--- theme: default title: Stealth — Bitcoin Wallet Privacy Analyzer titleTemplate: '%s | Stealth' class: stealth-theme fonts: sans: Inter mono: JetBrains Mono lineNumbers: false drawings: persist: false transition: fade colorSchema: dark mdc: true ---

STEALTH

Bitcoin Wallet Privacy Analyzer

A read-only audit engine that surfaces wallet exposure at the UTXO level before funds move.

No keys UTXO-level findings Self-hostable
--- # The Problem

Visibility gap

Bitcoin privacy leaks are invisible to users


Companies can analyze your privacy better than you can.

--- # Why This Happens

Privacy is broken by patterns, not hacks

Common wallet patterns that leak privacy: - Multi-input transactions (CIOH / consolidation) - Combining coins - Address reuse - Sending change to same input address - Dust UTXOs - Exchange linkage / taint signals
--- ## Visibility Imbalance

Chainalysis users can see wallet-linkage signals that the average user cannot see about themselves.

Chainalysis
user
--- ## Privacy Parity

With Stealth, users gain visibility closer to institutional-grade analysis.

Chainalysis
user STEALTH
--- ## What Stealth Does

Input

Output

```bash # one click wpkh([xpub...]/0/*) -> Analyze ```

=> Full report with actionable, spend-aware insights

--- ## Vulnerabilities Detected
Detector Type Meaning
ADDRESS_REUSERepeated receive address links payment history
CIOHMulti-input ownership clustering signal
DUST / DUST_SPENDINGDust + normal co-spend linkage pattern
CHANGE_DETECTIONPayment and change outputs become distinguishable
CONSOLIDATION / CLUSTER_MERGEInput histories merged into one traceable cluster
SCRIPT_TYPE_MIXINGMixed script families create a wallet fingerprint
UTXO_AGE_SPREADOld/new spread leaks dormancy behavior
EXCHANGE_ORIGINProbable exchange withdrawal origin signature
TAINTED_UTXO_MERGETainted + clean merge propagates contamination
BEHAVIORAL_FINGERPRINTConsistent transaction style re-identifies wallet

Warnings: DORMANT_UTXOS and DIRECT_TAINT are shown as contextual risk signals.

--- ## How It Works

01

Parse

02

Fetch

03

Analyze

--- ## Demo Flow
  1. Input Paste descriptor and trigger analysis
  2. Load Fetch + parse + detect in one pipeline
  3. Report Summary bar: findings / warnings / transactions
  4. Inspect Expand finding cards for severity and evidence payloads
--- ## Demo

2x playback and compressed for lightweight deck rendering.

--- ## Roadmap

Expanded Heuristics

Improvements

Roadmap detectors are additive and keep the same read-only, no-key security model.

---

Thank You

STEALTH

Bitcoin Wallet Privacy Analyzer

Protect privacy before you broadcast intent.