Privacy

As this generating footprint is only known only to the user, the result is an address that can begin to create on-chain associations. The address that comes from a dedicated crypto wallet, E2EE-app, or hosted enterprise (from the above examples) is indistinguishable from it’s entropy source; all are valid, and cannot be traced back to an individual’s input source (i.e. email, in the case of OAuth-style authentication). Thus, the user can sign and send transactions just like any other. Reverse privacy is covered in the Publicity and Privacy section of the Content Tracking & Certificate System (CCTS).

Last updated