Hacker Newsnew | past | comments | ask | show | jobs | submit | flarex's commentslogin

The decoy method doesn't even work because a smart criminal could just check your exchange withdrawals for amounts. You'd have to hope that they were ignorant enough.


It's becoming increasingly difficult. Data leaks, address and name leaks and chain analysis have made it easier to track who owns what. If crime agencies are able to track wallets down then criminals are too.


Maybe if your money is not on a public blockchain you don't have to worry about chain analysis.


Only the your onramp/offramp would need to know who you are (because of KYC/AML), otherwise you can be as anonymous as you want and it really isn't hard, assuming you don't want to hide from your onramp/offramp.


Onramps/offramps generally generate individual wallets per user to send/receive from, so it still goes back to you at the end of the day.


They either generate wallet address dynamically, and in those cases allow you to regenerate one at will.

Or, they have wallets that acts as combined input/output for all/groups of users.

I don't know a single big exchange that generates exactly one wallet per user and uses that one always for the same user.

When you think about it, it makes a lot of sense they do it like that.


First one maybe but definitely not the second one. Have you actually thought of it? How would the platform know who sent what. They can't. So it's definitely not shared on the deposit side. And I doubt they'd move the money around because of fees so I doubt it's shared on the withdrawal side too. From my experience, of course it depends on the blockchain used, but they all have static addresses per user


Addresses, sure, but not wallets.


Unless of course you want to use your hard earned crypto to buy tangible things over the Internet.


Why unless? Say you have 1 ETH in Wallet A, if you transfer it to your on/offramp (the exchange) and then do Wallet B, the only link between Wallet A and B is only known by the exchange, so you'll remain private (publicly, again assuming you don't want to hide from the exchange).


You can't trust the exchange to not inadvertently leak the information. A substantial leak could include personally identifying information along with account balances and or deposit and withdrawal totals.


Somewhere along to lines, if you want USD, you need to trust someone, it's inescapable. So once you know this, you can act accordingly.

But still, the original argument was that you have to worry about chain analysis because everything is public, but obviously that isn't true, no matter if an exchange may or maybe not inadvertently leak something.


Not really they are moving into homomorphic encryption where the entire query and processing is encrypted and Apple has no knowledge of the what you actually requested.


Completely unclear how much they're moving into homomorphic encryption. The only resource I'm available to find about it is an announcement from 30 July saying that they can now do caller ID lookup using homomorphic encryption and they've announced an SDK that developers can use to leverage it. But the announcement is so vague that it's entirely unclear how much this can actually be used for practical workloads. And, the idea that they're going to go all in on homomorphic encryption is speculative based on what Apple has revealed so far.

That's notable, as we're discussing a case where Apple said they would do something, and then not only didn't do it, but went out of their way to pretend that they never said they would.


Also, the homomorphic encryption is a requirement for third-party caller ID providers, not Apple themselves. Apple's first-party "Contact Photos" caller ID feature operates primarily on the "trust Apple" security model AFAIK.


I'm not aware of any other company of Apple's size (or anywhere approaching) that have been as committed to privacy tech. Of course they are not perfect and sometimes get it wrong but they constantly release new technologies that are furthering our privacy. Who else does it better?


It comes down to what you identify as privacy. Apple is commited to not give your data to any other company and keep it protected in their ecosystem. They'll sell access to you for ads, but only exposing your cohort to the advertiser.

From that lens, Google is also commited to never give your personal data (think Gmail content, Maps behaviour, pins etc) to other companies and keep it all in their ecosystem, for themselves only. Your data is their key advantage, the base of the ad empire, and they won't let another company run away with it.

If we call Apple privacy focused, Google also fits the bill, the question just falls down on whether we see Apple or Google as part of our intimate circle, within our private life. I assume you do for Apple but not for Google.


There is no serious person that could think that Google is a privacy focused company. Their entire business is founded on knowing everything about their users. It's an ad company. They need user data to function and they will never release tech that compromises their business. Just look at the direction of ad blocking and chrome to see where they are headed.


The Apple side is the similar: their current entire business is to middle man your relationship with other companies. You buy Apple products, purchase and subscribe to apps and services from the App store, use Apple Cloud, etc.

They need you in their ecosystem, the same way Google needs you in theirs.

And I totally agree with you, I wouldn't't call Google privacy focused, and I don't call Apple privacy focused either, even as they market it harder than anyone else.


Google is a privacy antagonist. Apple is privacy focused because it suits their business. Apple has been privacy focused for years and has built several technologies to prove it. It's not hollow marketing to build privacy software.


I don't define "privacy" as "only a single company has access to all my stuff", so to me Apple's claims are just marketing. I'd buy an argument about good security and some protection against other companies, just not "privacy".


Google is a "privacy antagonist" with an Open Source OS you can build locally and modify to your heart's content? And Apple's been privacy focused, suing security researchers for copyright violation when they try to analyze iOS?

Methinks you're holding a double standard. Compared to Android and Linux, Apple's "promise" is no better than the one Microsoft offers Bitlocker customers.


These companies shouldn't be graded on a curve. Everyone knows Microsoft is crap for privacy. But Apple has their reality distortion field, and it's important to show people that their privacy promises are BS.


Okay but from an evolutionary sense which company should we be supporting. The one company that is somewhat moving towards privacy or the 10 others that don't give a shit. Which one should survive. Would you like to see companies that copy Apple's privacy approach or Facebook's dumb fucks approach.


I was unaware there exists a fully homomorphic encryption scheme that has the right trade offs between security and computational effort to make this economically viable for even moderate to small workloads.

I’ve always thought it was either far too time or far too space intensive to be practical.

Do you have sources on this, either from Apple or academic papers of the scheme they’re planning on using?


They posted about this recently [0][1]. They are using Homomorphic Encryption in iOS 18 for Live Caller ID Lookups.

[0] https://www.swift.org/blog/announcing-swift-homomorphic-encr...

[1] https://news.ycombinator.com/item?id=41111129


I've posted about this above a little after you did. Reading the article, I'm unable to determine whether or not this has any practical utility outside of niche applications or if it has the potential to be broadly useful. Has anyone reviewed the SDK that can render an opinion?


Homomorphic encryption is broadly useful and in fact should be ubiquitous for remote computation that leaks private data (not to comment specifically on Apple's implementation). They did open source it though, which gives you an idea that they want others to follow.


Can you point to other ways this is used or is intended to be used?


It's useful for situations that would otherwise be illegal, so that tradeoffs are less relevant.


Following through on a public privacy promise does not require R&D.


That's the Bahamas not Bermuda.


Come on pretty mama..


Augur and Numerai are unlikely to be successful long run given their current usage. Filecoin is up in the air, Brave seems to be doing okay.


What's the issue with Numerai?


It has inbuilt clients that connect to Tor, IPFS and an ad blocker that can generate a small amount of income just for browsing the web. Their token is used to pay users for receiving adverts. ICO probably wasn't necessary but at the time it was a good way of both marketing and raising money.


Looks like the Brave BAT token trades at 0.29 USD, roughly the same price as five years ago. That seems like a good performance for a 2017 ICO since most of them went to zero.

I wonder how the secondary market works. It’s convenient for Brave to pay you in BAT for watching ads. Then you probably want to convert those BAT earnings to money since this is a token with no obvious reason to appreciate (as the price history shows). Who’s buying ad-earned BAT at 29 cents and why? Does Brave pay for market-making?


The people advertising buy BAT back from the users so they can continue advertising. As ads get served, BAT gets transferred from the advertiser to the user. The user then sells their BAT on an exchange, and advertisers buy it so they can continue advertising.


It should also be noted in the 7 years since launch that a large portion of that 59% would have been sold or lost and hence re-distributed to other users on the platform.


Some ecosystems have made significant progress on in browser and mobile light clients. For example: https://github.com/paritytech/substrate-connect/


Modern light clients don't use that much battery and are optimised for mobile usage. They even have very short start times making use of snapshotting and back filling headers i.e. you ask all nodes on the network that latest snapshot header close to the head and start from there working back towards genesis. This can be even faster than using an RPC and is far more decentralised.


North Korea didn't use them yet to layer stolen funds. Just a matter of time before ZCash and Monero developers are all arrested if this is the precedent.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: