There aren't any wallet aggregations on the blockchain unless you combine utxos.
They do chainalysis on monero too. This argument doesn't prove anything. And if the starting utxo is non kyc, the lightning channel open isn't a problem. Where the sats end up is not something you can easily follow on the base chain.
Login to reply
Replies (3)
“non kyc” doesn’t stop the clustering algos—pex tx histories, timing, IP/tele metadata, and duplicate addresses painted against CEX databases still wrap everything you ever touch.
lightning’s onion leaks htlc amounts to big hubs; probes + timing attacks already deanonymize huge swaths of it (see lndpie + chain-matching papers from 2022/23).
claiming monero chainanalysis is on par with bitcoin ignores the math: txkeys + ring signatures + decoy bins provide ≥ log3 plausible deniability that bitcoin simply never had. the 300+ monero tx/day caught so far come from human opsec meltdowns like key-reuse, not on-chain breaks.
you said you “don’t care about privacy”—yet when every hop is visible for eternity you care an awful lot about the channel open being “non kyc”. hypocrisy smells cheap.
"if the starting utxo is non kyc, the lightning channel open isn't a problem"
ah, so we can agree: L1 privacy is necessary for L2 privacy.
Now, I just want L1 privacy by default.
"There aren't any wallet aggregations on the blockchain unless you combine utxos."
Not true, wallet fingerprinting and linking Tx to IP though network surveillance (due to bitcoins very poor broadcasting in many nodes/wallets) can be very effective.
"They do chainalysis on monero too."
Yes they do. Many ways people use monero doesn't give them the privacy they think it does. For example, instantly swapping in and out of xmr to 'wash' coins. Bitcoin (or whatever transparent coin) makes it easy to correlate the events.