The Privacy Problem
San Francisco, 2019.
James Sullivan sits in a coffee shop, laptop open, reading an article that makes his stomach turn.
A journalist in Hong Kong had been arrested. Sarah Wei. She’d been reporting on the protests against the extradition bill. Documenting police violence. Interviewing activists. Publishing articles that the Chinese government didn’t want published.
The arrest wasn’t surprising. Dozens of journalists had been detained. But what caught James’s attention was how they’d found her sources.
Bitcoin.
Sarah had set up a Bitcoin address to receive donations. Supporters sent her small amounts to help fund her work. Nothing illegal. Just journalism. The donations were pseudonymous. No names attached. Just Bitcoin addresses.
But pseudonymous wasn’t private.
The authorities had analyzed the blockchain. Traced every transaction. Identified patterns. Connected addresses. Found the wallets of people who’d sent donations. Then correlated those wallets with exchange accounts where people had bought Bitcoin using real identities.
Within weeks, they had a list. Names. Addresses. People who’d supported Sarah’s journalism. Thirteen people were questioned. Five were arrested. Not for donating to journalism. For “supporting subversion of state power.”
James had been using Bitcoin for eight years. He’d verified the code. Understood how it worked. Believed in it as an alternative to the traditional financial system. But he’d never thought deeply about what the transparency meant in practice.
Now he was thinking about it.
He opened his own wallet. Looked at his transaction history. Years of transactions. Thousands of them. Every one visible. Every one traceable. Every one permanent.
Anyone could see this. Anyone could analyze it. Anyone could connect the dots.
James decided to investigate. Not theoretically. Practically. He needed to understand exactly how vulnerable Bitcoin users actually were.
The Paradox
James had spent years understanding Bitcoin’s breakthrough. Satoshi had solved the double-spend problem. Created money without central authority. Enabled trustless transactions.
All of this required transparency.
Every transaction had to be public. Every wallet balance had to be visible. Every movement of funds had to be recorded permanently.
This transparency was the mechanism that made Bitcoin work. You couldn’t have trustless verification without it. If transactions were hidden, you couldn’t verify that double-spending hadn’t occurred. If balances were secret, you couldn’t confirm that senders had the funds they claimed.
Transparency enabled verification. Verification enabled trust. Trust enabled the system.
But that same transparency created surveillance.
Bitcoin freed money from institutional control but created comprehensive public tracking. It gave users financial sovereignty but exposed their entire transaction history. It enabled censorship resistance but made every financial action visible forever.
With traditional banking, surveillance existed but was hidden. Banks tracked transactions, but that data was private. Governments could access it through warrants. Corporations could buy some data, but it was aggregated and anonymized.
With Bitcoin, surveillance was built into the foundation. The blockchain was public by design. Anyone could run analysis. No warrants needed. No legal process required. No restrictions at all.
James pulled up a blockchain explorer. A website that let anyone view Bitcoin transactions. He typed in one of his own addresses. One he’d used to buy coffee at a local shop that accepted Bitcoin.
There it was. The coffee purchase. Visible to anyone in the world. The address he’d sent from. The address the coffee shop received to. The exact amount. The date and time. All public. All permanent.
He clicked on his sending address. Saw every other transaction he’d ever made from that address. About thirty transactions over two years. Coffee shops. Online purchases. A donation to a nonprofit.
Then he looked at the coffee shop’s address. Saw everyone who’d ever paid them. Hundreds of transactions. Hundreds of customers.
He picked a random customer. Clicked on their address. Saw where they’d bought their Bitcoin. An exchange. Saw what else they’d purchased. Saw how much they held.
This wasn’t hacking. Wasn’t illegal access. Wasn’t even difficult. Just clicking links on a public website.
He could trace any Bitcoin user’s entire financial history in minutes. Where they bought Bitcoin. What they spent it on. How much they held. When they moved it. Everything.
And if he could do this, anyone could. Governments. Corporations. Criminals. Anyone with internet access and basic technical skills.
The Analysis Industry
James discovered that chain analysis had become an industry. Companies with sophisticated software. Chainalysis. Elliptic. CipherTrace. They sold services to governments, exchanges, and corporations. Services that de-anonymized Bitcoin users.
He read their marketing materials. They weren’t hiding what they did. They advertised it.
“Track cryptocurrency transactions across the blockchain. Identify high-risk addresses. Detect suspicious patterns. Support law enforcement investigations. Ensure regulatory compliance.”
The techniques were sophisticated. Clustering algorithms that grouped addresses owned by the same person. Heuristics that identified exchange deposits and withdrawals. Timing analysis that correlated transactions. Graph analysis that mapped entire networks of transactions.
But the sophistication wasn’t necessary for basic tracking. The blockchain itself provided most of the information. These companies just made it easier. Faster. More automated. More comprehensive.
James found case studies. A darknet market vendor identified through transaction patterns. A ransomware operator tracked through Bitcoin payments. A money launderer caught by analyzing the flow of funds.
Some of these were criminals who deserved to be caught. But the same techniques worked on everyone. There was no difference between tracking a criminal and tracking a journalist’s donors. Same blockchain. Same transparency. Same methods.
He found academic papers. Researchers had de-anonymized Bitcoin users by correlating blockchain data with other information. One study identified Bitcoin users by analyzing transaction timing and amounts, then matching them to social media posts about Bitcoin transactions. Another used network traffic analysis. Watching when transactions were broadcast could reveal IP addresses of users.
The pseudonymity Bitcoin provided was thin. A layer of protection that looked substantial until you applied analysis. Then it dissolved.
James thought about all the people using Bitcoin for legitimate purposes. Activists receiving donations. Journalists protecting sources. Dissidents moving money. People in authoritarian countries trying to preserve wealth.
They thought they had privacy. They didn’t.
What Happened to Sarah
James couldn’t stop thinking about Sarah Wei and the people who’d been arrested for supporting her.
He researched what had happened. Found more details.
Sarah had been careful. She’d used a new Bitcoin address for donations. Hadn’t linked it to her real identity. Hadn’t posted it publicly with her name.
But it didn’t matter.
The authorities started with her arrest. Seized her laptop. Found her Bitcoin wallet. Got the address she’d used for donations.
Then they analyzed the blockchain. Every transaction to that address was visible. Thirty-seven donations over six months. Amounts ranging from $10 to $500. Each donation came from a different address.
Those addresses became the starting point. Where did those donations come from? They traced each one backward. Found that most came from addresses that had recently received Bitcoin from exchanges. Exchanges where users had bought Bitcoin with real identities. Bank accounts. ID verification. Know Your Customer requirements.
The authorities requested information from exchanges. Got the identities. Matched thirteen donors. Arrested five of them.
One was a teacher. She’d donated $50. She lost her job.
Another was a student. He’d donated $25. Expelled from university.
A third was a small business owner. Donated $200. Business license revoked.
Not because they’d committed crimes. Because they’d supported journalism the government wanted suppressed. And Bitcoin’s transparency had made them traceable.
Sarah Wei was sentenced to four years in prison. The donors faced penalties ranging from fines to imprisonment. Their lives disrupted. Careers destroyed. Freedom lost.
Because they’d used freedom money that tracked everything.
Testing Solutions
James decided to test the solutions people had proposed. Maybe there were ways to use Bitcoin privately. Maybe the transparency problem could be solved.
He started with mixers. Services that pooled Bitcoin from multiple users, shuffled it, then sent it back to new addresses. The theory was simple. Break the transaction trail. Make it impossible to trace where bitcoins came from.
James sent 1 BTC to a mixer. The mixer sent back 1 BTC, minus a small fee, to a new address he controlled.
Then he tried to spend that Bitcoin. He bought something online. Paid with the mixed Bitcoin.
Two days later, he got an email from the merchant. Payment flagged. Account under review. The merchant used a chain analysis service that automatically flagged transactions from known mixers. High risk. Suspicious activity.
James explained it was him. Verified his identity. The merchant unfroze his account.
But the damage was done. Using a mixer had marked him as suspicious.
He researched further. Found that mixers had other problems. Many were scams. Take your Bitcoin, send nothing back. Those that were legitimate often got shut down. Governments raided them. Prosecuted operators. Seized funds.
Even if you found an honest mixer that hadn’t been shut down, using it was obvious. Chain analysis could identify mixer transactions easily. Which meant using a mixer was like wearing a sign that said “I’m trying to hide something.”
Maybe that something was innocent. Maybe you just valued privacy. But the system didn’t care. Using a mixer marked you as suspicious. Exchanges flagged you. Merchants rejected you. Regulators investigated you.
Privacy through mixing didn’t work. It was obvious. Ineffective. Legally dangerous. And increasingly impossible as mixers got shut down.
Next, James tried CoinJoin. A technique where multiple users created a single transaction together. Instead of Alice sending to Bob and Carol sending to David in separate transactions, all four participated in one joint transaction. From the blockchain’s perspective, it was unclear which input paid which output.
Better than mixers in some ways. No central service. No trust required. Just users coordinating to create joint transactions.
But it had the same fundamental problem.
It was optional.
And optional privacy doesn’t work.
Why Optional Privacy Fails
When privacy is optional, choosing it marks you as suspicious.
It’s like being the only person in the airport who refuses the security scan. You can refuse, but now you’re getting extra screening. Your choice to protect privacy is itself revealing.
Every CoinJoin transaction was identifiable. Distinct patterns. Specific characteristics. Chain analysis could flag them easily. And once flagged, you faced the same problems as mixer users. Exchanges restricted your account. Merchants rejected your payments. Regulators scrutinized your activity.
The math was stark. If 95% of Bitcoin users transacted normally and 5% used CoinJoin, those 5% stood out. They’d chosen privacy, which implied they had something to hide. Even if they didn’t. Even if they just valued privacy as a principle.
The choice itself was suspicious.
For privacy to work, it had to be default. Universal. If everyone had privacy, no one was suspicious for having it. But if privacy was optional, choosing it marked you as different.
And different meant suspicious.
Bitcoin’s transparency meant privacy was optional. And optional privacy protected no one.
James looked at other privacy-focused cryptocurrencies. Monero was the most popular. It used ring signatures to hide senders by mixing each transaction with decoys. It used stealth addresses to hide receivers. It hid transaction amounts.
Better than Bitcoin for privacy. Significantly better.
But Monero faced two problems.
First, the privacy was probabilistic, not cryptographic. Monero didn’t make transactions invisible through mathematics. It obscured them with decoys and hoped observers couldn’t distinguish real outputs from fake ones. Chain analysis companies claimed varying success rates. Academic researchers had published papers showing that some Monero transactions could be traced through statistical analysis and timing attacks. The privacy degraded as analysis improved.
Second, Monero faced the same optional privacy problem. Using Monero instead of Bitcoin signaled that you valued privacy. That signal itself was revealing. Exchanges that allowed Monero trading required extra verification. Some exchanges banned it entirely. Governments viewed Monero suspiciously. The choice to use privacy-focused cryptocurrency marked you as someone trying to hide something.
The privacy people needed, real privacy that was guaranteed by mathematics rather than hoped for through obfuscation, privacy that didn’t mark you as suspicious for choosing it, it didn’t exist. Not in Bitcoin. Not in Monero. Not anywhere.
The Other Path
While Bitcoin users struggled with partial privacy solutions, governments were building something else.
Central Bank Digital Currencies. CBDCs. Government-issued digital money with surveillance and control built into the foundation.
James read policy papers from central banks around the world. The language was careful. Technical. Bureaucratic. But the implications were clear.
CBDCs would give governments direct visibility into every transaction. Not through warrants or legal process. By design. The central bank would see everything. Every purchase. Every payment. Every transfer. Complete, real-time, comprehensive surveillance.
More than surveillance. Control.
CBDCs could be programmed. Money that expired if not spent by certain dates. Money that could only be spent on approved goods. Money that could be frozen based on behavior. Money that could be restricted based on social credit scores.
China had already launched a digital yuan pilot program. The capabilities were explicit. The government could track every transaction. Could prevent certain purchases. Could implement negative interest rates. Money that lost value if you saved it instead of spending it. Could freeze accounts of anyone deemed problematic.
The European Central Bank was exploring similar systems. The Federal Reserve was studying them. Central banks worldwide were coordinating. The infrastructure was being built.
James found a speech from a central bank governor. The language was revealing.
“CBDCs would give monetary authorities new tools for implementing policy. We could make transfer payments directly to citizens during crises. We could prevent illicit transactions. We could enforce negative rates when necessary. We could ensure tax compliance. We could program money to be spent on necessities during emergencies.”
Every sentence described control. Money that could be given directly, but also taken back directly. Money that could be programmed with restrictions. Money that could be frozen or expired or limited based on government decisions.
The governor framed these as features. Tools for better policy. Ways to help people during crises. But James saw what they actually were.
Comprehensive financial control. The panopticon completed. Not just surveillance but programmability. Not just watching but actively controlling every transaction.
And this was being combined with AI. Pattern recognition. Behavior analysis. Predictive algorithms. China’s social credit system was the prototype. Lower your score and your money stopped working properly. Miss a payment, criticize the government, associate with the wrong people, and your transactions got flagged, restricted, or blocked.
The technology already existed. The infrastructure was being built. The legal frameworks were being developed.
Within a decade, maybe less, most countries would have CBDCs. Digital money that governments controlled completely.
Bitcoin had offered an alternative. Money outside government control. But Bitcoin’s transparency meant governments could still track it. Could still analyze it. Could still identify users and pressure exchanges.
The Unsolved Problem
James spent weeks researching. Trying to understand if anyone had solved this. Whether the goals were actually incompatible or just seemed that way.
He read papers. Studied cryptography. Examined proposals.
Every attempt at Bitcoin privacy had failed. Mixers were obvious and got shut down. CoinJoin was optional and stigmatizing. Monero used decoys that could be analyzed. Nothing provided real privacy.
But James kept finding hints that some researchers believed they’d found answers. References to new cryptographic techniques. Mathematics that could verify transactions while hiding their details. Systems that could prevent double-spending without public ledgers.
The papers were dense. Technical. But the core claim was extraordinary.
You could have trustless money that was actually private. Verifiable integrity and user confidentiality. The goals that seemed incompatible might actually work together.
If true, this could complete what Bitcoin started. Privacy without sacrificing decentralization. Freedom from surveillance without sacrificing freedom from control.
James found references to scientists who’d been working on this for years. Building a cryptocurrency with privacy built into the foundation. Not bolted on. Not optional. Built in.
The mathematics seemed sound. The proofs looked valid. The system appeared to work.
The privacy people needed, real privacy, cryptographic privacy, privacy that didn’t require trust and didn’t mark users as suspicious, it might actually be possible.
Bitcoin had proved that decentralized money was possible. That governments didn’t need to control currency. That mathematics could replace institutions. That censorship resistance was achievable.
But Bitcoin hadn’t proved that privacy was possible. The transparency that made it trustless made it surveilling. The feature that prevented double-spending enabled tracking.
The revolution was incomplete.
Sarah Wei sat in prison. Thirteen donors faced prosecution. Maria Hernandez in Venezuela could protect her savings from inflation but not from surveillance. Activists worldwide used Bitcoin for censorship resistance but exposed themselves to tracking.
The cypherpunks had fought for privacy for decades. They’d spent twenty years trying to build private digital cash. They’d refused to accept that transparency was the price of trustless money.
They knew what was at stake. Not convenience. Not preference. Freedom itself.
Some people refused to accept that these goals were incompatible. They believed you could have both. Verifiable integrity and user privacy. Trustless consensus and transaction confidentiality. Freedom from control and freedom from surveillance.
They’d been working on this problem for years. Building something new. Something that would complete what Bitcoin started.
And they were about to succeed.