| ▲ | tsimionescu a day ago | ||||||||||||||||
At some point, Bob will want to spend the coins on something that he needs. At that point, you'll be able to trace the whole chain of transactions and know that Bob got the coins from Alice. Sure, you won't know that Alice transferred the private keys to Bob, but you'll still see a chain of transactions that starts with money in a wallet associated with Alice and ends in a wallet associated with Bob. The private key transfer doesn't achieve anything at all: Bob could just as easily have opened a new wallet and asked Alice to transfer money there instead of his known wallet, nothing in the analysis would have changed. | |||||||||||||||||
| ▲ | scotty79 a day ago | parent [-] | ||||||||||||||||
True, but only if you monitor Bobs purchases. Funds are anonymous until you see them leave network. And that might be years or decades in the future. And one sale/purchae on uncontrolled exchange breaks the chain. | |||||||||||||||||
| |||||||||||||||||