Skip to main content

Protecting Your Privacy

Now that you understand why privacy matters and how chain analysis works, let's look at what you can do about it.

This page provides an overview of privacy techniques. Each has dedicated guides for implementation.

The Privacy Mindset

Before diving into techniques, adopt these principles:

1. Think Before You Act

Every transaction leaves permanent traces. Ask yourself:

  • Does this link my identity to this address?
  • Am I revealing information unnecessarily?
  • Could I do this more privately?

2. Separate Your Identities

Don't mix:

  • KYC bitcoin (bought from exchanges with ID) with non-KYC bitcoin
  • Work-related transactions with personal ones
  • Public donation addresses with private savings

3. Minimize Data Leakage

Share only what's necessary:

  • Use new addresses for each transaction
  • Don't post addresses publicly unless required
  • Consider who can see your transaction

Privacy Techniques Overview

Level 1: Basic Hygiene

These require no special tools—just awareness.

TechniqueWhat It DoesDifficulty
Never reuse addressesPrevents linking transactionsEasy
Use your own nodeStops leaking addresses to third partiesMedium
Avoid address postingPrevents web scrapingEasy
Separate coin sourcesKeeps identities apartEasy

Level 2: Active Protection

These require learning specific tools.

TechniqueWhat It DoesGuide
UTXO managementControl which coins you spendUTXO Guide
Coin controlChoose specific inputs for transactionsCoin Control
LabelingTrack coin sources and privacy levelsUTXO Guide

Level 3: Breaking the Chain

These actively defeat chain analysis.

TechniqueWhat It DoesGuide
CoinJoinMix coins with others to break historyCoinJoin Guide
PayJoinHide payments in normal-looking transactionsComing soon

Run Your Own Node

Why it matters:

When you use someone else's node (or a public server), you reveal:

  • All your addresses
  • Your transaction history
  • Your IP address (potentially)

With your own node:

  • Your wallet queries stay local
  • No third party sees your addresses
  • You verify everything yourself

Learn: What is a Bitcoin Node | Why Run Your Own

Guide: Bitcoin Node Setup

UTXO Management

Why it matters:

UTXOs (Unspent Transaction Outputs) are the individual "pieces" of bitcoin you own. How you manage them affects:

  • Privacy: Combining UTXOs from different sources links them
  • Fees: More UTXOs = higher transaction fees
  • Traceability: Careless spending reveals your activity

Key practices:

  1. Label everything — Know where each UTXO came from
  2. Keep sources separate — Never combine KYC and non-KYC coins
  3. Use coin control — Manually select which UTXOs to spend
  4. Consolidate carefully — Only combine same-source UTXOs

Guide: UTXO Management

CoinJoin

Why it matters:

CoinJoin directly breaks the chain analysis heuristics by:

  • Combining inputs from multiple people (breaks common input ownership)
  • Creating equal outputs (hides which output belongs to whom)
  • Adding ambiguity to transaction graphs

After a CoinJoin:

  • Analysts cannot determine which output is yours
  • Your transaction history is "broken"
  • Coins gain forward privacy

Important considerations:

  • Mixed coins must be handled carefully after
  • Some exchanges flag CoinJoin transactions
  • Proper post-mix behavior is essential

Guide: CoinJoin

Acquiring Bitcoin Privately

The acquisition problem:

If you buy bitcoin through a KYC exchange, your identity is linked from the start. Even the best privacy techniques cannot fully undo this.

More private acquisition methods:

MethodPrivacy LevelTradeoffs
Peer-to-peer (P2P)HigherRequires more effort, potential scams
Bitcoin ATMs (some)MediumOften have cameras, some require ID
Earning bitcoinHigherEmployer/client knows your address
MiningHighestExpensive equipment, technical knowledge

Guide: Coming soon

Network-Level Privacy

The problem beyond blockchain:

Even if your transactions look private on-chain, you might leak information at the network level:

  • IP address — When you broadcast a transaction
  • Timing — When you come online
  • Connections — Who you connect to

Solutions:

ToolWhat It Does
TorHides your IP address
VPNHides your IP (but VPN provider sees it)
Own nodeBroadcast transactions through your node
Own node over TorBest combination

Guide: Tor Setup

What You Cannot Fix

Some privacy losses are permanent:

SituationWhy It Can't Be Undone
KYC exchange withdrawalExchange has your identity forever
Posted address onlineMay be archived, scraped, saved
Sent to identified addressThat transaction is permanent
Blockchain historyThe past cannot be changed

What you can do:

  • Start fresh with new coins
  • CoinJoin existing coins for forward privacy
  • Be more careful going forward

Privacy and Tradeoffs

Every technique has tradeoffs:

TechniquePrivacy BenefitCost/Risk
Own nodeNo address leakageDisk space, setup time
CoinJoinBreaks transaction linksFees, time, potential exchange issues
P2P buyingNo KYC linkPremium price, counterparty risk
Coin controlBetter UTXO privacyManual effort, learning curve

Choose based on your threat model and resources.

Building Your Privacy Practice

Start here:

  1. ✅ Understand the risks (you've done this)
  2. ⬜ Run your own node → Bitcoin Node Guide
  3. ⬜ Learn UTXO management → UTXO Guide
  4. ⬜ Practice coin control → Coin Control Guide
  5. ⬜ Consider CoinJoin for existing coins → CoinJoin Guide

Ongoing habits:

  • Never reuse addresses
  • Label all incoming transactions
  • Keep different sources separate
  • Think before each transaction

Key Takeaways

  • Run your own node to stop leaking addresses
  • Manage UTXOs carefully to prevent linking
  • CoinJoin breaks chain analysis heuristics
  • Acquisition method determines starting privacy
  • Some losses are permanent — prevention is best
  • Build habits — privacy is ongoing, not one-time

Practical Guides

Ready to implement these techniques?