this post was submitted on 30 Oct 2024
629 points (98.6% liked)
Technology
60553 readers
3639 users here now
This is a most excellent place for technology news and articles.
Our Rules
- Follow the lemmy.world rules.
- Only tech related content.
- Be excellent to each another!
- Mod approved content bots can post up to 10 articles per day.
- Threads asking for personal tech support may be deleted.
- Politics threads may be removed.
- No memes allowed as posts, OK to post as comments.
- Only approved bots from the list below, to ask if your bot can be added please contact us.
- Check for duplicates before posting, duplicates may be removed
Approved Bots
founded 2 years ago
MODERATORS
you are viewing a single comment's thread
view the rest of the comments
view the rest of the comments
From what I understand, which honestly, isn’t a lot - the method used to anonymize transactions and balances is more like obfuscation than anything else. The system uses various techniques to fuzz up the data in such a way that it becomes impossible to trace.
It’s a bit like if you wanted to send a bank transfer for £200 but anonymize it somewhat, you could transfer that money around between a bunch of other bank accounts, before sending it on to the final source. And if multiple people are doing the same thing, it becomes essentially impossible to determine where the money entered and left.
The problem is though that such systems aren’t true encryption in the same way that RSA is, for example - the data isn’t unreadable, and it’s not impossible to reverse, it’s just that there’s so much junk data and it’s such a mess that it makes the true transactions difficult to identify and the end user has extremely strong plausible deniability. However, it’s likely just a matter of time before some state actor finds a vulnerability in the technique that allows them to trace transactions - if they haven’t already done so.
What if it bounced through multiple peers between sender and recipient, encrypted on each hop like Tor? Then they'd need to actually break the encryption, or compromise every hop.
The transaction data itself does need to be publicly readable, because otherwise the whole consensus mechanism that the blockchain relies on wouldn’t work.
Not every transaction, just the ones that open and close payment channels. This deletes data that would be needed to reconstruct an overwhelming majority of transactions.
(This is how Bitcoin's lightning network works.)