Files
stealth/slides/slides.md
Herberson Miranda 8b1e9be146 Update slides.md
2026-02-27 12:12:31 -03:00

7.2 KiB

theme, title, titleTemplate, class, fonts, lineNumbers, drawings, transition, colorSchema, mdc
theme title titleTemplate class fonts lineNumbers drawings transition colorSchema mdc
default Stealth — Bitcoin Wallet Privacy Analyzer %s | Stealth stealth-theme
sans mono
Inter JetBrains Mono
false
persist
false
fade dark true

STEALTH

Bitcoin Wallet Privacy Analyzer

A read-only audit engine that surfaces wallet exposure at the UTXO level before funds move.

No keys UTXO-level findings Self-hostable

The Problem


Visibility gap

Bitcoin privacy leaks are invisible to users

  • Companies like Chainalysis can analyze wallet privacy
  • Users cannot
  • People may expose: full transaction history, identity links, and behavioral fingerprints

Companies can analyze your privacy better than you can.


Why This Happens


Privacy is broken by patterns, not hacks

Common wallet patterns that leak privacy:

  • Multi-input transactions (CIOH / consolidation)
  • Combining coins
  • Address reuse
  • Sending change to same input address
  • Dust UTXOs
  • Exchange linkage / taint signals

Visibility Imbalance

Chainalysis users can see wallet-linkage signals that the average user cannot see about themselves.

Chainalysis
user

Privacy Parity

With Stealth, users gain visibility closer to institutional-grade analysis.

Chainalysis
user STEALTH

What Stealth Does

Input

  • Paste a wallet descriptor

Output

  • Structured findings plus warnings
  • Type, severity, description, and evidence
  • Severity badges mapped directly from detectors
# one click
wpkh([xpub...]/0/*) -> Analyze

=> Full report with actionable, spend-aware insights


Vulnerabilities Detected


Detector Type Meaning
ADDRESS_REUSERepeated receive address links payment history
CIOHMulti-input ownership clustering signal
DUST / DUST_SPENDINGDust + normal co-spend linkage pattern
CHANGE_DETECTIONPayment and change outputs become distinguishable
CONSOLIDATION / CLUSTER_MERGEInput histories merged into one traceable cluster
SCRIPT_TYPE_MIXINGMixed script families create a wallet fingerprint
UTXO_AGE_SPREADOld/new spread leaks dormancy behavior
EXCHANGE_ORIGINProbable exchange withdrawal origin signature
TAINTED_UTXO_MERGETainted + clean merge propagates contamination
BEHAVIORAL_FINGERPRINTConsistent transaction style re-identifies wallet

Warnings: DORMANT_UTXOS and DIRECT_TAINT are shown as contextual risk signals.


How It Works


01

Parse

  • Extract addresses from descriptor
  • Normalize all common formats

02

Fetch

  • Load on-chain history per address
  • Use Bitcoin node or indexed API source

03

Analyze

  • Apply privacy heuristics and warnings
  • Flag each UTXO with findings and evidence

Demo Flow

  1. Input Paste descriptor and trigger analysis
  2. Load Fetch + parse + detect in one pipeline
  3. Report Summary bar: findings / warnings / transactions
  4. Inspect Expand finding cards for severity and evidence payloads

Demo

2x playback and compressed for lightweight deck rendering.


Roadmap

Expanded Heuristics

  • LEGACY_SCRIPT_EXPOSURE — old script usage (p2pkh / nested-only flows) shrinking anonymity set
  • ADDRESS_GAP_LEAK — sparse derivation usage exposing wallet generation behavior
  • AMOUNT_FINGERPRINT — repeated denomination templates across spends
  • TIME_PATTERN_FINGERPRINT — recurring timing cadence linking sessions

Improvements

  • Mainnet Support

  • Mobile Support

  • Cluster Visualization

  • One-click solution

Roadmap detectors are additive and keep the same read-only, no-key security model.


Thank You

STEALTH

Bitcoin Wallet Privacy Analyzer

Protect privacy before you broadcast intent.