gustavo

gustavo

(7) posts |

Wasabi’s Latest Release (2.0.4) Improves Coinjoin Efficiency
Announcements Beginner Product

With the 2.0.4 release, we have improved coinjoin efficiency in multiple ways so that you reach private status on all your coins faster and incur less cost. Our main goal is to even further reduce the occurrence of toxic change. 

Turbosync: Wasabi Wallet’s Loading Time Reduced by 90%
Beginner Technical

With the 2.0.4 release, Turbosync is introduced in Wasabi Wallet to reduce the load time by up to 90%. We did this with accessibility in mind so that even low-bandwidth users can use Wasabi with little friction.

What Lightning Network-Enabled Wabisabi Coinjoins Might Look Like
Technical

Read further to learn more about the details of why the Lightning Network is Bitcoin’s leading scaling solution, why payment channel openings and coinjoins go well together, how to currently open a Lightning Network channel from a Wasabi Wallet private UTXO, how Vortex presently handles the direct opening of channels from coinjoin outputs, and finally, how a future Lightning Network-enabled WabiSabi coinjoin might solve that problem.

What is the Difference Between an Anonymity Set and an Anonymity Score?
Technical

If you want to know the details of what is an anonymity set, what makes the difference between the former term and anonymity score, how to set your anonymity score target on Wasabi, and how your post-coInjoin activity can impact your anonymity, keep reading this article.

How to Connect Your Hardware Wallet to Wasabi Wallet
Technical

If you’ve been thinking about changing software wallets to Wasabi, you need an updated tutorial showing you how to complete that process without taking too much time; you’ve found it.

What are Wasabi Wallet’s Code Signature Strategies?
Technical

This article will explain how Wasabi Wallet’s three code signing strategies (Windows, MacOS, and PGP) work and how they compare in terms of user experience, trust models, cryptography, and certificate subscription/expiry.

The Best Technologies for Keeping Your Identity Secure
Community

Internet websites and applications are full of trackers for ad and surveillance purposes. If you don’t watch out, you will quickly discover that you’ve revealed yourself to the world more than you had initially wanted.