web3/concepts/pseudonymous.md

15 lines
2.6 KiB
Markdown
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

# Pseudonymous
The pseudo-privacy property of a crypto [wallet](wallet.md) of having no default direct identity attached to the data stored on a [blockchain](blockchain.md) network. Yet possibly having the capacity to recover the identity of the individual by tracking transactions through [crypto exchanges](cryptoasset.md) which perform [KYC](kyc.md) onboarding to associate wallet addresses with personal identities.
## References
* Anderson, Patrick D. 2021. Privacy for the Weak, Transparency for the Powerful: The Cypherpunk Ethics of Julian Assange. Ethics and Information Technology 23 (3): 295308. https://doi.org/10.1007/s10676-020-09571-x.
* Azouvi, Sarah. 2021. Levels of Decentralization and Trust in Cryptocurrencies: Consensus, Governance and Applications. PhD Thesis, University College London. https://discovery.ucl.ac.uk/id/eprint/10139069/.
* Bailey, Andrew M., Bradley Rettler, and Craig Warmke. 2021. Philosophy, Politics, and Economics of Cryptocurrency II: The Moral Landscape of Monetary Design. Philosophy Compass 16 (11): 115. https://doi.org/10.1111/phc3.12784.
* Harvey, John, and Ines Branco-Illodo. 2020. Why Cryptocurrencies Want Privacy: A Review of Political Motivations and Branding Expressed in “Privacy Coin” Whitepapers. Journal of Political Marketing 19 (12): 10736. https://doi.org/10.1080/15377857.2019.1652223.
* Jarvis, Craig. 2021. Crypto Wars The Fight for Privacy in the Digital Age: A Political History of Digital Encryption. CBC PRESS. https://www.routledge.com/Crypto-Wars-The-Fight-for-Privacy-in-the-Digital-Age-A-Political-History/Jarvis/p/book/9780367642488.
* Maddox, Alexia, and Luke J Heemsbergen. 2021. Digging in Crypto-Communities Future-Making: From Dark to Doge. M/C Journal 24 (2 SE-). https://doi.org/10.5204/mcj.2755.
* Renwick, Robin, and Rob Gleasure. 2021. Those Who Control the Code Control the Rules: How Different Perspectives of Privacy Are Being Written into the Code of Blockchain Systems. Journal of Information Technology 36 (1): 1638. https://doi.org/10.1177/0268396220944406.
* West, Sarah Myers. 2018. Cryptographic Imaginaries and the Networked Public. Internet Policy Review 7 (2): 116. https://doi.org/10.14763/2018.2.792.
* ———. 2020. Survival of the Cryptic: Tracing Technological Imaginaries across Ideologies, Infrastructures, and Community Practices. New Media and Society, 1461444820983017. https://doi.org/10.1177/1461444820983017.
* White, Molly. 2022. Anonymous Cryptocurrency Wallets Are Not So Simple. Molly White (blog). 12 February 2022. https://blog.mollywhite.net/anonymous-crypto-wallets/.