The Privacy Spectrum
Bitcoin privacy is not a binary state. It exists on a spectrum, ranging from completely public to maximally private. Understanding where you fall on this spectrum helps you assess your privacy posture and identify areas for improvement.
The Privacy Spectrum Levels
Characteristics: - All bitcoin held on KYC exchanges - Address reuse everywhere - Public donation addresses - No privacy tools used - All transactions visible on-chain
Risk: Maximum exposure. Anyone can see your entire Bitcoin history.
Characteristics: - Self-custody wallet - Fresh addresses for each receive - No address reuse - Basic coin control - Still using KYC bitcoin
Risk: Reduced but still significant. KYC anchor point remains.
Characteristics: - Non-KYC bitcoin acquisition - Running own node - Tor for Bitcoin activity - Good coin control practices - Hardware wallet for cold storage
Risk: Moderate. Good foundation but still traceable.
Characteristics: - CoinJoin usage (Whirlpool, JoinMarket) - PayJoin for spending - Multiple rounds of mixing - Good post-mix practices - Compartmentalized identities
Risk: Low. Significant privacy achieved.
Characteristics: - Self-hosted infrastructure - Regular privacy auditing - BIP47 or Silent Payments - Lightning for spending
Risk: Very low. Strong privacy against most adversaries.
Characteristics: - GrapheneOS or similar hardened OS - Tor for all internet activity - Air-gapped cold storage - Regular CoinJoin with large anonymity sets - Complete identity compartmentalization - Legal structures for holdings - Disaster recovery plan
Risk: Minimal. Only state-level adversaries could potentially deanonymize.
Where Do You Fall?
To assess your current privacy level, consider:
- How did you acquire your bitcoin? (KYC vs non-KYC)
- Where do you store it? (Exchange vs self-custody)
- Do you reuse addresses? (Yes vs no)
- Do you run your own node? (Yes vs no)
- Do you use CoinJoin? (Yes vs no)
- Do you use Tor? (Yes vs no)
- Do you practice good coin control? (Yes vs no)
- Do you use PayJoin? (Yes vs no)
- Do you use reusable payment codes? (Yes vs no)
- Do you audit your privacy regularly? (Yes vs no)
Moving Up the Spectrum
You do not need to jump from Level 0 to Level 5 overnight. Privacy is built in layers:
-
Start with the Basics
Move to self-custody, stop reusing addresses, learn about UTXOs.
-
Add Intermediate Layers
Run your own node, use Tor, acquire non-KYC bitcoin.
-
Add Advanced Techniques
Use CoinJoin, PayJoin, practice good post-mix hygiene.
-
Master OPSEC
Multisig, air-gapped signing, self-hosted infrastructure, regular auditing.
The Threat Model Question
Your ideal privacy level depends on your threat model:
| Threat Model | Recommended Level |
|---|---|
| Casual observer | Level 1-2 |
| Chain analysis company | Level 3 |
| Determined adversary | Level 4 |
| State-level adversary | Level 5 |