Tips, and best practices

Privacy and Bitcoin

With proper understanding of the technology, bitcoin can indeed be used in a very private and anonymous way.


This content is open source. Help improve it.


Cryptoconomy QuickReads



Digital Privacy

Not Specific to Bitcoin

  • Sarah Jamie Lewis (@SarahJamieLewis)

    If you are waiting for a government to give you meaningful privacy from surveillance you are going to be waiting a long time. Privacy is consent. Consent is, unfortunately, something that you sometimes have to enforce.

  • Jameson Lopp (@lopp)

    The cost of maintaining one’s privacy continues to rise as the cost of surveillance technology continues to fall. Most folks have neither the time nor the money to properly protect their privacy these days. Cypherpunks are the intolerant minority, the Spartans defending th…

  • Payment Systems and Privacy by Charles Kahn - 2018-07-16

    Abstract: Privacy in payments is desired not just for illegal transactions, but also for protection from malfeasance or negligence by counterparties or by the payments system provider itself. Proposals to abolish cash take inadequate account of these legitimate demands for privacy. While central banks can play a useful role in setting standards for payments privacy, they are unlikely to have a comparative advantage at providing privacy. Therefore the replacement of cash by central bank electronic money is likely to spur demand for alternative means of payments to solve specific privacy problems.

  • Privacy Tools - Encryption against global mass surveillance

    You are being watched! Knowledge, encryption and privacy tools to protect you against global mass surveillance.

  • You May Have ‘Nothing to Hide’ But You Still Have Something to Fear

    This post was first published on the wake of recent news that the NSA is spying on Americans, I have been particularly struck by the argument that “if you’ve got nothing to hide, you’ve got nothing to fear.”At first blush, this argument might seem sound – after…

  • Nothing to hide argument - wikipedia

    The nothing to hide argument states that government surveillance programs do not threaten privacy unless they uncover illegal activities, and that if they do uncover illegal activities, the person committing these activities does not have the right to keep them private. Hence…

  • Jameson Lopp (@lopp)

    “It’s possible to measure the scalability of a system, but it’s impossible to empirically evaluate privacy - we have to resort to thought experiments. As such, it’s quite challenging to decide upon privacy and scalability trade-offs.” - @secparam #ScalingBitcoin

  • Erinn Atwater (@errorinn)

    i want an internet where my privacy can’t be invaded by third parties, but also i don’t have to run my own damn server for everything. just got step one working: send a file! p2p with bidirectional authentication, metadata resistance, and easy verified contact management

  • The Seven Foundational Principles of Privacy by Design

    Privacy by Design is a concept Dr. Ann Cavoukian developed back in the 90’s, to address the ever-growing and systemic effects of Information and Communication Technologies, and of large-scale networked data systems.

  • Christopher Allen (@ChristopherA)

    I highly suggest more of the #RebootingWebOfTrust community, the W3C Credentials CG, and the broader decentralized web community read this book and support @SarahJamieLewis by paying for a copy. But read it! Being LGBTA may not be your reason for privacy, but similar probl…

  • gHacks Technology News

    Ghacks Technology News is a tech blog that reviews software, apps, Internet services, and offers tips and tricks about Windows, Android, and other systems.

  • Pirate Beachbum (@piratebeachbum)

    For all you privacy freaks, here is a must read that validates any sense of privacy we think we have has been compromised the last 20 plus years. It’s worse than you ever imagined!

  • The CIA Spied on People Through Their Smart TVs, Leaked Documents Reveal (2017)
  • When Myspace Was King, Employees Abused a Tool Called ‘Overlord’ to Spy on Users
  • Evan Sultanik (@ESultanik)

    Telegram is never the solution. Friends don’t let friends use Telegram. This’ll be a thread!

  • Supreme Court and Digital Privacy: Should Blockchain Companies Cha…

    Digital privacy law experts predict a flood of litigation testing the constitutionality of government data collection practices after the Supreme Court’s Carpenter decision on cell phone data…

  • VPN⁰: A Privacy-Preserving Distributed Virtual Private Network -…

    Distributed virtual private networks (dVPNs) are a new form of VPN with no central authority. In a dVPN, users are both VPN clients and relay/exit nodes as in a Peer-to-Peer (P2P) network. While dVPNs make strong privacy claims, they also carry the risk that a user will inadv…

  • VPN⁰: A Privacy-Preserving Distributed VPN