Pseudonymous
The pseudo-privacy property of a crypto wallet of having no default direct identity attached to the data stored on a blockchain network. Yet possibly having the capacity to recover the identity of the individual by tracking transactions through crypto exchanges which perform KYC onboarding to associate wallet addresses with personal identities.
References
- Anderson, Patrick D. 2021. âPrivacy for the Weak, Transparency for the Powerful: The Cypherpunk Ethics of Julian Assangeâ. Ethics and Information Technology 23 (3): 295â308. https://doi.org/10.1007/s10676-020-09571-x.
- Azouvi, Sarah. 2021. âLevels of Decentralization and Trust in Cryptocurrencies: Consensus, Governance and Applicationsâ. PhD Thesis, University College London. https://discovery.ucl.ac.uk/id/eprint/10139069/.
- Bailey, Andrew M., Bradley Rettler, and Craig Warmke. 2021. âPhilosophy, Politics, and Economics of Cryptocurrency II: The Moral Landscape of Monetary Designâ. Philosophy Compass 16 (11): 1â15. https://doi.org/10.1111/phc3.12784.
- Harvey, John, and Ines Branco-Illodo. 2020. âWhy Cryptocurrencies Want Privacy: A Review of Political Motivations and Branding Expressed in âPrivacy Coinâ Whitepapersâ. Journal of Political Marketing 19 (1â2): 107â36. https://doi.org/10.1080/15377857.2019.1652223.
- Jarvis, Craig. 2021. Crypto Wars The Fight for Privacy in the Digital Age: A Political History of Digital Encryption. CBC PRESS. https://www.routledge.com/Crypto-Wars-The-Fight-for-Privacy-in-the-Digital-Age-A-Political-History/Jarvis/p/book/9780367642488.
- Maddox, Alexia, and Luke J Heemsbergen. 2021. âDigging in Crypto-Communitiesâ Future-Making: From Dark to Dogeâ. M/C Journal 24 (2 SE-). https://doi.org/10.5204/mcj.2755.
- Renwick, Robin, and Rob Gleasure. 2021. âThose Who Control the Code Control the Rules: How Different Perspectives of Privacy Are Being Written into the Code of Blockchain Systemsâ. Journal of Information Technology 36 (1): 16â38. https://doi.org/10.1177/0268396220944406.
- West, Sarah Myers. 2018. âCryptographic Imaginaries and the Networked Publicâ. Internet Policy Review 7 (2): 1â16. https://doi.org/10.14763/2018.2.792.
- âââ. 2020. âSurvival of the Cryptic: Tracing Technological Imaginaries across Ideologies, Infrastructures, and Community Practicesâ. New Media and Society, 1461444820983017. https://doi.org/10.1177/1461444820983017.
- White, Molly. 2022. âAnonymous Cryptocurrency Wallets Are Not So Simpleâ. Molly White (blog). 12 February 2022. https://blog.mollywhite.net/anonymous-crypto-wallets/.