The HTTPS Moment for Ethereum Privacy: From Defensive Tools to Default Infrastructure

CN
1 hour ago

Author: ZHIXIONG PAN

The Ethereum Privacy Stack held during Devconnect Buenos Aires 2025 is the most significant privacy-themed gathering in the Ethereum ecosystem this year.

The most notable consensus from this event is the establishment of the concept of "Holistic Privacy": privacy is no longer just a collection of on-chain tools like zero-knowledge proofs (ZK) or mixers, but a complete closed loop that spans from the network transmission layer (Tor), RPC reading layer, data storage layer to the user interaction front end.

As emphasized by Vitalik Buterin and Tor project founder Roger Dingledine, if the underlying network leaks IP addresses, the anonymity at the application layer is meaningless. The community has reached a consensus that Ethereum must follow the "barrel theory," patching the weakest links in metadata leakage to truly become a censorship-resistant "world ledger."

Trend Insight: The Final Battle Towards "Default Privacy" and User Experience

Participants generally believe that Web3 privacy is experiencing a critical moment similar to Web2's transition from HTTP to HTTPS. Privacy technology should no longer be the domain of "geeks" or "hackers," nor should it carry the moral burden of "hiding crime." Through comparisons with Railgun, Kohaku wallet, and historical experiences from Web2, speakers pointed out that the next key step is to "stigmatize non-privacy behaviors," meaning that transparent transfers should be viewed as an abnormal behavior akin to "running naked on the internet."

By 2026, the Ethereum community aims to reduce the cost of private transfers to an acceptable range (e.g., only twice that of regular transfers) and achieve a one-click, seamless experience, thereby serving not only retail users but also opening doors for traditional financial institutions that cannot enter due to a lack of commercial confidentiality protection.

Core Controversy: The Compliance Spectrum and Concerns of "Civil War" within L1

Despite the gradual clarity of the technical roadmap, ideological tensions still exist. The biggest point of contention lies in the struggle between "compliance privacy" and "permissionless privacy." One side, represented by Privacy Pools, advocates for actively isolating illegal funds through "disassociation proofs" in exchange for regulatory tolerance and institutional adoption; the other side insists on pure crypto-punk spirit, believing that any form of compliance compromise will ultimately lead to censorship.

Additionally, Andy Guzman from PSE warned of a potential "civil war": whether privacy features should be integrated into the Ethereum core protocol layer (L1). Writing it into L1 could bring unified liquidity and default protection, but it may also introduce significant regulatory risks and protocol complexity. This choice will determine the political attributes of Ethereum's future.

Awakening of Infrastructure: The Last Line of Defense in Hardware and Anti-Censorship

In addition to discussions at the software level, this event rarely delved into the physical and network layers. From "running your own node" to the "de-trustification of Trusted Execution Environments (TEE)," the community realized that if hardware is implanted with backdoors, all upper-layer encryption will fail. Censorship resistance is redefined as public infrastructure akin to "fire exits," which may seem to have no market demand in peacetime, but is the only hope for survival in times of crisis. Whether building decentralized VPNs (like Nym, HOPR) or utilizing ZK-TLS for "guerrilla interoperability," efforts are being made to create a robust system even amidst extreme geopolitical conflicts.

Legal and Cultural Self-Rescue

In light of the experiences of Tornado Cash developers, the event was permeated with a sense of urgent "self-rescue." Legal experts and developers unanimously called for the establishment of strong legal defense funds and policy lobbying groups. Everyone recognized that protecting privacy is not just about writing code; it is a war for narrative power: the image of developers must shift from "potential accomplices of terrorists" to "defenders of freedom in the digital age." If the industry cannot unite to protect open-source contributors, technological progress will stagnate as no one dares to write code.

Below is a detailed summary of the 16 speeches and panels from this event.

1. Onionizing Ethereum

Speakers: Vitalik Buterin (Ethereum Foundation), Roger Dingledine (Tor Project)

This dialogue marks a significant conceptual shift in Ethereum's privacy vision. Vitalik pointed out that the Ethereum Foundation is promoting a plan to deeply integrate Tor and Onion Services into the entire Ethereum tech stack. This represents a shift in mindset: from focusing solely on transaction-level privacy (like ZK proofs) to a more comprehensive view of "holistic privacy." This holistic view encompasses writing privacy (transaction sending) and reading privacy (RPC data reading), aiming to prevent users from leaking IP addresses and access patterns when broadcasting transactions or reading on-chain data.

Roger Dingledine shared the current state of the Tor network as the underlying infrastructure for Bitcoin, noting that about three-quarters of Bitcoin nodes connect via onion addresses. He emphasized that merely achieving credential anonymity at the application layer is insufficient; if the underlying network transmission layer leaks IP addresses, the privacy protection at the application layer becomes meaningless. Ethereum's goal is to introduce mixnets and onion routing not only at the smart contract level but also at the P2P network layer to defend against denial-of-service attacks (DoS) targeting validators (Proposers) and enhance censorship resistance.

Vitalik further elaborated on the two meanings of "censorship": transaction censorship at the application layer and access censorship at the network layer. He emphasized that Ethereum's goal is to become a globally accessible ledger, allowing users and validators to access the network through Tor's Pluggable Transports (like Snowflake) even when facing national-level firewall blocks. This technology can disguise traffic as ordinary WebRTC video call traffic, thus bypassing blocks. This is not only about privacy but also about Ethereum's resilience and geographical decentralization as a "world ledger."

In future prospects, the two discussed the possibility of Ethereum validators (Stakers) simultaneously running Tor relay nodes. Since traffic for specific onion services does not require exit nodes (Exit Relay), this means validators can easily run non-exit relays, contributing bandwidth without assuming legal risks. If this initiative can be realized, it will significantly enhance Ethereum's underlying censorship resistance and privacy protection levels in the coming years, achieving a dual enhancement of user experience and network resilience.

2. Ethereum is for DefiPunk

Speaker: Hsiao-Wei Wang (Ethereum Foundation)

Hsiao-Wei's speech centered around the Ethereum Foundation's (EF) latest fiscal policy, introducing the concept of "DefiPunk," aimed at reinvigorating the spirit of Cypherpunk within the DeFi ecosystem. She pointed out that DeFi should not merely pursue yields but also embody characteristics of censorship resistance, open-source, and privacy protection. EF decided that its funding allocation should not only consider financial returns but also reflect Ethereum's core values, supporting projects that promote the long-term healthy development of Ethereum rather than merely chasing high APY or adopting centralized shortcuts.

To guide this strategy, she elaborated on the six core attributes of DefiPunk: Security, Open Source, Financial Self-sufficiency, Trust-minimized, Crypto Tools, and Privacy. Particularly regarding open-source, EF tends to support projects that adopt Free/Libre and Open Source Software (FLOSS) licenses to encourage true transparency and collaboration rather than commercial source code protection.

In specific standards, DefiPunk emphasizes that protocols must be permissionless, allowing users from any region to access; users must have complete control over their assets, rather than relying on third-party custody. Additionally, she particularly emphasized that privacy should not be a luxury in DeFi but a first-class citizen. EF encourages projects to mitigate censorship risks from centralized front ends through distributed front ends, independent UIs, or even command-line tools.

Finally, Hsiao-Wei called on the community and developers to collectively practice these values. EF's role is not only as a fund provider but also as a supporter of this ideology. She encouraged users to think like a true "DefiPunk" when choosing DeFi protocols: check the codebase, pay attention to whether the governance process is transparent, and verify the existence of immutable smart contracts. This speech challenges the current state of the DeFi industry, demanding a return to the original intention of decentralized finance, which is to provide uncensorable financial services for the oppressed and those unable to access banking services.

3. Privacy-Aware Mechanisms for Public Goods Funding

Guests: Camila Rioja (Plexos), Thomas Humphreys (EF), Tanisha Katara, Beth McCarthy, José Ignacio Trajtenberg

This panel discussion focused on how to balance transparency and privacy in Public Goods Funding. The panelists first shared real-world application cases, such as the aid distribution project in collaboration with UNICEF by Xcapit, and Brazil's attempts to manage community currency using blockchain technology. In these scenarios involving humanitarian aid and vulnerable groups, privacy is not only about data protection but also a critical factor concerning the safety of beneficiaries' lives.

The core tension of the discussion lies in the trade-off between "transparency" and "privacy." Transparency is necessary for the distribution outcomes of funds to ensure that money flows to the right places and has an impact; however, at the participation level, especially in voting and identity verification, privacy is crucial. If voting is completely public, it can create bribery markets and social pressure, leading to distorted governance outcomes. By introducing zero-knowledge proof (ZK) primitives, it is possible to verify voting eligibility and results without disclosing specific ballots, thus achieving anti-collusion governance.

The guests also explored how technical tools can adapt to the needs of different jurisdictions. For example, in some countries, collecting specific data may be legal, while in others (like Germany), the same data collection could violate GDPR. Therefore, building a global public goods funding tool should not attempt to meet all compliance requirements but should create flexible, privacy-first infrastructure that allows local communities to adapt according to their needs.

Finally, the discussion looked ahead to future technological directions, including privacy-protecting prediction markets and self-sustaining public goods funding mechanisms. The guests unanimously agreed that technology should not only address efficiency issues but also return to a "human-centered" design philosophy. Through ZK identity proofs and privacy voting tools, user data can be protected while preventing Sybil attacks, thereby establishing a fairer and safer community governance system.

4. Who pays for privacy? The real cost of building aligned apps

Speaker: Lefteris Karapetsas (Rotki)

Lefteris opened with a sharp observation about the current state of the industry: "If the product is free, then you are the product."

He pointed out that current internet applications generally exchange free services for a data tax, where users' data is collected and sold. To break this cycle, he proposed the concept of "Aligned Apps," which are software that truly serves user interests, respects data sovereignty, prioritizes local needs, and is non-tracking. However, building such applications faces significant engineering challenges and cost pressures.

Using his own developed tool Rotki (a local-first asset tracking tool) as an example, he detailed the hidden costs of developing privacy applications. Unlike SaaS products, local applications cannot easily conduct A/B testing or collect error logs; developers must package binaries for multiple operating systems, handle local database migrations, and pay expensive code signing certificate fees. This means lower development efficiency and an inability to monetize user data, making the business model more challenging.

Lefteris strongly advised developers not to rely on donations or grants for survival, as this is a dead end. He argued that privacy applications must have a clear business model and charge users directly. This is not only to sustain development but also to educate users: privacy has explicit costs. Through a freemium model, corporate support, or specific paid features (like advanced data analytics), developers can achieve predictable recurring revenue.

At the end of his talk, he called for a new covenant relationship between users and developers. Users should realize that paying is not just for the current software features but also to support a future that is non-surveillance and non-malicious. He encouraged developers to price confidently, not to undervalue their work, and to maintain financial transparency to earn community trust. Building "Aligned Apps" itself is a punk act, a rebellion against the monopolies of cloud computing giants and data surveillance.

5. Ethereum Privacy Ecosystem mapping

Guests: Mykola Siusko, Antonio Seveso, cyp, Alavi, Kassandra.eth

This panel attempted to clarify the complex and fragmented Ethereum privacy ecosystem. The guests unanimously agreed that the core of the ecosystem is not just to list all privacy protocols but to understand the relationships between them. The current privacy ecosystem is mainly divided into several vertical areas: on-chain privacy (such as stealth addresses, privacy pools), network layer privacy (such as mixnets), and the most critical connection layer—user experience (UX). UX is seen as the bridge connecting these disparate technological components, determining whether privacy technology can truly be adopted by the public.

The discussion mentioned the subtle relationship between "compliance" and "privacy." The guests reflected on the limitations of building privacy tools solely for regulatory defense. They believe that privacy should not merely be defined as a defensive technology (to prevent surveillance) but should be viewed as a collaborative community effort, a tool that can unlock new capabilities for users and communities. Overemphasizing the "defensive" narrative may actually limit the imagination of the product.

Regarding regulation and compliance, the guests expressed strong views: building a global product that fully complies with all jurisdictional requirements is unrealistic and even naive. Rather than trying to embed compliance within the protocol layer (which often means leaving backdoors), it is better to build a universal privacy infrastructure and empower users with the right to selectively disclose information at the application layer (such as View Keys). This protects users from comprehensive surveillance while retaining the ability to prove compliance when necessary.

Finally, the guests emphasized the importance of breaking the technological "echo chamber," calling for closer ties with privacy organizations outside the crypto space (such as Tor, EFF, Signal). The future ecosystem map should not just be a stack of technologies but should include legal aid, hackathons, education, and advocacy organizations. Normalizing, socializing, and even making privacy fun is key to the next step in the ecosystem's development.

6. Ethereum Institutional Privacy now

Guests: Oskar Thorin, Zach Obront, Amzah Moelah, Eugenio Reggianini, Francois

Oskar Thorin first introduced the Ethereum Foundation's Institutional Privacy Task Force (IPTF) and its mission: to help traditional financial institutions migrate to Ethereum while meeting their privacy needs. The current trend is that institutions are no longer refusing to go on-chain due to regulation but are unable to do so because of a lack of privacy. Even if only 1% of traditional financial funds enter Ethereum, the impact on the privacy ecosystem would be enormous.

During the panel, guests from ABN Amro (Dutch Bank) and Etherealize shared the real pain points of institutions. Institutions do not want to use the global liquidity of public chains, but they cannot accept having trading strategies, positions, or customer data fully public on-chain. Unlike retail users, institutions need not only privacy but also "control": clarity on who can see what data and when. This control needs to be detailed down to specific business flows, such as bond issuance, loan settlement, or secondary market trading, with each scenario having different transparency requirements.

Francois from Polygon Miden introduced how they address this issue through a mixed account model (Account + UTXO): users can maintain a private state locally and only prove the validity of transactions to the public network when necessary. The discussion also covered the application of zero-knowledge proofs (ZK) in compliance reporting, using ZK technology to prove an institution's solvency or compliance to regulators without disclosing underlying data.

The guests unanimously agreed that the future direction is not to build isolated private chains but to construct a privacy layer on the Ethereum public chain. By decoupling identity verification (KYC/KYB), strategy execution, and compliance reporting, institutions can enjoy the security and liquidity of Ethereum while maintaining their business secrets. The maturity of this architecture will be a key turning point for large-scale institutional adoption of Ethereum around 2026.

7. Privacy Without Terrorists

Speaker: Ameen Suleimani (0xbow)

Ameen's talk opened with a parable about the pollution of Patagonia's lakes, vividly metaphorizing the dilemma of Tornado Cash: when a few individuals ("terrorists"/hackers) pollute public resources (privacy pools), it results in punishment for everyone (ordinary users). He reviewed the history of Tornado Cash, pointing out that developers should not be held responsible for users' illegal actions, but he also posed a sharp question: ordinary users, when using mixers, are effectively providing privacy cover for hackers. Therefore, the community has a responsibility to build a new system that protects the privacy of legitimate users while not empowering criminals.

This is the core idea of Privacy Pools. Unlike Tornado Cash, Privacy Pools allow users to publicly "dissociate" themselves from illegal funds (such as those from North Korean hackers) through zero-knowledge proofs. When users withdraw, they can prove that their funds come from a legitimate deposit pool without disclosing the specific source of the deposits. This meets regulatory anti-money laundering requirements while preserving users' on-chain privacy.

Ameen detailed the management mechanism of 0xbow. The system introduces KYT (Know Your Transaction) checks, requiring deposits to be approved. If 0xbow identifies an illegal source for a deposit, it can remove it from the compliant pool but cannot freeze user funds. He particularly emphasized the "Rage Quit" mechanism: even if a user's deposit is later marked as non-compliant, or if 0xbow decides to cease operations, the smart contract still guarantees that users can withdraw their principal at any time. This achieves a "non-custodial but permissioned" privacy model.

Finally, Ameen previewed the roadmap for Privacy Pools V2, which is set to be released at EthCC (Paris). V2 will support shielded transfers, allowing peer-to-peer payments within the pool without the need to withdraw to a new address as required in V1. V2 effectively trades some fungibility for recoverability, aiming to build privacy infrastructure for "good people" and prevent developers from going to jail for writing code.

8. Is censorship resilience truly necessary?

Speaker: Mashbean (Matters.lab)

Mashbean posed a troubling question: if censorship resistance is so important, why do products centered around it struggle to survive? Drawing on five years of operational experience with Matters.news (a decentralized content publishing platform), he revealed the misalignment between "market demand" and "survival demand." While marginalized groups (dissidents, journalists) have a strong moral need for censorship resistance, this market is small and lacks purchasing power. Most ordinary users care more about content quality than whether the platform is censorship-resistant.

He delved into the "Honeypot Paradox": building censorship-resistant platforms naturally attracts the most sensitive content, thereby centralizing risk. This not only invites blockades from authoritarian governments but also leads to an influx of spam and scam content attacks. Ironically, to combat spam, platforms often have to introduce some form of moderation, which creates tension with the original intent of censorship resistance. In fact, large-scale spam attacks have triggered automatic fraud detection systems in democratic countries, resulting in platforms being mistakenly banned, creating a new form of "transnational joint censorship."

In the face of these dilemmas, Mashbean proposed some counterintuitive solutions. First, instead of building a single large platform, modular components (storage, identity, payment) should be created, allowing small communities to reuse this infrastructure and avoid becoming obvious attack targets. Second, developers must "eat their own dog food," meaning they must adopt high levels of operational security (OpSec) and privacy payments themselves, as developers are also a high-risk group.

The conclusion is that censorship-resistant technology should not be viewed as a typical commercial product but as a public infrastructure akin to "fire exits" or "seat belts." You wouldn't ask about the total addressable market (TAM) of fire exits, but they are lifesaving in a fire. Therefore, the funding model for such projects needs to change, mixing public funds, charitable donations, and community ownership, with success metrics not based on revenue but on how many people can still speak and survive under pressure.

9. Guerilla Interoperability

Speaker: Andreas Tsamados (Fileverse)

Andreas's talk was highly combative, comparing the current Web2 internet to a city filled with "Hostile Architecture," where giants control users through walled gardens, DRM, and data lock-in. To combat this "Enshittification," he proposed the concept of "Guerilla Interoperability." This is a user-driven tactical resistance that forcibly achieves interoperability using technical means without the permission of dominant platforms, reclaiming data sovereignty.

He detailed the technical arsenal for achieving this goal, particularly ZK-TLS (Zero-Knowledge Transport Layer Security). This technology allows users to generate cryptographic proofs of their interactions with Web2 sites (such as banks, social media), thereby bringing Web2 data into the Web3 world without permission. This means developers can build applications that attach to existing monopolistic platforms, siphoning off and surpassing them without waiting for the platforms' APIs to open.

Andreas advocated for a culture of "revolutionary optimism," rejecting the fatalism of the current internet state. He showcased tools developed by Fileverse, such as ddocs.new and dsheets.new, which are decentralized alternatives to Google Workspace. They are not only end-to-end encrypted but also support inviting collaborators through ENS, with data stored on IPFS.

The core recommendation of the talk is: do not wait for the giants to have a change of heart, but use programmable accounts, decentralized storage, and ZK technology to forcibly build alternatives. This "digital right to repair" movement calls on developers to leverage existing closed system infrastructures to provide users with better privacy and sovereignty options until the giants are forced to accept this new normal.

10. Building infrastructural resilience

Guests: Sebastian Burgel, ml_sudo, Pol Lanski, Kyle Den Hartog

This panel turned its attention to the physical and hardware layers. The guests pointed out that if our underlying hardware is untrustworthy, then the privacy of the software built on top is like being built on a sand pile. Current chips (like Intel SGX) often sacrifice security for performance and are vulnerable to side-channel attacks. ml_sudo introduced the Trustless TEE (Trusted Execution Environment) initiative, aimed at building completely open-source hardware chips, with transparent and verifiable designs and manufacturing processes, to adapt to the increasingly fragmented geopolitical threat model.

Pol Lanski (Dappnode) emphasized the importance of self-hosting. He believes that while the current user experience is not good enough, our goal should still be "everyone runs their own node." This is not only for decentralization but also a form of civil disobedience, a "vote with your feet" approach. When laws (like Chat Control) attempt to monitor all communications, running your own relay nodes and servers is the most effective way to make those laws unenforceable.

Sebastian (HOPR) made an interesting point: "Nerds protect networks." While we hope ordinary users can participate, it is actually that small group of geeks willing to tinker with hardware and run nodes that forms the frontline of network defense. Therefore, the ecosystem should respect and empower this geek culture while also striving to lower the hardware barrier so that more people can participate.

The discussion ultimately returned to the "why" question. In this age of rampant AI forgery and networked everything, only through untrusted hardware and infrastructure can we retain "humanity" in the digital world—ensuring that you are interacting with real people and that your data is not being stolen. The resilience of this infrastructure is our last line of defense against digital authoritarianism.

11. Kohaku wallet on Ethereum

Speaker: Nicolas Consigny (EF)

Nicolas announced a new project led by the Ethereum Foundation—Kohaku. This is a collection of primitives focused on privacy and security, including an SDK and a reference implementation of a browser extension wallet (based on Ambire fork). The goal of Kohaku is not to become another competing wallet but to provide high-quality open-source components for other wallet developers to use like a "buffet," thereby raising the privacy standards of the entire ecosystem.

The core highlight of Kohaku is that it greatly simplifies the usage threshold of privacy protocols. It integrates privacy protocols like Railgun and Privacy Pools, allowing users to switch with one click in the wallet interface to send assets directly to privacy pools without complex setups. Additionally, Kohaku introduces a connection system of "one account per dApp," preventing users from mistakenly associating the same address with multiple applications, thus reducing metadata leakage.

In terms of hardware security, Kohaku has achieved several significant breakthroughs. The team collaborated with ZKnox to enable signing ZK transactions of Railgun directly on hardware wallets, meeting the needs of advanced users for "cold storage + privacy." They also showcased a universal hardware application layer, allowing the same privacy signing logic to run on Keystone, Keycard, and even low-cost DIY hardware.

Nicolas's presentation demonstrated the EF's pragmatic attitude towards privacy: not seeking to change the world overnight but building secure, user-friendly SDKs (like the OpenLV connection suite) that allow existing wallets to easily integrate Tor network support and privacy transaction features. Kohaku plans to launch a public testnet during EthCC in April next year, marking a new phase of standardization and modularization for Ethereum application layer privacy.

12. Private voting in DAOs

Guests: Joshua Davila, Lasha Antadze, Anthony Leuts, Jordi Pinyana, John Guilding

This discussion delved into the necessity of private voting in DAOs and real-world governance. Anthony (Aragon) bluntly pointed out that the lack of privacy leads to false governance: under the pressure of transparent voting, 99% of proposals receive 99% approval because no one wants to be the "party pooper" or face retaliation. Private voting is not only to protect voters but also to obtain genuine public opinion, breaking this toxic "false consensus."

Representatives from Rarimo and Vocdoni shared their experiences implementing private voting in high-risk environments (such as under oppressive regimes). In these scenarios, participating in voting can lead to imprisonment, making identity privacy a matter of life and death. Technically, the current challenge lies in how to combine real-world identities (such as passports, biometrics) with on-chain privacy, preventing Sybil attacks (one person, multiple votes) while ensuring that ballots are untraceable.

John (MACI) emphasized the importance of anti-collusion. Privacy voting is not just about anonymity; it must also ensure "you cannot prove who you voted for" to prevent vote buying. If voters can generate a proof saying "I voted for A" for the buyers, a vote buying market will form. MACI (Minimum Anti-Collusion Infrastructure) is dedicated to addressing this issue. He mentioned that the recent Gitcoin privacy round was a successful experiment, demonstrating that related technologies (such as quadratic voting combined with ZK identity) are close to being production-ready.

The guests unanimously agreed that 2026 will be a key year for the maturity of privacy voting protocols and their integration into mainstream DAO tools (such as Snapshot, Tally). Although the technology is largely ready, the biggest obstacle lies in perceptions: the crypto community is accustomed to "transparency equals justice," even viewing bribery as a normal DeFi mechanism. Changing this narrative and making people realize that privacy is the cornerstone of democracy is the upcoming political task.

13. From Tornado Cash to future developers protection

Guests: Marina Markezic, Fatemeh Fannisadeh, Ayanfeoluwa Olajide, Joan Arús

This was a panel filled with urgency and calls to action. Joan Arús shared the background of the formation of the Sentinel Alliance: an alliance composed of victims of spyware (such as Pegasus). He recounted the experiences of the Aragon and Vocdoni teams being monitored by government spyware for developing anti-censorship voting technology. This indicates that the threat has escalated from "prosecuting past crimes" to "preemptive surveillance," targeting the potential uses of open-source code.

The lawyers detailed the escalation of legal risks. Current anti-terrorism laws are defined extremely broadly, and any attempt to "disrupt political or economic structures" could be classified as terrorism. This means that developers creating decentralized finance or privacy tools could unknowingly be labeled as terrorists. Fatemeh warned that we cannot rely solely on bureaucratic processes to seek justice; we must establish proactive defense mechanisms.

Marina (EUCI) brought a glimmer of hope. She shared the latest developments in the EU regarding GDPR revisions, where, after lobbying, regulators are beginning to recognize the uniqueness of blockchain and may acknowledge privacy-enhancing technologies as a means to achieve GDPR compliance rather than an obstacle in the amendments. This proves that policy advocacy is effective.

Finally, the panel issued a strong call: the crypto industry has billions of dollars in capital and must stop using funds solely for parties, instead investing in legal defense funds and policy lobbying. If a legal framework to protect developers is not established, and if there is no unity against the trend of criminalizing open-source development, the next person to go to jail could be any developer present. This is not just a compliance issue; it is a survival battle for freedom.

14. Protocol-level privacy: Lessons from web2

Speaker: Polymutex (Walletbeat)

Polymutex provided a valuable reference framework for the popularization of Web3 privacy by reviewing the historical transition from HTTP to HTTPS in Web2. He pointed out that the early internet, like today's blockchain, had no privacy, for surprisingly similar reasons: immature cryptographic technology, regulatory uncertainty (cryptography was once seen as military hardware), and high performance overhead (handshake delays).

He summarized the four key stages of HTTPS popularization: 1. Making privacy possible (standard setting, such as SSL/TLS); 2. Making privacy legal (winning the right to encryption through litigation); 3. Making privacy cheap (hardware acceleration instruction sets); 4. Making privacy the default and the norm. Among these, the emergence of Let's Encrypt was a turning point, making it extremely simple and free to obtain certificates. The final stage was when browsers began marking HTTP sites as "not secure," thereby stigmatizing non-privacy behaviors.

Mapping this framework to Web3, we are currently doing well in the "possible" stage (privacy protocol standards); the "cheap" stage is being advanced through ZK hardware acceleration and precompiled contracts; however, we still face significant challenges in the "legal" stage (Tornado Cash case) and the "simple" stage (wallet integration). In particular, Web3 currently lacks an "Oh Shit Moment" like the Snowden incident to thoroughly awaken the public's awareness of privacy.

Polymutex's final conclusion is that we need tools (like WalletBeat) to monitor wallet privacy behaviors (such as RPC leaks) and promote privacy as the default setting. More importantly, the community needs to stigmatize non-privacy behaviors—just as browsers currently warn that HTTP is not secure, future wallets should warn users, "This is a public transaction; your finances will be monitored." Only by viewing non-privacy protection as an anomaly can privacy truly become widespread.

15. Privacy on Ethereum now: key challenges

Speakers: Alan Scott, Max Hampshire

Alan and Max explored the real pain points of building privacy protocols on the front lines in a light-hearted dialogue. The primary challenge is the narrative issue. Currently, using privacy tools (like Railgun) is often directly associated with illegal activities, "Why are you hiding? Are you afraid of the police?" This stigmatization deters ordinary users. They emphasized the need to shift the narrative from "hiding crime" to "protecting everyday financial security" (just like not wanting everyone to see your Visa bill).

Technical integration friction is another significant barrier. Alan mentioned that Railgun's SDK has hundreds of thousands of lines of code, and integrating such a massive entity into mainstream DeFi protocols like Aave is not only technically challenging but also risky. This is why DeFi protocols tend to prefer privacy layers to adapt to them rather than the other way around. Additionally, existing wallets (like those forked from Rabby) are often filled with various trackers (analytics), which contradicts the goals of privacy protocols.

Regarding network layer privacy, Max pointed out that this is a cat-and-mouse game. De-anonymization technologies (like traffic analysis) and anonymization technologies (like Mixnets) are constantly evolving. Relying solely on application layer privacy is insufficient; if ISPs or RPC nodes can see your IP and access patterns, on-chain privacy is significantly compromised. Therefore, network layer facilities like Nym need to be closely integrated with application layer protocols.

Finally, the two discussed how to expand the anonymity set. If privacy tools are only used by whales, their privacy effectiveness is limited. The goal must be to enable ordinary users to use privacy features (plug and play) without realizing it, even if just to prevent being front-run or to protect alpha. Only when there are enough "good people" and ordinary transactions can privacy networks truly provide protection.

16. Ethereum Privacy Roadmap

Speaker: Andy Guzman (PSE)

Andy Guzman provided a macro summary and outlook for the day's events. He proposed a simplified classification model for the privacy technology stack by PSE: Private Reads, Private Writes, and Private Porting. He pointed out through the Law of the Minimum that the strength of a privacy system depends on its weakest link. If we achieve perfect ZK privacy on-chain but leak IP at the RPC layer, the entire system still fails.

In terms of roadmap predictions, Andy boldly predicted that by November 2026 (the next Devcon), the issue of private transfers on Ethereum will be completely resolved. He noted that there are currently over 35 teams exploring about 13 different technical paths (from stealth addresses to privacy pools), and the richness of this ecosystem ensures that a superior solution will eventually emerge. Future solutions will be low-cost (only twice as expensive as regular transfers), low-latency, and one-click experiences.

He also raised a potential point of contention: should privacy be retained at the application layer or sunk into the core protocol layer (L1)? This could spark a "civil war" in the future. Writing privacy into L1 could bring better liquidity unification and default privacy, but it may also introduce regulatory risks and protocol complexity. He called for the community to engage in open discussions on this matter.

Finally, regarding compliance, Andy presented a spectrum from "permissionless privacy (Cypherpunk)" to "compliant privacy (Practical)." He believes that while the pure crypto-punk spirit is worth pursuing, we also need responsible solutions like Privacy Pools to encourage adoption by institutions and governments. The future of privacy on Ethereum should not be singular but rather a diverse ecosystem that accommodates different needs. PSE will continue to work on filling technological gaps to ensure Ethereum becomes a truly privacy-first network.

免责声明:本文章仅代表作者个人观点,不代表本平台的立场和观点。本文章仅供信息分享,不构成对任何人的任何投资建议。用户与作者之间的任何争议,与本平台无关。如网页中刊载的文章或图片涉及侵权,请提供相关的权利证明和身份证明发送邮件到support@aicoin.com,本平台相关工作人员将会进行核查。

Share To
APP

X

Telegram

Facebook

Reddit

CopyLink