How do you scale a blockchain? You don’t. Block space is inherently limited, and everyone making Bitcoin transactions competes for it. RBF and CPFP are some of the most prominent tools in the toolbox of a user for the block space scarcity competition.
We’ve packed Wasabi Wallet version 2.0.4 with highly requested features and a bundle of performance optimizations that drastically speeds up wallet load time, frees transactions from getting stuck in the mempool and make life easier than ever for privacy-conscious Bitcoiners.
Read further to learn more about the details of why the Lightning Network is Bitcoin’s leading scaling solution, why payment channel openings and coinjoins go well together, how to currently open a Lightning Network channel from a Wasabi Wallet private UTXO, how Vortex presently handles the direct opening of channels from coinjoin outputs, and finally, how a future Lightning Network-enabled WabiSabi coinjoin might solve that problem.
If you want to know the details of what is an anonymity set, what makes the difference between the former term and anonymity score, how to set your anonymity score target on Wasabi, and how your post-coInjoin activity can impact your anonymity, keep reading this article.
Understanding what the “zk” in zkSNACKs means gives you insight into the inner workings of Wasabi Wallet. Particularly, it gives you a perspective on how Wasabi wallet enables coinjoins without gaining access to your bitcoin or collecting and revealing your private financial data.
xPub stands for Extended Public Key while xPrivs stands for Extended Private Key. Simply put, xPubs and xPrivs are the parent keys that can allow a wallet to mathematically produce billions of child keys that work as public keys and private keys within your wallet.
Wasabi Wallet is well-known for making privacy-boosting coinjoin transactions accessible to everyone, but some may not be aware of the extent of its range of customizable features that allow users to shape their own experience while using Wasabi Wallet.
If you’ve been thinking about changing software wallets to Wasabi, you need an updated tutorial showing you how to complete that process without taking too much time; you’ve found it.
In Wasabi, you cannot really know how many inputs this user has, how many outputs did he break the amount into. And you know, all of these kinds of nuances, it makes it difficult to try to analyze Wasabi coinjoin transactions.
A coinjoin is a special kind of Bitcoin transaction where two or more people’s transactions are combined, which breaks the link between transactions, improving each coinjoin participant’s privacy. When Bitcoin users have the ability to selectively reveal themselves to the world, everyone benefits.
Internet websites and applications are full of trackers for ad and surveillance purposes. If you don’t watch out, you will quickly discover that you’ve revealed yourself to the world more than you had initially wanted.
Bitcoin is an intricate piece of technology but bitcoin wallets for end users shouldn’t be. A wallet should be simple enough to allow you, as a user, to create a wallet, receive bitcoin and check your balances without much of a fuss.
Cypherpunks tend to believe in the power of cryptography and other online privacy strategies centered around combating widespread digital surveillance. For decades, cypherpunks have been designing strategies and platforms to preserve online privacy for those who recognize its importance.
Not enough people understand the value proposition behind Bitcoin. If they did, then the motivation for coin mixing and coinjoin services would become much more clear. Hence, the first step to destigmatize these services would be through education.
All cryptocurrencies are blockchains but not all blockchains have to be used to keep track of monetary transactions
zkSNACKs is a private company. Like most private companies, it generates revenue in an attempt to make a profit. But Wasabi Wallet is a free software…so how does zkSNACKs generate revenue from a product that is completely free?
Though Wasabi’s initial design was based on Nopara73’s vision of a privacy-focused bitcoin wallet , the UI has served its purpose and it’s now time for an upgrade – Wasabi Wallet 2.0.
The right to privacy is an essential human right. Coinjoin technology being pioneered by the Wasabi team solves the Bitcoin privacy issue in beautiful ways.
The road ahead of us is still long, but with consistent usage of available privacy-preserving tools, we can get there. It just depends on all of us to keep on coinjoining so that on-chain surveillance becomes nearly impossible.
“Lightning is the one and only scalable solution for Bitcoin, which is non-custodial. So this is a super important property. So we want to scale Bitcoin in a non-custodial way, but also even maybe even more importantly at the end of the day, we want to preserve privacy.
Government control of money goes all the way down to the individual user of money. If you are able to control who spends state-issued money on what and how, then you can essentially enslave the population
Hacker’s Congress is a very niche meet-up of crypto-anarchists, privacy extremists, bitcoiners, shitcoiners and other misfits who want to change the world for the better. It focuses on hacking and societal change that spreads awareness on freedom.
With the transition to fiat currency, the age of accountability ended for both, governments and the banking industry.
The philosophy of CoinJoins is that you hide in a crowd in order to hide your face. The more people gather around you, the harder it is for the outsider to identify you. And if everyone wears the same mask, has the same hair color, height, etc…then you have an idea of what CoinJoins look like.
Fully analyzing Wasabi 2.0 coinjoins is computationally hard and will probably be impossible for decades to come because a combinatorial complexity explosion is happening when we try to find all the sub-transactions of a Wasabi 2.0 coinjoin.
There are two important categories of DIY hardware wallets that you can build from general-purpose electronic devices: the ones that run a ported firmware (a group of coders make a well-tested software available on more common hardware), and the ones that run original code.
We are living in the golden age of DIY hardware. Thanks to advancements in microprocessing and production/distribution, today we can purchase tiny yet powerful computers at surprisingly affordable prices – and then use them to perform surprisingly-complex tasks