Wallet Fingerprinting
Privacy● Common
Techniques to identify which wallet software created a transaction based on idiosyncratic behaviors. Used by chain analysis to cluster transactions. Privacy-conscious wallets work to minimize distinguishing characteristics.
Technical Notes
Fingerprints: input ordering, change position, fee calculation, script types used, nLockTime/nSequence values, RBF signaling. Mitigations: BIP-69 (deterministic ordering, deprecated), randomization, matching common patterns.
Metadata
Visibility: Public
Created:1/3/2026by System