What Are Stealth Addresses? - Decrypt (2024)

In brief

  • Stealth addresses provide more privacy for transactions on Ethereum.
  • The system offers a method of privacy similar to generating a new address for each transaction but without the hassle of manually creating those addresses each time.
  • A stealth address can be thought of as a wallet address that is cryptographically tied to the recipient's public address, but that is only revealed to the parties transacting.

Decrypt’s Art, Fashion, and Entertainment Hub.

Discover SCENE

Stealth addresses provide privacy for transactions on Ethereum. While it’s impossible to completely hide a blockchain transaction, stealth addresses can, at the very least, conceal the recipient's identity. And in doing so, offer an added layer of protection for anyone who doesn't want the transaction data overtly tied to them.

On a distributed ledger (a public record of transactions), anyone can view details of a transaction such as the date, the amount, and the wallets or the entities involved. They can search the specific transaction ID or hash on a block explorer, such as etherscan for Ethereum or Blockstream for Bitcoin.

That said, attempts to enhance privacy in the Ethereum ecosystem aren't without challenges both from a regulatory and technical standpoint. Case in point: the obstacles with Tornado Cash in 2019 (OFAC sanctions aside). Ethereum co-founder Vitalik Buterin noted that the virtual currency mixer is only able to hide ETH or major ERC-20s tokens. This leaves a gap for other widely-used assets native to the Ethereum protocol such as POAPs, NFTs, and ENS names. Hence the reason for stealth addresses.

Stealth addresses can conceal the recipient's identity.

AD

Proposed by Buterin in a recent blog post, a "stealth address system" would offer enhanced privacy protections for users, regardless of how small the transaction size or the asset in question.

How do stealth addresses work?

Paraphrasing Buterin, this is how stealth addresses work:

Either the recipient (let’s call them “Bob”) or the sender (“Alice”) can generate a stealth address for the transaction. However, only the recipient, Bob, can control the transaction. Another way to think of a stealth address is as a wallet address that is cryptographically tied to Bob’s public address, but that is only revealed to the parties transacting.

To conceal their identity, Bob first needs to generate a secret “spending key,” which is then used to create a stealth "meta-address." The meta-address is then shared with the sender (Alice), who performs a computation to generate a stealth address that belongs to Bob.

Alice can then send any assets she wants to Bob. When Alice sends assets to the stealth address, she also publishes some extra cryptographic data on-chain (called an ephemeral pubkey) that helps Bob find the assets. Bob scans the chain for this cryptographic data; if he finds any, he uses his spending key to claim the assets.

AD

AD

Overall, this system offers a method of privacy similar to that of generating a new address for each transaction, but without the hassle of manually create those addresses each time. Along with sharing the meta-address with Alice, Bob can register it on ENS (Ethereum Name Service) as the stealth meta-address for something like bob.eth. In that scenario, and assuming Alice knows Bob owns bob.eth, Alice can then look up his stealth meta-address on ENS.

Challenges and limitations with stealth addresses

While the idea is still fairly embryonic, Buterin stated that the technology would be fairly easy to implement. But there are still several issues to solve; most notably, gas fees. As a newly-generated stealth address would contain no ETH, the owner of said address wouldn't be able to send any assets from it (to pay for gas fees) without first transferring ETH from another address. But by doing so, the transaction data would reflect on-chain data, thus defeating the purpose of it being anonymous.

Another long-term solution that Buterin proposed would be to use Zero-Knowledge Proofs, despite also being somewhat costly due to the extra gas required. Other potential pathways would be to use specialized transaction aggregators—something where users can pay for multiple transactions at once and then spend these prepaid transactions whenever necessary.

In his closing thoughts, Buterin stated that supporting stealth addresses would also require significant changes to the functionality of Ethereum-based wallets, and suggests that wallet developers should start working towards a multi-address model that is able to properly encrypt and decrypt transaction data along with create a new address for each application or new addresses for privacy-related reasons as well.

And while not perfect, stealth addresses are another tool to help increase the overall privacy in the Ethereum network and thus solve one of the bigger remaining challenges for the ecosystem to scale.

Stay on top of crypto news, get daily updates in your inbox.

What Are Stealth Addresses? - Decrypt (2024)

FAQs

What Are Stealth Addresses? - Decrypt? ›

Stealth Addresses increase security and anonymity by creating a unique, one-time address for each transaction. Consequently, even if a recipient gets multiple transactions, each is linked to a different address, enhancing privacy.

What is a stealth address? ›

Stealth addresses operate by creating unique addresses for each transaction, allowing only the intended recipient to access and identify the funds. To illustrate the process, consider a hypothetical scenario involving two individuals, Bob and Alice, using a cryptocurrency with stealth addresses.

How do Monero stealth addresses work? ›

The recipient's actual address is kept secret when a sender transfers funds using a stealth address; the transaction is broadcast to the network. The recipient does not directly generate a private key from the stealth address; the wallet is designed to identify incoming transactions.

What is stealth in crypto? ›

A cryptocurrency stealth address is a one-time wallet address used to create more anonymity in cryptocurrency transactions.

What is the double key stealth address protocol Dksap? ›

However, double-key stealth address protocol (DKSAP) requires the receiver to continuously calculate and determine whether it is the real receiver of the transaction until it detected a transaction that matches.

Can cold wallets be traced? ›

The address of your crypto wallet is visible to everyone on the blockchain it is built on. With all transaction recordings available on the public ledger, the transactions going in and out of your crypto wallet is visible to everyone.

What is considered stealth? ›

1. : sly or secret action. 2. : a design style intended to make an aircraft difficult to detect by radar. stealth.

Can police track Monero? ›

Its Confidential Transaction (CT) technology enhances ring signatures and stealth addresses, making on-chain transactions using Monero's native XMR coin almost impossible to trace.

Is Monero really untraceable? ›

Monero (XMR) is a secure, private and untraceable cryptocurrency known for its strong focus on privacy and anonymity. Transactions on the Monero (XMR) blockchain are confidential and cannot be traced, ensuring the privacy of its users.

Can Monero address be traced? ›

Is Monero Traceable by Law Enforcement or Hackers? Monero, a privacy-focused cryptocurrency, is designed to be untraceable, making it difficult for law enforcement or hackers to track transactions.

What is the point of stealth mode? ›

Sometimes, to protect a new product and to set their own pace for development, people decide to launch a startup operating in a temporary state of secrecy. This state is called stealth mode. In this mode, the startup aims to avoid the spotlight until it's ready to become public.

What is ghost in cryptocurrency? ›

Ghost is a Decentralized Proof-Of-Stake Privacy coin. Send/Receive anonymous payments using Anon or Blind addresses that are confidential using RingCT and Bulletproofs.

What is an example of a Monero address? ›

A raw Monero address is a set of 95 characters starting with a '4' or an '8'. The Monero donation address, for instance, is 888tNkZrPN6JsEgekjMnABU4TBzc2Dt29EPAvkRxbANsAnjyPbb3iQ1YBRk1UXcdRsiKc9dhwMVgN5S9cQUiyoogDavup3H.

Which privacy concern is addressed by the concept of a stealth address? ›

3. The stealth address technology primarily aims to hide transaction addresses and provide privacy protection for the recipients [24]. The sender computes a temporary address before the transaction, and the payment tokens are sent to that address.

What is stealth mode in information security? ›

Stealth mode is a feature in cybersecurity that allows an antivirus or firewall to operate in a way that remains invisible or undetectable to attackers. The purpose is to prevent attackers from detecting and exploiting vulnerabilities in the system.

What are vanity addresses? ›

Vanity addresses are a type of geographically 'dislocated' address in which the street name is that of a different street from the one on which the building entrance is actually located. Developers sometimes use such addresses in the belief that a prestigious street name enhances the market value of a property.

Top Articles
Difference Between Major and Minor Foundation Repair Issues
UK 2018 Flopsy Bunny 50p is worth £4.50
Devotion Showtimes Near Xscape Theatres Blankenbaker 16
NOAA: National Oceanic & Atmospheric Administration hiring NOAA Commissioned Officer: Inter-Service Transfer in Spokane Valley, WA | LinkedIn
Bild Poster Ikea
AllHere, praised for creating LAUSD’s $6M AI chatbot, files for bankruptcy
7 Verification of Employment Letter Templates - HR University
Obor Guide Osrs
Gore Videos Uncensored
360 Training Alcohol Final Exam Answers
How To Get Free Credits On Smartjailmail
Here's how eating according to your blood type could help you keep healthy
Student Rating Of Teaching Umn
A.e.a.o.n.m.s
Craigslist/Phx
Used Wood Cook Stoves For Sale Craigslist
Fredericksburg Free Lance Star Obituaries
Flights To Frankfort Kentucky
Erskine Plus Portal
I Touch and Day Spa II
Who called you from +19192464227 (9192464227): 5 reviews
Weather Rotterdam - Detailed bulletin - Free 15-day Marine forecasts - METEO CONSULT MARINE
3476405416
Ruben van Bommel: diepgang en doelgerichtheid als wapens, maar (nog) te weinig rendement
Pinellas Fire Active Calls
Euro Style Scrub Caps
Myhr North Memorial
Busted News Bowie County
Drying Cloths At A Hammam Crossword Clue
Craigslist Rome Ny
Black Panther 2 Showtimes Near Epic Theatres Of Palm Coast
Effingham Daily News Police Report
Cosas Aesthetic Para Decorar Tu Cuarto Para Imprimir
How rich were the McCallisters in 'Home Alone'? Family's income unveiled
Www.1Tamilmv.con
Proto Ultima Exoplating
Greater Orangeburg
Mrstryst
Mbi Auto Discount Code
Panchang 2022 Usa
Linabelfiore Of
Afspraak inzien
Express Employment Sign In
Improving curriculum alignment and achieving learning goals by making the curriculum visible | Semantic Scholar
Aita For Announcing My Pregnancy At My Sil Wedding
Nimbleaf Evolution
The Cutest Photos of Enrique Iglesias and Anna Kournikova with Their Three Kids
Slug Menace Rs3
Elvis Costello announces King Of America & Other Realms
Lux Funeral New Braunfels
Research Tome Neltharus
How to Choose Where to Study Abroad
Latest Posts
Article information

Author: Jamar Nader

Last Updated:

Views: 6054

Rating: 4.4 / 5 (75 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Jamar Nader

Birthday: 1995-02-28

Address: Apt. 536 6162 Reichel Greens, Port Zackaryside, CT 22682-9804

Phone: +9958384818317

Job: IT Representative

Hobby: Scrapbooking, Hiking, Hunting, Kite flying, Blacksmithing, Video gaming, Foraging

Introduction: My name is Jamar Nader, I am a fine, shiny, colorful, bright, nice, perfect, curious person who loves writing and wants to share my knowledge and understanding with you.