The pseudo-privacy property of a crypto wallet of having no default direct identity attached to the data stored on a blockchain network. Yet possibly having the capacity to recover the identity of the individual by tracking transactions through crypto exchanges which perform KYC onboarding to associate wallet addresses with personal identities.


  1. Anderson, Patrick D. 2021. ‘Privacy for the Weak, Transparency for the Powerful: The Cypherpunk Ethics of Julian Assange’. Ethics and Information Technology 23 (3): 295–308.
  2. Azouvi, Sarah. 2021. ‘Levels of Decentralization and Trust in Cryptocurrencies: Consensus, Governance and Applications’. PhD Thesis, University College London.
  3. Bailey, Andrew M., Bradley Rettler, and Craig Warmke. 2021. ‘Philosophy, Politics, and Economics of Cryptocurrency II: The Moral Landscape of Monetary Design’. Philosophy Compass 16 (11): 1–15.
  4. Harvey, John, and Ines Branco-Illodo. 2020. ‘Why Cryptocurrencies Want Privacy: A Review of Political Motivations and Branding Expressed in “Privacy Coin” Whitepapers’. Journal of Political Marketing 19 (1–2): 107–36.
  5. Jarvis, Craig. 2021. Crypto Wars The Fight for Privacy in the Digital Age: A Political History of Digital Encryption. CBC PRESS.
  6. Maddox, Alexia, and Luke J Heemsbergen. 2021. ‘Digging in Crypto-Communities’ Future-Making: From Dark to Doge’. M/C Journal 24 (2 SE-).
  7. Renwick, Robin, and Rob Gleasure. 2021. ‘Those Who Control the Code Control the Rules: How Different Perspectives of Privacy Are Being Written into the Code of Blockchain Systems’. Journal of Information Technology 36 (1): 16–38.
  8. West, Sarah Myers. 2018. ‘Cryptographic Imaginaries and the Networked Public’. Internet Policy Review 7 (2): 1–16.
  9. ———. 2020. ‘Survival of the Cryptic: Tracing Technological Imaginaries across Ideologies, Infrastructures, and Community Practices’. New Media and Society, 1461444820983017.
  10. White, Molly. 2022. ‘Anonymous Cryptocurrency Wallets Are Not So Simple’. Molly White (blog). 12 February 2022.