Welcome to Part Three of this three-part series on privacy coins. Here, I will make the concluding remarks of this series, proclaim my loyalties based on the analysis of Part Two, and plant my flag. This section gives some of my clear opinions on privacy coins, and analyzes my favorite privacy coin, Particl. Overall AnalysisIn my opinion, the most ...
Welcome to Part Two of this three-part series on privacy coins. Part One gave us the background for why privacy coins exist and how they work to introduce fungibility to the payment network through various privacy protocols. Part Two deals with how to evaluate the strengths and weaknesses of a privacy coin, relative to others and according to your ...
If you're looking for a quick and easy way to assess what the best privacy coin in the current space is, which has the best features, or which is most likely to give high returns, then this is not that guide. My goal is to give you the power to make your own decisions, to clearly state my biases, and educate. I really wanted to understand this nich...
Have you noticed that as the price of Bitcoin goes up, altcoin prices go up? And have you also noticed that as the price of Bitcoin goes down, altcoin prices go down? This might seem like basic information if you are already a crypto-enthusiast. But perhaps, like myself, you would like to have a deeper understanding of what exactly is happening wit...
Imagine that you are the creator of a useful tool that you think will help society. You spend endless nights perfecting the design, favoring your creative brain over your social obligations, developing a deep relationship with your work, and just maybe not recognizing the person in the mirror with bags under their eyes. You care. Your end product p...
When you think about privacy violations, do you think about 1984 style mass surveillance? Many people do. But there are other large and powerful entities that can commit another form of privacy infraction — that against the business owner. A larger company that provides a service to a smaller one can use its access to the smaller company's business...