Wallet Fingerprinting
Privacy● Common

Techniques to identify which wallet software created a transaction based on idiosyncratic behaviors. Used by chain analysis to cluster transactions. Privacy-conscious wallets work to minimize distinguishing characteristics.

Technical Notes

Fingerprints: input ordering, change position, fee calculation, script types used, nLockTime/nSequence values, RBF signaling. Mitigations: BIP-69 (deterministic ordering, deprecated), randomization, matching common patterns.

Metadata

Visibility: Public
Created:1/3/2026by System

Actions