Bitcoin is surveillance money. This is not a rhetorical provocation. It is a technical fact. Every Bitcoin transaction is recorded on a public ledger, permanently and immutably. Chain analysis firms like Chainalysis, Elliptic, and CipherTrace have developed sophisticated tools that can trace Bitcoin flows across thousands of hops, link addresses to real-world identities, and reconstruct complete financial histories. The FBI, IRS, and Europol routinely use these tools to track criminal activity. According to Chainalysis’s 2025 Crypto Crime Report, blockchain analytics assisted in the recovery of over $9 billion in illicit funds across 2024 alone.
The transparency that makes Bitcoin auditable also makes it the most surveillable form of money ever created. Privacy coins and privacy chains exist to restore the financial privacy that cash provided and that transparent blockchains eliminated.
The Privacy Spectrum
Not all blockchain privacy is created equal. Projects fall on a spectrum from optional privacy features (bolt-on anonymity) to protocol-level privacy (private by default).
Transparent by default, optional privacy: Bitcoin, Ethereum (base layer). All transactions are public unless external tools (mixers, privacy layers) are used.
Optional privacy features: Zcash (shielded transactions available but not required), Litecoin (MimbleWimble extension blocks).
Private by default: Monero (all transactions private), Secret Network (all smart contract state encrypted).
Privacy computation layer: Aztec Network (private transactions on Ethereum), Penumbra (private DeFi on Cosmos).
The distinction matters enormously for both users and regulators. Optional privacy features are used by a small percentage of transactions, which makes the private transactions stand out, paradoxically drawing attention. Mandatory privacy ensures that all transactions look identical, providing privacy through uniformity.
Monero: Privacy as Protocol
Monero (XMR) is the most widely used privacy cryptocurrency, with a market capitalization consistently ranking in the top 30 and daily transaction volumes averaging 25,000-35,000 transactions. Its privacy is enforced at the protocol level through three interlocking mechanisms.
Ring Signatures
When a Monero user creates a transaction, the protocol automatically mixes the real transaction input with decoy inputs drawn from the blockchain. A ring signature proves that one of the signers in the ring authorized the transaction, but does not reveal which one. As of the most recent protocol upgrade, each transaction includes a ring of 16 members: the real input and 15 decoys. An observer cannot determine which input is genuine.
The statistical anonymity set of 16 is smaller than some critics consider sufficient. Research by Moser et al. and subsequent analysis have demonstrated that temporal analysis (examining the age of inputs in the ring) can reduce the effective anonymity set. Monero’s development team has addressed these attacks through successive protocol upgrades, enforcing minimum ring sizes and improving decoy selection algorithms.
Stealth Addresses
Every Monero transaction creates a one-time destination address. Even if the recipient publishes their Monero address, incoming payments use unique stealth addresses that cannot be linked to the published address without the recipient’s private view key. This means observing the blockchain reveals no information about which address received funds.
RingCT (Ring Confidential Transactions)
Transaction amounts are hidden using Pedersen commitments combined with range proofs (Bulletproofs+). An observer can verify that the transaction is valid (inputs equal outputs, no coins created from nothing) without learning the amounts transacted. This is a mathematical guarantee, not a policy promise.
Monero’s Limitations
Monero’s privacy is strong but not absolute. Several attack vectors deserve honest analysis:
Node-level surveillance. Monero transactions propagate through a peer-to-peer network. An adversary operating many nodes can perform traffic analysis to correlate transactions with IP addresses. Monero mitigates this with Dandelion++, a protocol that obscures the origin node of transactions, but sufficiently resourced adversaries (nation-states) may still perform correlation.
Exchange chokepoints. Converting Monero to fiat currency typically requires using an exchange, which applies KYC requirements. The privacy of the Monero blockchain is irrelevant if the conversion to traditional finance creates an identity link. This is the fundamental tension: on-chain privacy versus off-chain surveillance.
Regulatory pressure. Multiple exchanges have delisted Monero under regulatory pressure, including Binance, OKX, and several South Korean exchanges. Japan and South Korea have effectively banned privacy coin trading. The delisting reduces liquidity and accessibility, though Monero continues to trade on decentralized exchanges and through atomic swap protocols.
Zcash: Privacy Through Zero-Knowledge Proofs
Zcash (ZEC) takes a fundamentally different technical approach. Instead of mixing transactions with decoys, Zcash uses zero-knowledge proofs (specifically zk-SNARKs) to prove transaction validity without revealing the sender, recipient, or amount.
How Zcash Shielded Transactions Work
A shielded Zcash transaction generates a zero-knowledge proof that demonstrates:
- The sender owns the coins being spent
- The transaction amounts balance (inputs = outputs)
- No coins are double-spent
This proof is verified by network nodes without learning any of the underlying transaction data. The proof is mathematically sound: it reveals nothing beyond the validity of the transaction. The proof size is constant (approximately 200 bytes) regardless of the transaction complexity, and verification takes milliseconds.
The Transparent/Shielded Duality
Zcash supports two address types: transparent (t-addresses, which function like Bitcoin) and shielded (z-addresses, which use zk-SNARKs). Users can transact between any combination of address types.
This dual nature is Zcash’s most significant design compromise. As of 2025, approximately 15-20% of Zcash transaction value uses shielded addresses. The majority of transactions remain transparent, which means using shielded addresses is itself a distinguishing signal. When only a minority shields their transactions, the act of shielding becomes conspicuous.
The Zcash community has debated mandatory shielding for years. The counterargument is regulatory: mandatory privacy may trigger exchange delistings (as happened with Monero). The current approach allows exchanges to support Zcash via transparent addresses while offering shielded transactions for privacy-conscious users.
The Trusted Setup Controversy
Zcash’s original zk-SNARK implementation (Sprout) required a trusted setup ceremony where cryptographic parameters were generated by a multi-party computation. If any participant retained their secret randomness, they could create counterfeit Zcash undetectably. The Sapling upgrade used a more robust ceremony with 90 participants. The Orchard upgrade (deployed 2022) uses the Halo 2 proving system, which eliminates the trusted setup entirely, resolving this long-standing concern.
Secret Network: Encrypted Smart Contracts
Secret Network takes privacy beyond transactions to computation. While Monero and Zcash provide private transfers, Secret Network provides private smart contracts, where the input, output, and state of contract execution are encrypted.
Trusted Execution Environments
Secret Network achieves privacy through Trusted Execution Environments (TEEs), specifically Intel SGX (Software Guard Extensions). Smart contract code executes inside an SGX enclave, a hardware-isolated region of the processor where the operating system, hypervisor, and other software cannot observe the computation. Data is encrypted before entering the enclave and encrypted when leaving it.
This approach has different security assumptions than cryptographic privacy. Monero and Zcash rely on mathematical proofs: the privacy guarantee is as strong as the underlying cryptography. Secret Network relies on hardware security: the privacy guarantee is as strong as the SGX implementation. Intel SGX has been subject to multiple side-channel attacks (Foreshadow, SGAxe, Plundervolt), though Secret Network has implemented mitigations for known attacks.
Private DeFi on Secret
Secret Network’s privacy extends to DeFi applications. Secret Swap provides private token exchanges where the amounts, parties, and timing of trades are hidden from blockchain observers. Secret lending protocols offer private borrowing and lending. The SNIP-20 token standard (Secret Network’s equivalent of ERC-20) provides private token transfers by default.
The total value locked (TVL) in Secret Network DeFi applications has fluctuated between $30-80 million, significantly smaller than mainstream DeFi but representing the largest deployment of private smart contract infrastructure.
The TEE Debate
The use of TEEs rather than cryptographic proofs has divided the privacy community. Critics argue that TEE-based privacy is “security through obscurity” that depends on Intel’s hardware being free of vulnerabilities. Proponents argue that TEEs provide practical, performant privacy today, while fully homomorphic encryption and other cryptographic approaches remain too computationally expensive for general-purpose smart contracts.
The debate mirrors a broader tension in privacy engineering: should you ship imperfect privacy now, or wait for perfect privacy later? For Stealth Cloud, which uses Cloudflare’s V8 isolates rather than TEEs, the answer is pragmatic: use the strongest available isolation technology while acknowledging its limitations transparently.
Aztec Network: Privacy on Ethereum
Aztec Network brings privacy to Ethereum through a zk-rollup that supports private transactions and private smart contract execution. Aztec’s approach is significant because it does not require users to leave the Ethereum ecosystem: private transactions settle to Ethereum mainnet, inheriting its security guarantees.
Aztec’s Architecture
Aztec uses a novel proving system (UltraPlonk) to generate zero-knowledge proofs for transactions. The system supports:
- Private transfers: Send tokens without revealing sender, recipient, or amount
- Private DeFi: Interact with DeFi protocols (lending, trading) without revealing your position
- Private smart contracts: Execute arbitrary computation with encrypted inputs and state
Aztec’s Noir programming language allows developers to write smart contracts that compile to ZK circuits, enabling general-purpose private computation on Ethereum. This is the most ambitious approach to bringing privacy to the largest smart contract ecosystem.
Adoption and Metrics
Aztec Connect, the bridge between Ethereum mainnet and Aztec’s privacy rollup, processed over $1.2 billion in transaction volume before being deprecated in favor of the next-generation Aztec architecture. The new system, targeting mainnet deployment in 2026, promises fully programmable private smart contracts with Ethereum-level security.
Other Notable Projects
Penumbra brings private transactions and private DEX functionality to the Cosmos ecosystem. Its approach combines shielded transfers with a private decentralized exchange, enabling private trading without a centralized order book.
Namada is a multichain privacy layer that enables shielded transfers for assets from any connected blockchain. Its approach to privacy is asset-agnostic: you can shield Ethereum tokens, Cosmos tokens, or native assets through the same privacy set.
Iron Fish implements the Sapling protocol (from Zcash) as a standalone chain with every transaction shielded by default, avoiding Zcash’s transparent/shielded duality.
Firo (formerly Zcoin) uses the Lelantus Spark protocol for private transactions with no trusted setup, using a burn-and-redeem mechanism that breaks the transaction graph.
The Regulatory Pressure
Privacy coins and chains face escalating regulatory hostility. The pattern is consistent across jurisdictions:
Exchange delistings. Major centralized exchanges have delisted privacy coins in response to regulatory guidance. Binance removed Monero, Zcash, and other privacy tokens in multiple jurisdictions throughout 2023-2025. South Korea banned privacy coin trading entirely. Japan effectively prohibited exchange listings of privacy coins. The result: privacy coin liquidity increasingly migrates to decentralized exchanges and peer-to-peer trading.
FATF Travel Rule. The Financial Action Task Force’s Travel Rule requires that virtual asset service providers (VASPs) share sender and recipient information for transactions above a threshold (generally $1,000-3,000 depending on jurisdiction). Privacy coins, by design, cannot comply with this requirement. This creates a structural conflict between privacy technology and financial regulation.
The Tornado Cash precedent. The OFAC sanctioning of Tornado Cash and the arrest of its developers sent a chilling signal to privacy tool builders. If a mixing service on a transparent blockchain can be sanctioned, the legal risk for privacy coin developers and infrastructure operators is substantial.
Counter-trend: EU data protection. GDPR and the European Data Protection Board’s guidance on data minimization create a countervailing regulatory force. The right to financial privacy is not explicitly protected in most jurisdictions, but data protection principles argue against unnecessary surveillance of financial activity. Switzerland’s nFADP provides particularly strong privacy protections that create a more favorable environment for privacy infrastructure.
The Technical Arms Race
The competition between privacy technology and surveillance technology is an ongoing arms race.
Chain analysis versus privacy. Firms like Chainalysis have claimed the ability to trace Monero transactions in some cases, though these claims have been disputed and the methodologies have not been independently verified. Zcash’s shielded transactions have not been demonstrably traced. The analytical difficulty scales with the size of the anonymity set and the sophistication of the privacy mechanism.
Improving privacy technology. Monero’s continuous protocol upgrades (Bulletproofs+, Triptych ring signatures, Seraphis) progressively strengthen the anonymity guarantees. Zcash’s transition from Sprout to Sapling to Orchard has eliminated the trusted setup and improved proving efficiency. Aztec’s programmable privacy enables application-level privacy that adapts to new use cases.
Cross-chain privacy. Atomic swaps between privacy coins and transparent chains enable users to move between ecosystems without centralized exchanges. THORChain and other cross-chain DEXes provide privacy-preserving on/off ramps, though with varying degrees of metadata leakage.
Privacy Coins and Identity Infrastructure
The intersection of privacy coins with decentralized identity and wallet-based authentication creates new possibilities.
A user could authenticate with a SIWE-compatible wallet on a privacy chain, ensuring that their authentication address has no visible transaction history. The CAIP-122 standard (chain-agnostic Sign-In With X) enables this cross-chain authentication pattern.
Privacy chain addresses can serve as identity anchors without the on-chain correlation risks that exist on transparent blockchains. A Monero address, for instance, reveals nothing about the holder’s transaction history to any observer without the holder’s view key. This makes privacy chain addresses ideal for zero-KYC authentication where the authentication address should reveal nothing beyond key ownership.
For Stealth Cloud, privacy chains represent a potential extension of the GhostPass authentication model. Currently, GhostPass uses Ethereum addresses with the address hashed server-side. Support for privacy chain authentication would provide an additional layer of privacy: even the raw wallet address would be meaningless without the holder’s private keys, regardless of what the server stores.
The Philosophical Stakes
The debate over privacy coins is not a technical debate. It is a political debate about whether financial privacy is a right or a privilege.
Cash provides financial privacy. When you pay with physical currency, no intermediary records the transaction. No database logs the parties. No algorithm scores your spending patterns. Cash is private by default, not because of any explicit legal protection, but because of its physical properties: it leaves no digital trace.
Digital payment systems eliminated this privacy by default. Credit cards, bank transfers, and mobile payments create comprehensive financial surveillance as a side effect of digital transaction processing. Privacy coins do not create a new capability. They restore the privacy properties of cash to the digital domain.
The Stealth Cloud Manifesto argues that privacy is the new luxury: a capability that was once universal and free now requires sophisticated technology and deliberate effort to maintain. Privacy coins are the financial expression of this thesis. They are expensive to develop, difficult to use, and increasingly regulated. The simplest form of financial privacy, spending cash, is being systematically eliminated through cashless society initiatives. The replacement, digital financial surveillance, is presented as inevitable. Privacy coins demonstrate that it is not.
The Stealth Cloud Perspective
We build privacy infrastructure for data and communication, not for financial transactions. But the regulatory and technical forces arrayed against privacy coins are the same forces arrayed against privacy infrastructure broadly. The Tornado Cash precedent applies to mixers, to privacy chains, and to any system that makes surveillance architecturally difficult. Understanding the privacy coin ecosystem is understanding the battlefield on which all privacy infrastructure operates.