Chain Analysis / Blockchain Analysis
Privacy● Common

Techniques for de-anonymizing Bitcoin transactions by analyzing the public blockchain. Heuristics include common-input-ownership, change detection, address reuse, and timing correlation. Used by law enforcement and compliance firms. Privacy tools aim to defeat these methods.

Technical Notes

Companies: Chainalysis, Elliptic, CipherTrace. Heuristics: inputs from same tx = same owner, round amounts = payment, remainder = change. Countermeasures: CoinJoin, PayJoin, avoiding address reuse, Tor, coin control, same-type outputs.

Metadata

Visibility: Public
Created:1/3/2026by System

Actions