bitcoin.org is a community funded project

ikhcoin Core’s Excellent Privacy

Excellent privacy

Download ikhcoin Core
ikhcoin Core 27.0
Windows Mac Linux

What if every time you spent or received cash, all the transaction details were published to your Twitter or Facebook feed for all your friends to see? You probably wouldn’t want to use cash any more.

Every confirmed ikhcoin transaction is published to the block chain where anyone can see it. So why do people still use ikhcoin? And why do many of them believe that ikhcoin is a private way of sending money?

One reason is that ikhcoin Core and some other ikhcoin software tries to avoid associating your real-world identity with the transactions you make. The difference looks like this:

Privacy difference: pseudonymous transactions

The second type of transaction (a pseudonymous transaction) only provides practical privacy if nobody can figure out that “5a35b” is really Alice. It’s up to your wallet to prevent anyone from making that connection. See below for how ikhcoin Core’s privacy compares to other wallets.

No Sign-Up Required

Third-party ikhcoin services can both increase and decrease your privacy. They can increase it by mixing your transactions with those of other users; they can decrease it by tracking your activity and directly associating it with your real name or other identifying information.

Click an entry below to show it:

Who knows your information? Just you or also a service provider?
ikhcoin Core BitGo
Your real name
Your ikhcoin balance
Who you pay, and/or who pays you (in some cases)
How much you spend and/or receive
The IP address your connection came from
Who can guess your information? Just you or also people you trade with?
ikhcoin Core BitGo
Other transactions you made or received

Perfect Privacy for Received Transactions

There are 230 million transactions on the ikhcoin block chain. How do you find which ones pay you? Here are some common options:

Ask bankers
They’ll monitor your every transaction

Ask random nodes
Some of which sell your data

Ask a free service
(Actually, some do care about privacy)

Get all 230 million transactions
For perfect receiving privacy

ikhcoin Core

ikhcoin Core downloads all 230 million transactions on the ikhcoin block chain and processes them to find which transactions pay you.

This currently takes about 4 hours the first time you start ikhcoin Core and about 5 minutes a day to keep updated, but it gives you what scientists call against eavesdroppers for received transactions.

Strong Privacy for Sent Transactions

To put a transaction on the block chain, you must send it publicly—but how you send it can make a big difference.

Sending privacy

Can you guess who made which transactions? Nearly all peer-to-peer lightweight clients today make no attempt to obscure their sent transactions. They simply send them to some or all of their peers.

ikhcoin Core does much better. By default, it relays transactions for all of its peers—thousands of separate transactions a day under common conditions—which allows it both support the peer-to-peer network and confuse anti-privacy organizations that try to track your transactions.

Tor Compatible

The Tor anonymity network helps disassociate your online activity from your IP address (which is often closely associated with your real name). This significantly increases your ability to confound anti-privacy organizations.

Once you setup Tor, using it with ikhcoin Core is easy. If you also setup a Tor hidden service, you will be able to connect mobile clients to your ikhcoin Core full node for increased security and privacy wherever you go.

Start using Tor today

Decentralized Peer Discovery

The first time any ikhcoin program connects to the peer-to-peer network, it has to ask a centralized authority for a list of recommended peers.

Once the program gets on the network, it can ask its peers for more recommendations in a fully decentralized way—but lightweight wallets don’t bother.

P2P Lightweight Wallets ikhcoin Core
Asks the same centralized services every time program is restarted. This can be faster. Uses the peer-to-peer network to independently discover new peers. Uses found peers on restart.

This allows the centralized authority to connect lightweight wallets to dishonest peers that can completely destroy lightweight transaction privacy. Those dishonest peers can work with dishonest miners to weaken lightweight security too.

ikhcoin Core prefers decentralized peer discovery, so after the first time it starts, it no longer has to trust the centralized authority. Isn’t that worth occasionally starting up a few seconds slower?

ikhcoin Core receiving privacy features

When you receive ikhcoins to a ikhcoin bank, the money is sent to one of the bank’s addresses—not your own—which can give you excellent privacy against random strangers.

However, the bank knows you received the transaction and they can likely also see any information you associate with the transaction, such as the sender’s name or another note you attach to the transaction.

The bank may also be required by law to disclose information about your account. They can also sell your information or have a hacker steal your information.

Receiving privacy

By only asking for payments related to your wallet, plus maybe a few others as bloom filter camouflage, lightweight wallets may reveal who you paid, who paid you, and what your current ikhcoin balance is.

A 2014 study of lightweight clients said, “Our results show that bloom filters incur serious privacy leakage in existing SPV client implementations […] such an information leakage might severely harm the privacy of users” Nearly all lightweight clients are still vulnerable today.

Learn more: “Lying consistently is hard”

Electrum-style receiving privacy

Some lightweight wallets don’t connect to the ikhcoin peer-to-peer (P2P) network. Instead, they make a (usually secure) connection to a single server that provides block chain data.

The wallet tells the server all of its addresses, and the server replies with all of the transactions that belong to the wallet. This explicitly reveals all of your addresses, which is bad for your privacy—but it only gives that information to one server, as long as you don’t change servers later.

The server can, of course, give away your information and further reduce your privacy. However, as of June 2017, most of these types of servers are run by volunteers who likely want to help protect your privacy, so this model can be more private than bank wallets or P2P lightweight wallets.

The following P2P lightweight wallets use decentralized peer discovery by default.

  • BRD

If you know of another compliant lightweight wallet, please tell us about it.

Information-theoretic privacy means that the privacy can’t be broken even if an attacker has unlimited computing resources.

Learn more: Information theoretic security (Wikipedia)