What Are Stealth Addresses? - Decrypt (2024)

In brief

  • Stealth addresses provide more privacy for transactions on Ethereum.
  • The system offers a method of privacy similar to generating a new address for each transaction but without the hassle of manually creating those addresses each time.
  • A stealth address can be thought of as a wallet address that is cryptographically tied to the recipient's public address, but that is only revealed to the parties transacting.

Decrypt’s Art, Fashion, and Entertainment Hub.

Discover SCENE

Stealth addresses provide privacy for transactions on Ethereum. While it’s impossible to completely hide a blockchain transaction, stealth addresses can, at the very least, conceal the recipient's identity. And in doing so, offer an added layer of protection for anyone who doesn't want the transaction data overtly tied to them.

On a distributed ledger (a public record of transactions), anyone can view details of a transaction such as the date, the amount, and the wallets or the entities involved. They can search the specific transaction ID or hash on a block explorer, such as etherscan for Ethereum or Blockstream for Bitcoin.

That said, attempts to enhance privacy in the Ethereum ecosystem aren't without challenges both from a regulatory and technical standpoint. Case in point: the obstacles with Tornado Cash in 2019 (OFAC sanctions aside). Ethereum co-founder Vitalik Buterin noted that the virtual currency mixer is only able to hide ETH or major ERC-20s tokens. This leaves a gap for other widely-used assets native to the Ethereum protocol such as POAPs, NFTs, and ENS names. Hence the reason for stealth addresses.

Stealth addresses can conceal the recipient's identity.

AD

Proposed by Buterin in a recent blog post, a "stealth address system" would offer enhanced privacy protections for users, regardless of how small the transaction size or the asset in question.

How do stealth addresses work?

Paraphrasing Buterin, this is how stealth addresses work:

Either the recipient (let’s call them “Bob”) or the sender (“Alice”) can generate a stealth address for the transaction. However, only the recipient, Bob, can control the transaction. Another way to think of a stealth address is as a wallet address that is cryptographically tied to Bob’s public address, but that is only revealed to the parties transacting.

To conceal their identity, Bob first needs to generate a secret “spending key,” which is then used to create a stealth "meta-address." The meta-address is then shared with the sender (Alice), who performs a computation to generate a stealth address that belongs to Bob.

Alice can then send any assets she wants to Bob. When Alice sends assets to the stealth address, she also publishes some extra cryptographic data on-chain (called an ephemeral pubkey) that helps Bob find the assets. Bob scans the chain for this cryptographic data; if he finds any, he uses his spending key to claim the assets.

AD

AD

Overall, this system offers a method of privacy similar to that of generating a new address for each transaction, but without the hassle of manually create those addresses each time. Along with sharing the meta-address with Alice, Bob can register it on ENS (Ethereum Name Service) as the stealth meta-address for something like bob.eth. In that scenario, and assuming Alice knows Bob owns bob.eth, Alice can then look up his stealth meta-address on ENS.

Challenges and limitations with stealth addresses

While the idea is still fairly embryonic, Buterin stated that the technology would be fairly easy to implement. But there are still several issues to solve; most notably, gas fees. As a newly-generated stealth address would contain no ETH, the owner of said address wouldn't be able to send any assets from it (to pay for gas fees) without first transferring ETH from another address. But by doing so, the transaction data would reflect on-chain data, thus defeating the purpose of it being anonymous.

Another long-term solution that Buterin proposed would be to use Zero-Knowledge Proofs, despite also being somewhat costly due to the extra gas required. Other potential pathways would be to use specialized transaction aggregators—something where users can pay for multiple transactions at once and then spend these prepaid transactions whenever necessary.

In his closing thoughts, Buterin stated that supporting stealth addresses would also require significant changes to the functionality of Ethereum-based wallets, and suggests that wallet developers should start working towards a multi-address model that is able to properly encrypt and decrypt transaction data along with create a new address for each application or new addresses for privacy-related reasons as well.

And while not perfect, stealth addresses are another tool to help increase the overall privacy in the Ethereum network and thus solve one of the bigger remaining challenges for the ecosystem to scale.

Stay on top of crypto news, get daily updates in your inbox.

What Are Stealth Addresses? - Decrypt (2024)

FAQs

What Are Stealth Addresses? - Decrypt? ›

Stealth Addresses increase security and anonymity by creating a unique, one-time address for each transaction. Consequently, even if a recipient gets multiple transactions, each is linked to a different address, enhancing privacy.

What is a stealth address? ›

Stealth addresses operate by creating unique addresses for each transaction, allowing only the intended recipient to access and identify the funds. To illustrate the process, consider a hypothetical scenario involving two individuals, Bob and Alice, using a cryptocurrency with stealth addresses.

How do Monero stealth addresses work? ›

The recipient's actual address is kept secret when a sender transfers funds using a stealth address; the transaction is broadcast to the network. The recipient does not directly generate a private key from the stealth address; the wallet is designed to identify incoming transactions.

What is stealth in crypto? ›

A cryptocurrency stealth address is a one-time wallet address used to create more anonymity in cryptocurrency transactions.

What is the double key stealth address protocol Dksap? ›

However, double-key stealth address protocol (DKSAP) requires the receiver to continuously calculate and determine whether it is the real receiver of the transaction until it detected a transaction that matches.

Can cold wallets be traced? ›

The address of your crypto wallet is visible to everyone on the blockchain it is built on. With all transaction recordings available on the public ledger, the transactions going in and out of your crypto wallet is visible to everyone.

What is considered stealth? ›

1. : sly or secret action. 2. : a design style intended to make an aircraft difficult to detect by radar. stealth.

Can police track Monero? ›

Its Confidential Transaction (CT) technology enhances ring signatures and stealth addresses, making on-chain transactions using Monero's native XMR coin almost impossible to trace.

Is Monero really untraceable? ›

Monero (XMR) is a secure, private and untraceable cryptocurrency known for its strong focus on privacy and anonymity. Transactions on the Monero (XMR) blockchain are confidential and cannot be traced, ensuring the privacy of its users.

Can Monero address be traced? ›

Is Monero Traceable by Law Enforcement or Hackers? Monero, a privacy-focused cryptocurrency, is designed to be untraceable, making it difficult for law enforcement or hackers to track transactions.

What is the point of stealth mode? ›

Sometimes, to protect a new product and to set their own pace for development, people decide to launch a startup operating in a temporary state of secrecy. This state is called stealth mode. In this mode, the startup aims to avoid the spotlight until it's ready to become public.

What is ghost in cryptocurrency? ›

Ghost is a Decentralized Proof-Of-Stake Privacy coin. Send/Receive anonymous payments using Anon or Blind addresses that are confidential using RingCT and Bulletproofs.

What is an example of a Monero address? ›

A raw Monero address is a set of 95 characters starting with a '4' or an '8'. The Monero donation address, for instance, is 888tNkZrPN6JsEgekjMnABU4TBzc2Dt29EPAvkRxbANsAnjyPbb3iQ1YBRk1UXcdRsiKc9dhwMVgN5S9cQUiyoogDavup3H.

Which privacy concern is addressed by the concept of a stealth address? ›

3. The stealth address technology primarily aims to hide transaction addresses and provide privacy protection for the recipients [24]. The sender computes a temporary address before the transaction, and the payment tokens are sent to that address.

What is stealth mode in information security? ›

Stealth mode is a feature in cybersecurity that allows an antivirus or firewall to operate in a way that remains invisible or undetectable to attackers. The purpose is to prevent attackers from detecting and exploiting vulnerabilities in the system.

What are vanity addresses? ›

Vanity addresses are a type of geographically 'dislocated' address in which the street name is that of a different street from the one on which the building entrance is actually located. Developers sometimes use such addresses in the belief that a prestigious street name enhances the market value of a property.

Top Articles
Latest Posts
Article information

Author: Jamar Nader

Last Updated:

Views: 6054

Rating: 4.4 / 5 (75 voted)

Reviews: 90% of readers found this page helpful

Author information

Name: Jamar Nader

Birthday: 1995-02-28

Address: Apt. 536 6162 Reichel Greens, Port Zackaryside, CT 22682-9804

Phone: +9958384818317

Job: IT Representative

Hobby: Scrapbooking, Hiking, Hunting, Kite flying, Blacksmithing, Video gaming, Foraging

Introduction: My name is Jamar Nader, I am a fine, shiny, colorful, bright, nice, perfect, curious person who loves writing and wants to share my knowledge and understanding with you.