{ "@context": "https://schema.org", "@type": "FAQPage", "@id": "https://status.network/blog/what-is-a-stealth-address-blockchain-privacy#faq", "url": "https://status.network/blog/what-is-a-stealth-address-blockchain-privacy", "mainEntity": [ { "@type": "Question", "@id": "https://status.network/blog/what-is-a-stealth-address-blockchain-privacy#faq-q1", "name": "What is a stealth address in simple terms?", "acceptedAnswer": { "@type": "Answer", "@id": "https://status.network/blog/what-is-a-stealth-address-blockchain-privacy#faq-a1", "text": "A stealth address is a one-time blockchain address generated for each transaction. Only the intended recipient can detect and access the funds, while external observers cannot link multiple payments to the same person." } }, { "@type": "Question", "@id": "https://status.network/blog/what-is-a-stealth-address-blockchain-privacy#faq-q2", "name": "Do stealth addresses hide the sender or the receiver?", "acceptedAnswer": { "@type": "Answer", "@id": "https://status.network/blog/what-is-a-stealth-address-blockchain-privacy#faq-a2", "text": "Stealth addresses primarily hide the receiver. The sender's address remains visible on-chain unless additional privacy techniques are used. Other methods such as mixers or ring signatures focus more on sender privacy." } }, { "@type": "Question", "@id": "https://status.network/blog/what-is-a-stealth-address-blockchain-privacy#faq-q3", "name": "What is ERC-5564?", "acceptedAnswer": { "@type": "Answer", "@id": "https://status.network/blog/what-is-a-stealth-address-blockchain-privacy#faq-a3", "text": "ERC-5564 is an Ethereum standard that defines how stealth addresses are implemented. It specifies how transactions are announced so recipients can detect incoming payments without revealing their identity publicly." } }, { "@type": "Question", "@id": "https://status.network/blog/what-is-a-stealth-address-blockchain-privacy#faq-q4", "name": "Are stealth addresses legal?", "acceptedAnswer": { "@type": "Answer", "@id": "https://status.network/blog/what-is-a-stealth-address-blockchain-privacy#faq-a4", "text": "Stealth addresses are a cryptographic privacy technique, not a regulated financial product. They provide privacy similar to sealed communication, but users remain responsible for complying with applicable laws such as tax reporting." } }, { "@type": "Question", "@id": "https://status.network/blog/what-is-a-stealth-address-blockchain-privacy#faq-q5", "name": "How does Status Network handle blockchain privacy?", "acceptedAnswer": { "@type": "Answer", "@id": "https://status.network/blog/what-is-a-stealth-address-blockchain-privacy#faq-a5", "text": "Status Network provides built-in privacy through its Bermuda layer, which supports confidential transactions, private balances, and stealth account functionality directly within the Layer 2 infrastructure." } }, { "@type": "Question", "@id": "https://status.network/blog/what-is-a-stealth-address-blockchain-privacy#faq-q6", "name": "Can stealth addresses work on Layer 2 networks?", "acceptedAnswer": { "@type": "Answer", "@id": "https://status.network/blog/what-is-a-stealth-address-blockchain-privacy#faq-a6", "text": "Yes. Layer 2 networks make stealth addresses more practical by reducing transaction costs. On gasless networks, recipients do not need to fund each new address with tokens to receive or manage funds." } }, { "@type": "Question", "@id": "https://status.network/blog/what-is-a-stealth-address-blockchain-privacy#faq-q7", "name": "What is the difference between a stealth address and a mixer?", "acceptedAnswer": { "@type": "Answer", "@id": "https://status.network/blog/what-is-a-stealth-address-blockchain-privacy#faq-a7", "text": "Stealth addresses create unique one-time addresses for each transaction using cryptography. Mixers combine funds from multiple users to obscure transaction history. Stealth addresses do not require pooled liquidity, third parties, or delays." } }, { "@type": "Question", "@id": "https://status.network/blog/what-is-a-stealth-address-blockchain-privacy#faq-q8", "name": "How does RLN prevent spam without revealing user identity?", "acceptedAnswer": { "@type": "Answer", "@id": "https://status.network/blog/what-is-a-stealth-address-blockchain-privacy#faq-a8", "text": "RLN uses zero-knowledge proofs to enforce transaction limits without revealing user identity. The system verifies that a user has not exceeded their quota while preserving privacy. If limits are exceeded, deterrents such as higher fees or penalties may apply." } } ] }
Get Status

What Is a Stealth Address? How Blockchain Privacy Actually Works

What Is a Stealth Address? How Blockchain Privacy Actually Works

A stealth address is a one-time cryptographic address generated fresh for every transaction. The sender creates it using the recipient's public key. Only the recipient can detect and spend funds sent to it. This breaks the on-chain link between sender and receiver, preventing anyone from mapping a user's full transaction history through blockchain explorers.

Why Are Public Blockchains Not Private?

Every transaction on Ethereum is visible to everyone. Send ETH to a friend once, and that link is permanent. Blockchain explorers index every transfer. Analytics firms build identity graphs from these patterns.

This creates real problems. Employers can see salary payments. Merchants can see your full balance. Attackers can identify high-value targets.

Privacy is not about hiding wrongdoing. It is about preventing surveillance of routine financial activity.

How Does a Stealth Address Work?

The mechanism relies on public key cryptography. The process has four steps.

Step 1: The recipient publishes a stealth meta-address. This is a special public key. It does not receive funds directly. Think of it as a mailbox number, not a street address.

Step 2: The sender generates a one-time address. Using the recipient's stealth meta-address and a random number, the sender computes a fresh address. This address has never appeared on-chain before.

Step 3: The sender publishes an announcement. A small piece of data goes to an on-chain announcement contract. This data helps the recipient (and only the recipient) find the transaction.

Step 4: The recipient scans and claims. The recipient checks announcements using their private key. When they find a match, they derive the spending key for that one-time address.

The result: every payment lands at a unique address. No outside observer can connect two payments to the same person.

What Is ERC-5564?

ERC-5564 is the Ethereum standard that defines stealth addresses. It specifies the announcement contract and the process for generating one-time addresses.

A companion standard, ERC-6538, handles the stealth meta-address registry. Users publish their meta-address once. Senders look it up to generate stealth addresses.

Together, these standards create an open protocol. Any wallet or dApp can implement stealth payments without custom infrastructure.

How Do Stealth Addresses Differ from Mixers?

Mixers pool funds from many users and redistribute them. They break links by blending transactions together. But mixers require liquidity, create delays, and face regulatory scrutiny.

Stealth addresses work differently. No pooling occurs. No third party holds funds. The privacy comes from cryptography, not from mixing with other users.

Feature Stealth Addresses Mixers
Mechanism One-time address per tx Pool and redistribute
Third party required No Yes (pool contract)
Liquidity needed No Yes
Delay None Often minutes to hours
Regulatory risk Lower Higher

Stealth addresses provide recipient privacy. Mixers provide sender privacy. They solve different problems.

What Problems Do Stealth Addresses Solve in DeFi?

DeFi users face a specific privacy gap. Every swap, loan, and yield deposit ties to a single address. Anyone can reconstruct a user's full financial strategy.

Stealth addresses help in several ways:

  • Receiving payments without exposing your main wallet
  • Collecting yield to a fresh address each time
  • Accepting DAO compensation without public salary disclosure
  • Receiving NFTs without linking buyer identity to a collection

On Layer 1 Ethereum, gas costs make stealth addresses expensive. Each new address needs ETH to move funds. This creates a bootstrapping problem.

Why Do Layer 2 Networks Change the Equation?

Layer 2 networks reduce transaction costs dramatically. This makes stealth address usage practical for everyday transactions.

On a gasless L2, the bootstrapping problem disappears entirely. Recipients do not need to fund each new stealth address with gas tokens before moving assets.

Status Network integrates privacy at the infrastructure level through its Bermuda privacy layer. Bermuda enables confidential transactions, private balances, and stealth accounts as native features of the network, not as bolted-on tools.

This design matters because privacy works best when it is the default. Optional privacy tools suffer from small anonymity sets. When only a few users opt in, their transactions stand out. Native privacy makes private transactions indistinguishable from normal ones.

How Does Rate Limiting Work with Private Transactions?

A gasless network must prevent spam without revealing user identity. Status Network solves this using Rate Limiting Nullifiers (RLN).

RLN uses zero-knowledge proofs to verify a user's transaction quota. The system checks that a user has not exceeded their limit. It does this without revealing who the user is.

The technical foundation includes Sparse Merkle Trees (height 20, supporting 1M accounts), Shamir's Secret Sharing, and ZKPs. Users who exceed their quota land on a Deny List and pay premium gas fees.

This approach replaces gas fees as the spam prevention mechanism. It preserves privacy while maintaining network fairness.

What Role Does Reputation Play in Private Networks?

Karma on Status Network is a soulbound token representing earned reputation. It cannot be bought, sold, or transferred. Users earn Karma through staking SNT, bridging assets, providing liquidity, and building apps.

Higher Karma unlocks greater gasless transaction throughput. This creates a reputation layer that works alongside privacy. Your transaction history stays private, but your contribution level is visible.

This separates identity from activity. Others can see that an account is reputable. They cannot see what that account has been doing.

What Comes Next for Stealth Address Adoption?

Stealth addresses are moving from research to production. ERC-5564 provides the standard. Layer 2 networks remove the cost barrier. Privacy layers like Bermuda make them native rather than optional.

The remaining challenges are practical. Wallet support needs to improve. Users need simple interfaces for scanning and claiming. Tax reporting tools must adapt to one-time addresses.

As these gaps close, stealth addresses will shift from a niche tool to a core feature of blockchain finance.

Frequently Asked Questions

What is a stealth address in simple terms?

A stealth address is a one-time address created fresh for each transaction. Only the intended recipient can detect and spend funds sent to it. Outside observers cannot link multiple payments to the same person.

Do stealth addresses hide the sender or the receiver?

Stealth addresses primarily hide the receiver. The sender's address remains visible on-chain unless combined with other privacy techniques. Mixers and ring signatures focus on sender privacy instead.

What is ERC-5564?

ERC-5564 is an Ethereum standard defining how stealth addresses work. It specifies the announcement mechanism that lets recipients discover payments sent to their one-time addresses without revealing their identity publicly.

Are stealth addresses legal?

Stealth addresses are a cryptographic technique, not a regulated financial product. They provide the same type of privacy that sealed envelopes provide for physical mail. Legal obligations like tax reporting still apply to the user.

How does Status Network handle blockchain privacy?

Status Network provides native privacy through its Bermuda layer. This includes confidential transactions, private balances, and stealth accounts built into the L2 infrastructure rather than added as optional tools.

Can stealth addresses work on Layer 2 networks?

Yes. Layer 2 networks make stealth addresses more practical by reducing transaction costs. On gasless networks like Status Network, recipients do not need to fund each new stealth address with gas tokens before using it.

What is the difference between a stealth address and a mixer?

Stealth addresses use cryptography to create unique one-time addresses. Mixers pool funds from multiple users to break transaction links. Stealth addresses need no liquidity pool, no third party, and introduce no delay.

How does RLN prevent spam without revealing user identity?

RLN uses zero-knowledge proofs to verify transaction quotas. The system confirms a user has not exceeded their limit without revealing who that user is. Users who exceed their quota pay premium gas fees as a deterrent.

Download Status

Get Status