryptocurrency industry, the open-source software community, and the civil liberties world. OFAC added Tornado Cash to its Specially Designated Nationals (SDN) list — the same sanctions list used for terrorists, drug traffickers, and hostile nation-states.
This was unprecedented. OFAC had sanctioned people before. It had sanctioned companies. It had even sanctioned cryptocurrency addresses. But it had never before sanctioned an autonomous smart contract — a piece of open-source code running on a decentralized network with no central operator, no CEO, no board of directors, and no off switch.
The Legal Action
OFAC's designation was based on the finding that Tornado Cash had been used to launder over $7 billion in cryptocurrency, including more than $455 million stolen by North Korea's Lazarus Group. The designation made it illegal for any US person to interact with Tornado Cash — depositing funds, withdrawing funds, or providing any service to the protocol.
The immediate consequences were swift and far-reaching:
- GitHub removed the Tornado Cash repository and suspended the accounts of its contributors
- Infura and Alchemy (Ethereum infrastructure providers) blocked RPC calls to Tornado Cash contract addresses
- Circle (USDC issuer) froze approximately $75,000 in USDC held in Tornado Cash contracts
- Aave and other DeFi protocols blocked addresses that had interacted with Tornado Cash
- Several developers' personal wallets received unsolicited small Tornado Cash deposits — potentially an attempt to "taint" their addresses and force them to violate sanctions simply by using their own wallets
The Developer Arrest
On August 10, 2022, just two days after the OFAC designation, Dutch authorities arrested Alexey Pertsev, a Russian national living in the Netherlands and one of Tornado Cash's core developers. Pertsev was charged with facilitating money laundering. In May 2024, a Dutch court convicted Pertsev and sentenced him to 64 months in prison.
The Pertsev case raised a question with enormous implications for open-source software development: Can a developer be held criminally liable for writing code that is later used for illegal purposes? The prosecution argued that Pertsev did not merely write neutral code — he actively maintained and promoted a tool he knew was being used for money laundering. The defense argued that code is speech, that Tornado Cash was a neutral tool like a VPN or encryption software, and that holding developers liable for users' actions would chill open-source development worldwide.
Two other Tornado Cash developers — Roman Storm and Roman Semenov — were charged by US federal prosecutors with conspiracy to commit money laundering, sanctions violations, and operating an unlicensed money-transmitting business. Storm's case went to trial in 2024-2025, raising many of the same legal questions in the US legal system.
The Constitutional Challenge
In September 2022, six individuals (represented by Coinbase-funded lawyers) filed suit against the Treasury Department, arguing that the OFAC designation was unconstitutional. The case, Van Loon v. Department of the Treasury, raised several fundamental legal questions:
Is a smart contract "property" that can be sanctioned? OFAC's authority under the International Emergency Economic Powers Act (IEEPA) allows it to sanction the "property" of designated persons. The plaintiffs argued that an autonomous smart contract, owned by no one, is not anyone's "property" and therefore falls outside OFAC's statutory authority.
Does sanctioning open-source code violate the First Amendment? Courts have previously held that code is speech (see Bernstein v. Department of Justice, which established that encryption source code is protected expression). If Tornado Cash's smart contracts are protected speech, then sanctioning them — making it illegal to interact with them — is a restriction on speech that must satisfy First Amendment scrutiny.
Was the process adequate? Sanctions designations are executive actions with limited due process. The plaintiffs argued that designating an ownerless protocol — which cannot petition for delisting, cannot negotiate compliance, and cannot be "un-sanctioned" in any practical sense — violated due process requirements.
In August 2023, a federal district court ruled against the plaintiffs, finding that OFAC had authority to designate Tornado Cash. However, in November 2024, the Fifth Circuit Court of Appeals partially reversed, finding that the specific smart contracts at issue were not "property" within the meaning of IEEPA because they were immutable, ownerless code that no person could control. The government sought further review, and the legal question remained unsettled as of early 2026.
⚖️ Balanced View: Reasonable people disagree sharply on the Tornado Cash sanctions. Those who support the action point to the hundreds of millions in stolen and laundered funds processed through the protocol. Those who oppose it argue that sanctioning code sets a dangerous precedent that could be used to restrict encryption, VPNs, Tor, or any privacy-enhancing technology. The legal questions raised — about the nature of autonomous code, about developer liability, about the boundaries of OFAC's authority — will shape technology policy for decades.
31.6 The Privacy Debate: Both Sides
The Tornado Cash case crystallized a debate that had been building for years. At its core is a question that admits no easy answer: Does the right to financial privacy outweigh the need for financial surveillance to prevent crime?
To evaluate this question honestly, we must take both sides seriously.
The Case FOR Financial Privacy
Privacy is a fundamental right. The Universal Declaration of Human Rights (Article 12), the US Fourth Amendment, the EU Charter of Fundamental Rights (Article 7), and numerous other legal instruments recognize privacy as a fundamental human right. Financial privacy is a subset of this broader right — your spending patterns reveal your political beliefs, religious practices, medical conditions, personal relationships, and intimate activities. A society that can see everything you spend money on can see almost everything about you.
Authoritarian governments exploit financial surveillance. In China, Russia, Belarus, Myanmar, Iran, and dozens of other countries, governments use financial control as a tool of political repression. Freezing bank accounts, blocking donations to dissidents, monitoring spending for signs of political disloyalty — these are not hypothetical threats but documented practices. For people living under authoritarian regimes, financial privacy is not a convenience; it is a survival necessity.
Surveillance creep is real. History shows that surveillance powers, once established for limited purposes, inevitably expand. The Patriot Act, passed in 2001 for counter-terrorism, was widely used for ordinary drug investigations within a decade. Bank Secrecy Act reporting thresholds, set at $10,000 in 1970 (approximately $80,000 in 2025 dollars), have never been adjusted for inflation, meaning they now capture routine transactions that were never intended to be reported. There is no example in history of a surveillance power being voluntarily relinquished by the state.
The cost of compliance falls on the innocent. KYC/AML compliance costs the global financial industry an estimated $274 billion per year. These costs are passed on to consumers through higher fees, reduced services, and financial exclusion. An estimated 1.4 billion adults worldwide are unbanked, many of them because KYC requirements are impossible to satisfy without government-issued identification that they do not possess. The surveillance regime meant to catch criminals disproportionately burdens the poor and marginalized.
Current surveillance regimes are not very effective. Despite hundreds of billions spent on compliance, the UN estimates that less than 1% of criminal financial flows are intercepted. The vast majority of money laundering occurs through traditional banking channels, not cryptocurrency. Several studies have found that the current AML regime has negligible impact on criminal activity while imposing enormous costs on legitimate users.
The Case AGAINST Financial Privacy (FOR Surveillance)
Money laundering enables serious crime. Drug trafficking, human trafficking, terrorism, corruption, sanctions evasion, and weapons proliferation all depend on the ability to move money without detection. Financial surveillance is not an abstract government power — it is a concrete tool that disrupts these activities. The ability to trace the flow of funds is often the most effective investigative technique available, because sophisticated criminals can evade physical surveillance but cannot avoid moving money.
Tax evasion undermines public services. Tax evasion deprives governments of revenue needed for education, healthcare, infrastructure, and social safety nets. The "tax gap" — the difference between taxes owed and taxes collected — is estimated at $600 billion per year in the US alone. Financial privacy, taken to its logical extreme, would make income verification and tax enforcement impossible, shifting the tax burden entirely onto wage earners whose income is reported by employers.
Sanctions enforcement requires financial tracking. Economic sanctions are a tool of international diplomacy that, however imperfect, serve as an alternative to military action. If sanctioned regimes (North Korea, Russia, Iran) can freely access the global financial system through privacy-preserving cryptocurrency, the effectiveness of sanctions — and the international order they support — is undermined. The $455 million in cryptocurrency stolen by North Korea's Lazarus Group and laundered through Tornado Cash was likely used to fund the country's nuclear weapons program.
Democratic legitimacy. In democratic societies, financial surveillance is authorized by democratically elected legislatures, subject to judicial oversight, and constrained by constitutional protections. The argument that "the government shouldn't be able to see financial transactions" implicitly rejects the democratic process that established these surveillance regimes. If the surveillance is excessive, the remedy is legislative reform, not technological circumvention.
The alternative is worse. A world of perfectly private money is a world where ransomware gangs operate with impunity, where child exploitation material is purchased without risk, where stolen funds can never be recovered, and where the powerful can evade accountability. Whatever the costs of the current surveillance regime, the costs of perfect financial privacy may be higher.
💡 Key Insight: Notice that both sides of this debate invoke real harms and real values. The privacy advocate is not wrong that financial surveillance enables authoritarianism. The surveillance advocate is not wrong that financial privacy enables crime. The question is not which concern is valid — both are — but how to balance them.
31.7 CBDCs and the Surveillance Risk
If the tension between privacy and surveillance in cryptocurrency is difficult, the emergence of Central Bank Digital Currencies (CBDCs) makes it urgent. CBDCs combine the digital traceability of cryptocurrency with the institutional power of the state, creating the potential for a financial surveillance apparatus unprecedented in human history.
What CBDCs Enable
A CBDC, as discussed in Chapter 22, is a digital form of sovereign currency issued directly by a central bank. Unlike cryptocurrency, which is decentralized and often pseudonymous, a CBDC is centrally controlled. The central bank manages the ledger, sets the rules, and — critically — can see every transaction.
In theory, a CBDC could be designed with strong privacy protections. In practice, the governments most actively developing CBDCs have shown little interest in privacy.
Consider what a fully deployed CBDC with minimal privacy protections would enable:
- Complete transaction visibility: The government could see every purchase by every citizen in real time — what you buy, when, where, and from whom.
- Programmable restrictions: Money could be programmed to expire (forcing spending), to be restricted to certain categories of goods, or to be disabled for certain individuals.
- Instant account freezing: Without the need for a bank as intermediary, the government could freeze any individual's funds instantly, without a court order.
- Social credit scoring: Spending data could be integrated into social scoring systems, with financial benefits or penalties based on purchasing behavior.
- Selective stimulus: Rather than sending universal stimulus checks, governments could target spending by demographics, geography, or behavior.
These capabilities may sound dystopian, but none of them are hypothetical. They are all features that have been discussed, prototyped, or deployed in connection with real CBDC projects.
China's Digital Yuan (e-CNY)
China's digital yuan, or e-CNY, is the most advanced CBDC project in the world and provides the clearest window into how CBDC surveillance might work in practice. Launched as a pilot in 2020, the e-CNY has been tested in over two dozen cities and processed hundreds of billions of yuan in transactions.
The People's Bank of China (PBOC) describes the e-CNY as offering "controllable anonymity" — a euphemism that reveals the design philosophy. Small transactions (below certain thresholds) may have some privacy protections, but the PBOC retains the ability to see all transactions and to de-anonymize any user when it determines there is a need. The e-CNY is designed to work with China's existing financial surveillance infrastructure, including its anti-money laundering systems and, potentially, its social credit framework.
The implications for Hong Kong pro-democracy activists, Uyghur Muslims, Tibetan Buddhists, Falun Gong practitioners, or any other group disfavored by the Chinese state are obvious. A CBDC with "controllable anonymity" gives the state a complete, real-time, permanent record of every financial transaction — a tool of political control that would have been the envy of any authoritarian regime in history.
The Western CBDC Response
The US Federal Reserve, the European Central Bank, and the Bank of England have all explored CBDC designs, and all have acknowledged the privacy tension. The ECB's "digital euro" project has explicitly stated that privacy is a design priority, proposing offline payment capabilities and tiered privacy levels. The Federal Reserve has been more cautious, with its 2022 discussion paper identifying privacy as a key design challenge without committing to specific protections.
However, the structural incentives are not encouraging. Governments have a clear interest in financial surveillance (for tax collection, sanctions enforcement, and law enforcement). They face pressure from regulatory agencies that have spent decades building AML/KYC infrastructure. And the political cost of implementing strong privacy protections — being accused of enabling crime and tax evasion — is high.
⚠️ Warning: The design decisions being made right now about CBDC privacy will shape financial surveillance for decades. Once a CBDC is deployed with weak privacy protections, it will be extremely difficult to add privacy retroactively — the surveillance infrastructure will have been built, the data will have been collected, and the institutional interests in maintaining access will be entrenched.
31.8 Privacy-Preserving Compliance: A Middle Path?
Is there a way to have both — to satisfy legitimate regulatory requirements while preserving meaningful financial privacy? A growing body of research and development suggests that this may be possible, using the same zero-knowledge proof technology that powers Zcash and Tornado Cash.
Zero-Knowledge Compliance
The core idea is simple in concept, though complex in implementation: use zero-knowledge proofs to demonstrate compliance without revealing the underlying data. Instead of showing the regulator your transaction history, you prove that your transaction history satisfies certain properties — that you are not on a sanctions list, that your funds did not originate from a designated illicit source, that your total transaction volume is below a reporting threshold — without revealing the actual transactions.
Several projects are exploring this approach:
Proof of Innocence. After the Tornado Cash sanctions, researchers proposed "proof of innocence" protocols that would allow Tornado Cash users to prove that their deposited funds did not originate from OFAC-sanctioned addresses. The user would generate a zero-knowledge proof demonstrating "my deposit came from an address that is not on this sanctions list" without revealing which address it came from. This would allow compliant users to use mixing protocols while satisfying sanctions requirements.
zkKYC. Several startups are developing zero-knowledge KYC protocols where a trusted third party verifies your identity once and issues you a cryptographic credential. You can then present this credential to services that require KYC, along with a zero-knowledge proof that the credential is valid, without revealing your identity to the service. The service knows that you have been KYC-verified by a trusted party, but does not know who you are.
Selective Disclosure. Zcash has proposed a "selective disclosure" feature where users of shielded transactions could generate viewing keys that reveal specific transactions to specific parties (regulators, auditors, tax authorities) without making transactions publicly visible. This provides a middle ground between full transparency and full privacy — transactions are private by default but can be selectively revealed when there is a legitimate need.
The Challenge of Implementation
These approaches face significant challenges:
Regulatory acceptance. Regulators are accustomed to being able to see everything. A system where compliance is verified through cryptographic proofs rather than data access requires a fundamental shift in regulatory philosophy. Most regulators have not yet engaged seriously with zero-knowledge compliance, and many are skeptical.
Trusted setup and governance. Many of these schemes require a trusted third party (for zkKYC) or a trusted dataset (for proof-of-innocence sanctions checking). Ensuring the integrity and governance of these trusted elements is a non-trivial problem.
Computational overhead. Generating zero-knowledge proofs is computationally expensive. While costs have dropped significantly (generating a Zcash shielded transaction now takes seconds rather than minutes), the overhead is still non-trivial, especially for complex compliance proofs.
User experience. Privacy-preserving compliance adds complexity to the user experience. Users must manage cryptographic credentials, generate proofs, and navigate systems that are significantly more complex than traditional KYC. Mass adoption requires making these systems as simple as taking a selfie for an exchange.
Despite these challenges, zero-knowledge compliance represents the most promising technical approach to resolving the privacy-surveillance tension. It aligns the interests of regulators (who want assurance that rules are being followed) with the interests of users (who want privacy for their legitimate transactions).
🔗 Connection to Chapter 2: The zero-knowledge proofs discussed here build directly on the cryptographic foundations covered in Chapter 2. The mathematical properties that make these proofs possible — the ability to prove knowledge of a secret without revealing it — are among the most profound and consequential results in modern cryptography.
31.9 The Philosophical Question: Should Money Be Private?
We have examined the technology, the law, and the policy. Now we confront the philosophical question that underlies all of them: Should money be private?
This question does not have a correct answer. It has a spectrum of positions, each with coherent arguments and uncomfortable implications. Let us map that spectrum.
Position 1: Total Transparency
At one extreme is the position that all financial transactions should be public. This is, in effect, what a fully transparent blockchain provides (minus the pseudonymity). Advocates argue that financial transparency eliminates corruption, tax evasion, and illicit finance. If everyone can see everyone's spending, there is nowhere for malfeasance to hide.
The uncomfortable implications: Total financial transparency means that your employer can see how much you donate to political organizations. Your ex-spouse can see where you spend your evenings. Your health insurance company can see that you bought cigarettes. Your government can see that you donated to a dissident group. In a society where financial transactions encode nearly every aspect of private life, total financial transparency is total surveillance.
Position 2: Regulated Transparency (Status Quo)
This is approximately the current system: financial transactions are private between parties, but the government can access them through legal process (subpoenas, court orders) and requires institutions to report suspicious activity. Banks see your transactions; the government can see them when it has sufficient justification.
This position acknowledges both privacy and accountability, but it is under pressure from both sides. Privacy advocates point out that the "legal process" constraint has eroded significantly — bulk data collection, national security letters without judicial oversight, and the third-party doctrine (which holds that you have no reasonable expectation of privacy in data shared with a third party like a bank) have hollowed out the protections. Surveillance advocates point out that criminals can still evade detection through cash, shell companies, and uncooperative jurisdictions.
Position 3: Privacy with Exceptions
This position holds that financial transactions should be private by default, with exceptions for specified law enforcement purposes under judicial oversight. This is closer to what many privacy-coin advocates and zero-knowledge compliance researchers envision — a system where everyday transactions are hidden from view, but where courts can compel disclosure in specific cases for specified reasons.
The challenge is implementation. How do you build a system that is private by default but breakable by the government when authorized? Any "backdoor" for law enforcement is also a backdoor for hackers, rogue employees, and authoritarian governments. The encryption debates of the 1990s (the Clipper Chip, key escrow) and 2010s (Apple vs. FBI) demonstrated the fundamental difficulty of building systems that are simultaneously secure and accessible to the government.
Position 4: Total Privacy
At the other extreme is the position that money should be completely private — that no one, including the government, should be able to see your financial transactions. This is the cypherpunk vision articulated by David Chaum, Timothy May, and the authors of the Cypherpunk Manifesto (1993): "Privacy in an open society requires anonymous transaction systems."
The uncomfortable implications: Total financial privacy means that ransomware gangs can collect payments without risk of tracing. Tax enforcement becomes voluntary. Sanctions become unenforceable. Child exploitation material can be purchased anonymously. The ability to "follow the money" — one of the most powerful tools for combating organized crime and corruption — is permanently lost.
A Framework for Thinking
Rather than advocating for a specific position, consider these principles as a framework for your own evaluation:
-
Proportionality. The level of financial surveillance should be proportional to the threat being addressed. Monitoring a suspected terrorist's transactions is more justified than monitoring every citizen's grocery purchases.
-
Accountability. Those who exercise surveillance powers should be accountable for how they use them. Unchecked, unaccountable surveillance — whether by governments or corporations — is dangerous regardless of the stated justification.
-
Reversibility. Privacy lost is almost impossible to recover. Surveillance regimes, once built, are almost impossible to dismantle. This asymmetry argues for caution in expanding surveillance powers — it is easier to add surveillance later than to remove it after the fact.
-
Technical feasibility. Technology is not infinitely malleable. Some positions on the spectrum may not be achievable in practice. A system that is both perfectly private and perfectly accessible to authorized law enforcement may be a mathematical impossibility, not a policy choice.
-
Global context. Privacy norms vary by culture and political system. A framework designed for a stable democracy with judicial oversight may be catastrophic in an authoritarian context — and the same technology will be deployed in both.
💡 Key Insight: The philosopher's contribution to this debate is the insistence that we acknowledge tradeoffs. Every position on the privacy spectrum sacrifices something of value. The honest participant in this debate admits what they are willing to sacrifice, rather than pretending that their preferred position has no costs.
31.10 Summary and Bridge to Chapter 32
This chapter has explored one of the most consequential tensions in the cryptocurrency ecosystem: the paradox of transparent money.
Key takeaways:
-
Bitcoin and most public blockchains are less private than cash, not more. Every transaction is permanently recorded on a public, searchable, immutable ledger. Pseudonymity provides weaker privacy protections than most users assume.
-
Chain analysis firms (Chainalysis, Elliptic) have built a multi-billion-dollar industry around tracing blockchain transactions. Their techniques — clustering heuristics, change output analysis, exchange KYC correlation — are effective enough to have supported major criminal prosecutions and asset recoveries.
-
Privacy coins address the transparency problem at the protocol level. Monero uses ring signatures, stealth addresses, and RingCT to make all transactions private by default. Zcash uses zk-SNARKs to offer optional shielded transactions with mathematically strong privacy guarantees. Both have significant strengths and weaknesses.
-
Mixing protocols (CoinJoin, Tornado Cash) provide privacy for transparent chains by pooling and redistributing funds. The Tornado Cash sanctions established an unprecedented legal precedent — sanctioning autonomous, ownerless code — with implications that extend far beyond cryptocurrency.
-
The privacy debate does not have a simple resolution. Financial privacy protects civil liberties and shields individuals from authoritarian control. Financial surveillance enables the detection and prevention of serious crime. Both values are real, and the tension between them is genuine.
-
CBDCs introduce a new dimension to the surveillance risk. Programmable, centrally controlled digital currencies could enable financial surveillance at a scale never before possible. The design decisions being made now about CBDC privacy will have lasting consequences.
-
Zero-knowledge compliance offers a potential middle path — using cryptographic proofs to demonstrate regulatory compliance without revealing the underlying transaction data. This approach is promising but faces significant technical, regulatory, and user-experience challenges.
Looking ahead to Chapter 32, we turn from the privacy of transactions to the environmental and social impact of the cryptocurrency ecosystem itself. Chapter 32 examines the energy consumption debate — from Bitcoin's proof-of-work energy usage to Ethereum's transition to proof-of-stake — and asks whether the environmental cost of cryptocurrency is a fundamental flaw, a solvable engineering problem, or a misunderstood trade-off.
Key Terms Glossary
| Term | Definition |
|---|---|
| Anonymity | A state in which a person's identity is completely unknown and unlinkable to their actions |
| Pseudonymity | Operating under a consistent alias that links actions to each other but not (by default) to a real-world identity |
| Chain analysis | The process of tracing and de-anonymizing cryptocurrency transactions using heuristics, pattern analysis, and identity data |
| Chainalysis | The largest blockchain analytics company, providing tracing tools to law enforcement and financial institutions |
| Clustering heuristic | A technique for grouping cryptocurrency addresses likely belonging to the same entity, based on transaction patterns |
| Change output | In a UTXO-based transaction, the output that returns unspent funds to the sender |
| Ring signature | A cryptographic signature that proves one member of a group signed a message without revealing which member |
| Stealth address | A one-time address generated by the sender for each transaction, visible only to the recipient |
| RingCT | Ring Confidential Transactions; a Monero feature that hides transaction amounts using Pedersen commitments |
| zk-SNARK | Zero-Knowledge Succinct Non-Interactive Argument of Knowledge; a proof system used by Zcash to verify transaction validity without revealing details |
| Shielded transaction | A Zcash transaction that uses zk-SNARKs to hide sender, recipient, and amount |
| Mixer / Tumbler | A service or protocol that pools and redistributes cryptocurrency to break the transaction graph |
| CoinJoin | A Bitcoin mixing technique that combines multiple transactions into one, hiding the input-output mapping |
| Tornado Cash | A decentralized Ethereum mixing protocol sanctioned by OFAC in August 2022 |
| OFAC | Office of Foreign Assets Control; the US Treasury agency responsible for administering economic sanctions |
| CBDC | Central Bank Digital Currency; a digital form of sovereign currency issued by a central bank |
| Financial surveillance | The monitoring and analysis of financial transactions by governments, institutions, or private companies |
| Controllable anonymity | China's CBDC design philosophy: transactions have limited privacy, but the central bank can de-anonymize any transaction |
| Zero-knowledge compliance | Using zero-knowledge proofs to demonstrate regulatory compliance without revealing underlying transaction data |