Syncing _posts/2018-05-08-maintaining-privacy.md from WordPress at https://blog.z.cash (Zcash Blog) - wpghs

This commit is contained in:
Josh Swihart 2018-05-08 19:14:31 +02:00
parent cc549708de
commit 2cc6e3560d
1 changed files with 1 additions and 1 deletions

View File

@ -12,7 +12,7 @@ post_date: 2018-05-08 17:10:38
<span style="font-weight: 400;">Today, George Kappos, Haaroon Yousaf, Mary Maller, and Sarah Meiklejohn from University College London released new academic research entitled “</span><a href="https://smeiklej.com/files/usenix18.pdf"><span style="font-weight: 400;">An Empirical Analysis of Anonymity in Zcash.</span></a><span style="font-weight: 400;">" We congratulate this research team for this insightful new paper, and invite other scientists to join with us in investigating these questions that are important to the future of human society.</span>
<span style="font-weight: 400;">This research demonstrates different ways to pierce the veil of your privacy if you, or the people that you transact with, move money from a transparent address to a shielded address and then move some of that money back to a different transparent address. </span><a href="https://blog.z.cash/new-research-on-shielded-ecosystem/"><span style="font-weight: 400;">Similar analysis</span></a><span style="font-weight: 400;"> was released several months ago. However, this research includes new techniques that can heuristically link more patterns of “unshielded to shielded to unshielded” transactions.</span>
<span style="font-weight: 400;">This research demonstrates different ways to pierce the veil of your privacy if you, or the people that you transact with, move money from a transparent address to a shielded address and then move some of that money back to a different transparent address. </span><a href="https://blog.z.cash/new-research-on-shielded-ecosystem/"><span style="font-weight: 400;">Similar analysis</span></a><span style="font-weight: 400;"> was released several months ago. However, this research includes new techniques that can heuristically link patterns of “unshielded to shielded to unshielded” transactions.</span>
<span style="font-weight: 400;">It is valuable to understand how much privacy is lost when using shielded addresses as a pass-through mechanism, but using it in that way is not recommended. Instead, store your Zcash in a shielded address. When paying someone, send Zcash from your shielded address to their shielded address. If Zcash is transacted in this way, the results of this paper do not apply and transaction privacy is maintained.</span>