The co-founder of ethereum vitalik buterin has published a research paper suggesting the use of stealth addresses to improve transfers of privacy protection. But detailed that stealthy addresses can be implemented pretty quickly today on ethereum and would greatly increase the privacy of users on the blockchain network.
Since September 2015, redman has written over 6,000 items for bitcoin.com news on the disruptive protocols emerging today..
Three days ago, the co-founder of Ethereum, Vitalik Buterin, published a blog post that gives a comprehensive overview of stealth addresses and the benefits of using them. Stealth addresses are a feature that is supported by other blockchain networks, like Monero (XMR), to increase privacy and anonymity when conducting transactions. The network creates ad hoc addresses not related to the public address of the user. Three days ago, Ethereum co-founder Vitalik Buterin published a blog post that provides an overview of stealth addresses and the advantages of using them.
Stealth addresses are a feature supported by other blockchain networks, such as Monero (XMR), to enhance confidentiality and anonymity in transactions. In the blog article, buterin insists that “one of the largest remaining challenges in the ethereum ecosystem is privacy.”buterin describes a number of different ways to generate cryptoally opaque public addresses with a key-blinding mechanism, cross-section cryptography, And quantum security as well. It also addresses "social recuperation and multi-12 portfolios" and "separate expenditure and visualization keys." But she noted that some concerns could have an impact on user friendliness in the long run, as the problem of social rehabilitation.
In the long run, these issues can be resolved. The long-term stealth addressing ecosystem looks like one that would really heavily depend on zero-knowledge evidence," but said Erin. While monero uses stealth addresses, technology is also featured in cryptocurrency networks such as zcash, hyphen, rod, navcoin, and pivx. Note that some of the above mentioned cryptocurrencies have various covert address implementations.
Conclusion of the research position. Erin details that stealth addresses could be easily implemented into the ethereum network, and wallets would need to adapt to the changes. Overall, furtive address support would require major changes to the underlying architecture of ether-based portfolios and their current parameters. For instance, common portfolios use a different address format. For instance, existing portfolios use a different address format.
The lean customer should generate new unique addresses for each transaction, and portfolios should be able to encrypt and decrypt transaction data correctly. 'Basic stealth addresses can be implemented quite rapidly today and could be a boost to users' privacy on ethereum,' concludes Erin. "They need a bit of portfolio work to support them.