Watch-Only Wallets & XPUB Privacy Risks
Discussing risks of XPUB exposure in watch-only wallets, including privacy leaks and theoretical future quantum threats. Mitigation involves running personal nodes, selective address import, or pre-generating addresses offline. Always verify receiving addresses directly on hardware before use.
Links:
Advanced Wallet Security & Seed Phrases
Optimal security favours air-gapped, open-source solutions like multisig or hardware wallets (e.g., SeedSigner). Seed phrase collision is cryptographically improbable (~2^256 entropy). Verify backup seeds using hardware features (e.g., Ledger Recovery Check) or a second offline device, never online software wallets.
Links:
Monero Privacy Techniques and Considerations
Monero utilizes ring signatures, stealth addresses, and Dandelion++ for transaction graph obfuscation. For enhanced privacy when swapping from traceable assets (e.g., via KYC), delay spending newly received XMR outputs (~20 mins). Upcoming FCMP++ aims to further enhance output indistinguishability.
Lightning Network Technical Resources
Resources are available for advanced understanding of the Lightning Network's mechanics. Explore its approach to mitigating double-spends, its role in scaling Bitcoin, and current protocol developments or projects built upon it via curated information hubs and dedicated courses.
Links:
- https://www.lopp.net/lightning-information.html
- https://planb.network/en/courses/theoretical-introduction-to-the-lightning-network-34bd43ef-6683-4a5c-b239-7cb1e40a4aeb
Order Book Analysis & Market Microstructure
Analyzing order book data for market maker footprints (e.g., spoofed orders, hidden liquidity walls) is discussed as a trading analysis technique. Tools like Dextools are mentioned for tracking large volume movements and order flow concentration as a way to infer whale activity.