Blockchains are typically pseudonymous, with only some offering anonymity as a feature. Cryptocurrency users can choose from a combination of options – websites, software, techniques, and/or tokens – whether to heighten privacy or evade detection by law enforcement.

Tune in for a rundown of obfuscation methods with Chainalysis Chief Scientist Jacob Illum and you’ll learn:

  • How mixers and CoinJoin protocols work
  • What chain hopping entails
  • What distinguishes privacy coins from traditional cryptocurrencies like Bitcoin
  • Where obfuscation techniques fall short


Learn from these experts:

Nina Heyden


Jacob Illum

Chief Scientist