{"id":35220,"date":"2025-05-14T07:42:09","date_gmt":"2025-05-13T23:42:09","guid":{"rendered":"https:\/\/ces.com.my\/?p=35220"},"modified":"2026-04-11T01:33:03","modified_gmt":"2026-04-10T17:33:03","slug":"can-you-make-bitcoin-truly-anonymous-a-case-led-look-at-practical-privacy-with-wasabi-wallet","status":"publish","type":"post","link":"https:\/\/ces.com.my\/?p=35220","title":{"rendered":"Can you make Bitcoin truly anonymous? A case-led look at practical privacy with Wasabi Wallet"},"content":{"rendered":"<p>What happens when you try to erase the fingerprints of a Bitcoin transaction in 2026 United States \u2014 and where do the technical and human limits show up? This article follows a concrete user scenario to explain how privacy-preserving tools work in practice, why they sometimes fail, and what trade-offs a U.S.-based user should weigh before trusting a wallet for \u201canonymous\u201d bitcoin activity.<\/p>\n<p>Our protagonist is Elena, a privacy-conscious small business owner in the U.S. who accepts bitcoin and wants to separate proceeds from public chain analysis and from her internet identity. She evaluates a privacy-first, non-custodial desktop wallet that implements CoinJoin and other features commonly used to improve unlinkability. We\u2019ll use that scenario to reveal mechanisms, expose common failure modes, and give decision-ready heuristics you can reuse.<\/p>\n<p><img decoding=\"async\" src=\"https:\/\/h17n.com\/wp-content\/uploads\/2022\/12\/wassabi-wallet-jpg.webp\" alt=\"Screenshot-like image of a privacy-focused Bitcoin desktop wallet interface; useful to explain features such as Coin Control, CoinJoin rounds, and connection settings.\" \/><\/p>\n<h2>How privacy tools break the obvious link: the mechanics behind CoinJoin and Wasabi\u2019s approach<\/h2>\n<p>At a surface level, CoinJoin pools coins from many users into one transaction so outputs can\u2019t be trivially paired with inputs. But the actual privacy gain depends on protocol details and client practices. Wasabi Wallet uses the WabiSabi protocol to coordinate multi-party CoinJoin rounds with a zero\u2011trust architecture: the coordinator organizes participants but cannot steal funds or mathematically map specific inputs to specific outputs. That structural point matters \u2014 it reduces a risk vector (coordinator theft or deterministic deanonymization) but does not eliminate all linking signals.<\/p>\n<p>Wasabi also layers technical measures that affect network- and node-level privacy. It routes traffic through Tor by default to hide IP-address correlations, and uses block filter synchronization (lightweight BIP-158 filters) so the client can locate its UTXOs without downloading the full blockchain. For users who want maximal backend independence, Wasabi supports custom node connections using BIP-158 filters, which removes the need to trust the default indexer for transaction discovery.<\/p>\n<h2>A step-by-step case: Elena\u2019s workflow and the privacy-critical choices<\/h2>\n<p>Elena\u2019s basic plan: receive customer payments to dedicated addresses, move proceeds into Wasabi, run several CoinJoin rounds, then spend from mixed outputs. Mechanism-first, here are the decisions that shape her outcome.<\/p>\n<p>1) Address hygiene. She creates a fresh receiving address for each customer payment. Reuse would create on-chain clusters that are trivial for analysis tools to exploit. This is low-hanging fruit: it\u2019s necessary but not sufficient.<\/p>\n<p>2) Network identity. She uses Wasabi over Tor to prevent linking her IP to specific requests. Tor integration reduces one major class of deanonymization (network observers or ISP-level correlation), but Tor is not a silver bullet: misconfigurations, leaks from other apps on the same machine, or compromised exit relays (relevant only for clearnet traffic) remain concerns.<\/p>\n<p>3) CoinJoin participation. Wasabi\u2019s WabiSabi CoinJoin mixes her UTXOs with others in rounds. The wallet\u2019s zero-trust design and recent internal refactor efforts (the project recently refactored the CoinJoin manager to a Mailbox Processor architecture) indicate active engineering to improve robustness and concurrency. However, since the official zkSNACKs coordinator shut down in mid-2024, Elena must either join a third-party coordinator or run her own coordinator to participate. Each option has trade-offs: running your own coordinator raises operational complexity but reduces reliance on external servers; using third parties is convenient but requires trust in their availability and honest behavior, even if the protocol design limits their ability to steal funds.<\/p>\n<h2>Where privacy breaks: subtle operational risks and user errors<\/h2>\n<p>Even with CoinJoin and Tor, privacy can be lost by simple user mistakes. Wasabi provides advanced Coin Control so users can select specific UTXOs; this is powerful, but dangerous if used incorrectly. Combining mixed (private) and unmixed (tainted) coins in a single spend recreates linkages. Similarly, sending mixed outputs in rapid succession to the same destination invites timing analysis: chain analysts correlate patterns of spending around the same times across multiple addresses.<\/p>\n<p>Hardware wallets present a particular limitation: keys must be online to sign an active CoinJoin transaction, which means direct CoinJoin participation from a hardware wallet is not possible. Users who keep most funds in cold storage must plan for that \u2014 either move a controlled amount into a hot wallet for mixing (accepting additional operational risk) or run mixing on a software wallet and later re-consolidate into cold storage using air-gapped PSBT workflows (Wasabi supports PSBT and air-gapped signing with devices like Coldcard).<\/p>\n<h2>Comparing three practical approaches: Wasabi, custodial mixers, and privacy-centric smart-contract services<\/h2>\n<p>To make choices clearer, compare Wasabi-style CoinJoin, custodial mixing services, and smart-contract-based privacy tools (not tied to Wasabi). Each fits different user profiles:<\/p>\n<p>&#8211; Wasabi \/ CoinJoin (non-custodial): Strong control, transparent open-source code, Tor + block filters for network and node privacy, and coin control to limit address clustering. Trade-offs: operational complexity, need to avoid linking mistakes, and dependency on coordinators (self-hosted or third-party). Zero-trust coordinator design mitigates some risks but not user errors.<\/p>\n<p>&#8211; Custodial mixers: Easy UX and immediate privacy if the provider is honest. Trade-offs: counterparty risk (custody of funds during the mixing period), opaque practices, regulatory exposure in the U.S., and higher risk of seizure or service shutdown. For privacy-conscious U.S. users, regulatory and legal risk is a real consideration.<\/p>\n<p>&#8211; Smart-contract or protocol-layer privacy services: These can automate mixing or obfuscation without a single coordinator, but they may require different chains or wrapped assets, creating additional on\/off\u2011ramp traceability and custody concerns. Their privacy guarantees depend on adoption and protocol design and are not interchangeable with native-Bitcoin CoinJoin strategies.<\/p>\n<h2>One sharper mental model: privacy is a stack, not a switch<\/h2>\n<p>A useful heuristic: treat Bitcoin privacy as layered defenses. At the bottom are protocol-level tools (UTXO model, CoinJoin), in the middle are network and node choices (Tor, custom node, block filters), and at the top are human operational practices (address reuse, timing, coin control). A failure at any layer can convert otherwise strong protections into weak ones. For example, perfect CoinJoin rounds lose much of their value if a user later mixes protected outputs with tainted funds or reveals links via reused addresses.<\/p>\n<p>Decision-useful rule: protect the weakest link. If you cannot maintain strict operational discipline (separate wallets, cooldown times between spends, no address reuse), then relying solely on a mixing tool will offer limited privacy. Conversely, disciplined workflows amplify the concrete technical protections provided by a platform like Wasabi.<\/p>\n<h2>What to watch next: signals and recent project developments<\/h2>\n<p>Two recent project-level signals matter for users like Elena. First, developers opened a pull request to warn users if no RPC endpoint is set; that change highlights a growing attention to the risks of default backend trust \u2014 the warning nudges users toward safer setups like connecting a personal Bitcoin node. Second, the refactor of the CoinJoin manager toward a Mailbox Processor architecture is an internal resilience improvement that could make CoinJoin rounds more reliable at scale, reducing race conditions and improving the user experience for simultaneous rounds. Both are small but meaningful operational steps: they don\u2019t change the protocol guarantees, but they lower the chance of user-level mistakes and backend surprises.<\/p>\n<p>In the U.S. context, also watch regulatory signals: enforcement priorities and subpoenas can affect third-party coordinators or custodial mixers. Non-custodial, open-source tools reduce legal exposure compared with custodial providers, but they do not make users invisible to lawful process if on-chain analysis or linking via other data sources reveals identities.<\/p>\n<div class=\"faq\">\n<h2>FAQ<\/h2>\n<div class=\"faq-item\">\n<h3>Is CoinJoin the same as making bitcoin \u201canonymous\u201d?<\/h3>\n<p>No. CoinJoin increases unlinkability by combining inputs and outputs, but it is not absolute anonymity. It raises the cost and complexity for chain analysis, yet network leaks, user errors, timing, address reuse, and external data can still produce deanonymization. Treat CoinJoin as a strong privacy tool when used correctly and combined with Tor and disciplined operational practices \u2014 not as a single-click anonymity guarantee.<\/p>\n<\/p><\/div>\n<div class=\"faq-item\">\n<h3>Can I use my hardware wallet with CoinJoin?<\/h3>\n<p>You can integrate hardware wallets into Wasabi for general spending and cold storage management, but direct participation in CoinJoin rounds from a hardware wallet is infeasible because the keys need to be online to sign an active, coordinated transaction. A common workflow is to move a limited hot balance into Wasabi for mixing, then PSBT-sign and move mixed funds back to cold storage using air-gapped methods; Wasabi supports PSBT and devices like Coldcard for this purpose.<\/p>\n<\/p><\/div>\n<div class=\"faq-item\">\n<h3>Should I run my own coordinator or use a third-party?<\/h3>\n<p>Running your own coordinator reduces reliance on third parties and can strengthen resilience, but it raises operational complexity and requires bandwidth and uptime. Third-party coordinators are easier but require trust in their availability and honest behavior; protocol-level zero-trust design helps, but it doesn\u2019t solve all risks. For privacy-minded users in the U.S., self-hosting merits consideration when you can maintain it securely.<\/p>\n<\/p><\/div>\n<div class=\"faq-item\">\n<h3>How important is running my own Bitcoin node?<\/h3>\n<p>Very useful if you want to reduce backend trust. Wasabi can use block filters to avoid downloading the full blockchain, but connecting to your node with BIP-158 filters removes reliance on the default indexer for transaction discovery. This improves privacy and trust assumptions, though it requires resources and some technical setup.<\/p>\n<\/p><\/div>\n<\/div>\n<p>Practical takeaway for Elena and similar U.S. users: privacy is achievable but operationally bounded. Use Tor, avoid address reuse, separate funds into clear hot\/cold workflows, leverage CoinJoin rounds thoughtfully, and prefer non-custodial, open-source tools when legal\/regulatory risk is a concern. If you want to explore Wasabi\u2019s specific implementation, documentation and user guidance are available here: <a href=\"https:\/\/sites.google.com\/walletcryptoextension.com\/wasabi-wallet\/\">https:\/\/sites.google.com\/walletcryptoextension.com\/wasabi-wallet\/<\/a>.<\/p>\n<p>Finally, expect incremental improvements rather than a single breakthrough. Protocol and client-level engineering continues \u2014 the recent internal refactor and UX-oriented warnings are examples \u2014 but the long-term privacy posture of any user will remain a story of how well technical tools are combined with disciplined operational choices.<\/p>\n<p><!--wp-post-meta--><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What happens when you try to erase the fingerprints of a Bitcoin transaction in 2026 United States \u2014 and where [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_uag_custom_page_level_css":"","jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[1],"tags":[],"class_list":["post-35220","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"jetpack_publicize_connections":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Can you make Bitcoin truly anonymous? A case-led look at practical privacy with Wasabi Wallet - EE SENG<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ces.com.my\/?p=35220\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Can you make Bitcoin truly anonymous? A case-led look at practical privacy with Wasabi Wallet - EE SENG\" \/>\n<meta property=\"og:description\" content=\"What happens when you try to erase the fingerprints of a Bitcoin transaction in 2026 United States \u2014 and where [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ces.com.my\/?p=35220\" \/>\n<meta property=\"og:site_name\" content=\"EE SENG\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-13T23:42:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-10T17:33:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/h17n.com\/wp-content\/uploads\/2022\/12\/wassabi-wallet-jpg.webp\" \/>\n<meta name=\"author\" content=\"JH Chen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"JH Chen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ces.com.my\/?p=35220#article\",\"isPartOf\":{\"@id\":\"https:\/\/ces.com.my\/?p=35220\"},\"author\":{\"name\":\"JH Chen\",\"@id\":\"https:\/\/ces.com.my\/#\/schema\/person\/dfc1d8b8bec538abebc400ec2b979d7b\"},\"headline\":\"Can you make Bitcoin truly anonymous? A case-led look at practical privacy with Wasabi Wallet\",\"datePublished\":\"2025-05-13T23:42:09+00:00\",\"dateModified\":\"2026-04-10T17:33:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ces.com.my\/?p=35220\"},\"wordCount\":1619,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ces.com.my\/#organization\"},\"image\":{\"@id\":\"https:\/\/ces.com.my\/?p=35220#primaryimage\"},\"thumbnailUrl\":\"https:\/\/h17n.com\/wp-content\/uploads\/2022\/12\/wassabi-wallet-jpg.webp\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ces.com.my\/?p=35220#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ces.com.my\/?p=35220\",\"url\":\"https:\/\/ces.com.my\/?p=35220\",\"name\":\"Can you make Bitcoin truly anonymous? A case-led look at practical privacy with Wasabi Wallet - EE SENG\",\"isPartOf\":{\"@id\":\"https:\/\/ces.com.my\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ces.com.my\/?p=35220#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ces.com.my\/?p=35220#primaryimage\"},\"thumbnailUrl\":\"https:\/\/h17n.com\/wp-content\/uploads\/2022\/12\/wassabi-wallet-jpg.webp\",\"datePublished\":\"2025-05-13T23:42:09+00:00\",\"dateModified\":\"2026-04-10T17:33:03+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/ces.com.my\/?p=35220#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ces.com.my\/?p=35220\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ces.com.my\/?p=35220#primaryimage\",\"url\":\"https:\/\/h17n.com\/wp-content\/uploads\/2022\/12\/wassabi-wallet-jpg.webp\",\"contentUrl\":\"https:\/\/h17n.com\/wp-content\/uploads\/2022\/12\/wassabi-wallet-jpg.webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ces.com.my\/?p=35220#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ces.com.my\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Can you make Bitcoin truly anonymous? A case-led look at practical privacy with Wasabi Wallet\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ces.com.my\/#website\",\"url\":\"https:\/\/ces.com.my\/\",\"name\":\"EE SENG\",\"description\":\"Supply your pets with love\",\"publisher\":{\"@id\":\"https:\/\/ces.com.my\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ces.com.my\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ces.com.my\/#organization\",\"name\":\"EE SENG\",\"url\":\"https:\/\/ces.com.my\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ces.com.my\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ces.com.my\/wp-content\/uploads\/2019\/04\/eeseng-logo-slogan-200.png\",\"contentUrl\":\"https:\/\/ces.com.my\/wp-content\/uploads\/2019\/04\/eeseng-logo-slogan-200.png\",\"width\":200,\"height\":200,\"caption\":\"EE SENG\"},\"image\":{\"@id\":\"https:\/\/ces.com.my\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/ces.com.my\/#\/schema\/person\/dfc1d8b8bec538abebc400ec2b979d7b\",\"name\":\"JH Chen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ces.com.my\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b93b5be123e8fb291860027674982d4f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b93b5be123e8fb291860027674982d4f?s=96&d=mm&r=g\",\"caption\":\"JH Chen\"},\"url\":\"https:\/\/ces.com.my\/?author=2\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Can you make Bitcoin truly anonymous? A case-led look at practical privacy with Wasabi Wallet - EE SENG","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ces.com.my\/?p=35220","og_locale":"en_US","og_type":"article","og_title":"Can you make Bitcoin truly anonymous? A case-led look at practical privacy with Wasabi Wallet - EE SENG","og_description":"What happens when you try to erase the fingerprints of a Bitcoin transaction in 2026 United States \u2014 and where [&hellip;]","og_url":"https:\/\/ces.com.my\/?p=35220","og_site_name":"EE SENG","article_published_time":"2025-05-13T23:42:09+00:00","article_modified_time":"2026-04-10T17:33:03+00:00","og_image":[{"url":"https:\/\/h17n.com\/wp-content\/uploads\/2022\/12\/wassabi-wallet-jpg.webp"}],"author":"JH Chen","twitter_card":"summary_large_image","twitter_misc":{"Written by":"JH Chen","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ces.com.my\/?p=35220#article","isPartOf":{"@id":"https:\/\/ces.com.my\/?p=35220"},"author":{"name":"JH Chen","@id":"https:\/\/ces.com.my\/#\/schema\/person\/dfc1d8b8bec538abebc400ec2b979d7b"},"headline":"Can you make Bitcoin truly anonymous? A case-led look at practical privacy with Wasabi Wallet","datePublished":"2025-05-13T23:42:09+00:00","dateModified":"2026-04-10T17:33:03+00:00","mainEntityOfPage":{"@id":"https:\/\/ces.com.my\/?p=35220"},"wordCount":1619,"commentCount":0,"publisher":{"@id":"https:\/\/ces.com.my\/#organization"},"image":{"@id":"https:\/\/ces.com.my\/?p=35220#primaryimage"},"thumbnailUrl":"https:\/\/h17n.com\/wp-content\/uploads\/2022\/12\/wassabi-wallet-jpg.webp","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ces.com.my\/?p=35220#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ces.com.my\/?p=35220","url":"https:\/\/ces.com.my\/?p=35220","name":"Can you make Bitcoin truly anonymous? A case-led look at practical privacy with Wasabi Wallet - EE SENG","isPartOf":{"@id":"https:\/\/ces.com.my\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ces.com.my\/?p=35220#primaryimage"},"image":{"@id":"https:\/\/ces.com.my\/?p=35220#primaryimage"},"thumbnailUrl":"https:\/\/h17n.com\/wp-content\/uploads\/2022\/12\/wassabi-wallet-jpg.webp","datePublished":"2025-05-13T23:42:09+00:00","dateModified":"2026-04-10T17:33:03+00:00","breadcrumb":{"@id":"https:\/\/ces.com.my\/?p=35220#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ces.com.my\/?p=35220"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ces.com.my\/?p=35220#primaryimage","url":"https:\/\/h17n.com\/wp-content\/uploads\/2022\/12\/wassabi-wallet-jpg.webp","contentUrl":"https:\/\/h17n.com\/wp-content\/uploads\/2022\/12\/wassabi-wallet-jpg.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/ces.com.my\/?p=35220#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ces.com.my\/"},{"@type":"ListItem","position":2,"name":"Can you make Bitcoin truly anonymous? A case-led look at practical privacy with Wasabi Wallet"}]},{"@type":"WebSite","@id":"https:\/\/ces.com.my\/#website","url":"https:\/\/ces.com.my\/","name":"EE SENG","description":"Supply your pets with love","publisher":{"@id":"https:\/\/ces.com.my\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ces.com.my\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ces.com.my\/#organization","name":"EE SENG","url":"https:\/\/ces.com.my\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ces.com.my\/#\/schema\/logo\/image\/","url":"https:\/\/ces.com.my\/wp-content\/uploads\/2019\/04\/eeseng-logo-slogan-200.png","contentUrl":"https:\/\/ces.com.my\/wp-content\/uploads\/2019\/04\/eeseng-logo-slogan-200.png","width":200,"height":200,"caption":"EE SENG"},"image":{"@id":"https:\/\/ces.com.my\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/ces.com.my\/#\/schema\/person\/dfc1d8b8bec538abebc400ec2b979d7b","name":"JH Chen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ces.com.my\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b93b5be123e8fb291860027674982d4f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b93b5be123e8fb291860027674982d4f?s=96&d=mm&r=g","caption":"JH Chen"},"url":"https:\/\/ces.com.my\/?author=2"}]}},"jetpack_featured_media_url":"","uagb_featured_image_src":{"full":false,"thumbnail":false,"medium":false,"medium_large":false,"large":false,"1536x1536":false,"2048x2048":false,"yith-woocompare-image":false,"flash-square":false,"flash-big":false,"flash-grid":false,"woocommerce_thumbnail":false,"woocommerce_single":false,"woocommerce_gallery_thumbnail":false},"uagb_author_info":{"display_name":"JH Chen","author_link":"https:\/\/ces.com.my\/?author=2"},"uagb_comment_info":0,"uagb_excerpt":"What happens when you try to erase the fingerprints of a Bitcoin transaction in 2026 United States \u2014 and where [&hellip;]","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/paUiqk-9a4","_links":{"self":[{"href":"https:\/\/ces.com.my\/index.php?rest_route=\/wp\/v2\/posts\/35220","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ces.com.my\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ces.com.my\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ces.com.my\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ces.com.my\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=35220"}],"version-history":[{"count":1,"href":"https:\/\/ces.com.my\/index.php?rest_route=\/wp\/v2\/posts\/35220\/revisions"}],"predecessor-version":[{"id":35221,"href":"https:\/\/ces.com.my\/index.php?rest_route=\/wp\/v2\/posts\/35220\/revisions\/35221"}],"wp:attachment":[{"href":"https:\/\/ces.com.my\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=35220"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ces.com.my\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=35220"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ces.com.my\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=35220"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}