From 06a828ed44e56a8f00c487503a515b59904a8eb2 Mon Sep 17 00:00:00 2001 From: Lucas Ontivero Date: Mon, 8 Jul 2024 08:06:53 +0000 Subject: [PATCH] deploy --- 404.html | 8 ++++---- FAQ/FAQ-Contribution.html | 6 +++--- FAQ/FAQ-GeneralBitcoinPrivacy.html | 6 +++--- FAQ/FAQ-Installation.html | 6 +++--- FAQ/FAQ-Introduction.html | 6 +++--- FAQ/FAQ-UseWasabi.html | 6 +++--- FAQ/index.html | 6 +++--- assets/{404.html-CSa7Nz9_.js => 404.html-DGGa0TW_.js} | 2 +- ...use.html-DbG97EUQ.js => AddressReuse.html-BZIIpGTg.js} | 2 +- assets/{BIPs.html-D5zJfk6V.js => BIPs.html-Dwwh4MNK.js} | 2 +- ...l-O2Wi4N0t.js => BackupBestPractices.html-DMW1-yKl.js} | 2 +- ....html-BStS9Wl_.js => BitcoinFullNode.html-Bs7E4TRd.js} | 2 +- ...urce.html-Dj6lYZQa.js => BuildSource.html-CB8LFRd2.js} | 4 ++-- ...oins.html-DN004OvY.js => ChangeCoins.html-BFdFQMtC.js} | 2 +- ...oinJoin.html-Dh9ky-gL.js => CoinJoin.html-5YDCAxeA.js} | 2 +- assets/{Coins.html-Cskm5RN2.js => Coins.html-DccT-AZB.js} | 4 ++-- ...asabi.html-DTuOXsd-.js => ColdWasabi.html-BDOafOTR.js} | 2 +- ...Drz65i8W.js => ContributionChecklist.html-PJh7KuO7.js} | 2 +- .../{Daemon.html-C329pe91.js => Daemon.html-I1RPJ_3x.js} | 4 ++-- ...ml-jKw4SlJ8.js => DeterministicBuild.html-RoLg3UQY.js} | 2 +- ...ode.html-FvOse1pm.js => DiscreetMode.html-tr5KQw1O.js} | 2 +- assets/{ELI5.html-DfDF-Qvi.js => ELI5.html-DR7wgsW5.js} | 2 +- ....html-CRS-Huqd.js => ExternalRestore.html-DfRPUUKG.js} | 2 +- ...html-CJS80rgG.js => FAQ-Contribution.html-BuaDVOGH.js} | 2 +- ...t5So.js => FAQ-GeneralBitcoinPrivacy.html-H_B_tf1u.js} | 4 ++-- ...html-LTT39ng4.js => FAQ-Installation.html-a94aUrlk.js} | 2 +- ...html-D5iJx8Cs.js => FAQ-Introduction.html-CmWmFBw4.js} | 2 +- ...bi.html-noM30uxn.js => FAQ-UseWasabi.html-uYBqV63A.js} | 4 ++-- ..._tRKqz.js => Glossary-GeneralBitcoin.html-ckdZxJsG.js} | 2 +- ...iXCt2At.js => Glossary-PrivacyWasabi.html-DqfNKkbh.js} | 2 +- ...e.html-D4f2GNqt.js => InstallPackage.html-B2XMhgob.js} | 2 +- ...{LICENSE.html-CcYHu7n7.js => LICENSE.html-tEi9Cyzl.js} | 2 +- ...ern.html-CCv43Rfj.js => LegalConcern.html-p1dtNiIf.js} | 2 +- ...l-BkVkjp52.js => NetworkLevelPrivacy.html-yEBz1wzp.js} | 2 +- ...BLh76ZwZ.js => PasswordBestPractices.html-DeqmX9LQ.js} | 4 ++-- ...{PayJoin.html-CDKaUHzz.js => PayJoin.html-CYU7F1JU.js} | 4 ++-- assets/{RPC.html-CWcUhsmq.js => RPC.html-DAODCFkf.js} | 6 +++--- ...{Receive.html-DJ-IChEN.js => Receive.html-B3vnDoLn.js} | 4 ++-- ...ecurity.html-zR3z54mc.js => Security.html-CjcZ0NtV.js} | 4 ++-- assets/{Send.html-D0pe3AOm.js => Send.html-D3Odg27s.js} | 2 +- ...tml-DmpGxDRn.js => StartupParameters.html-C0HQ6Gu6.js} | 2 +- ...{Testnet.html-p9vBqYtC.js => Testnet.html-DRlHBRt4.js} | 2 +- ...html-5x7EW62O.js => TransactionGraph.html-DKr0EbYV.js} | 2 +- ... => TransactionSurveillanceCompanies.html-BC3VvVts.js} | 2 +- ...html-tKnNedDb.js => WalletGeneration.html-mAdC83BR.js} | 4 ++-- ...tLoad.html-sLQIFgev.js => WalletLoad.html-CTTR-YGw.js} | 2 +- ...y.html-CvgB9Wgw.js => WalletRecovery.html-CU0GMqJf.js} | 2 +- ...VM.html-xF8KcB87.js => WasabiSetupVM.html-CivLF5Jv.js} | 4 ++-- ...l-BvkR2YhS.js => WhyFinancialPrivacy.html-DIgudC3m.js} | 2 +- ...l-BVdMCAaf.js => WhyPrivacyImportant.html-BCWac2YZ.js} | 2 +- assets/{app-3S7gIoGc.js => app-CwImt2bI.js} | 4 ++-- assets/{index.html-piASmjtj.js => index.html-BQ4xlI3R.js} | 2 +- assets/{index.html-D5H6XWPL.js => index.html-CW5NWqvN.js} | 2 +- assets/{index.html-CuyL9paf.js => index.html-CpUxP59l.js} | 2 +- assets/{index.html-B57YoAW6.js => index.html-DbNou2qf.js} | 2 +- assets/{index.html-CUUtnbsu.js => index.html-DsCPaNFb.js} | 2 +- assets/{index.html-C8GknQiE.js => index.html-QAa_NRbX.js} | 2 +- assets/{index.html-Bwp9TkQs.js => index.html-qf-rUQCE.js} | 2 +- building-wasabi/ContributionChecklist.html | 6 +++--- building-wasabi/LICENSE.html | 6 +++--- building-wasabi/Security.html | 6 +++--- building-wasabi/index.html | 6 +++--- getting-started/index.html | 6 +++--- glossary/Glossary-GeneralBitcoin.html | 6 +++--- glossary/Glossary-PrivacyWasabi.html | 6 +++--- glossary/index.html | 6 +++--- index.html | 6 +++--- using-wasabi/BIPs.html | 6 +++--- using-wasabi/BackupBestPractices.html | 6 +++--- using-wasabi/BitcoinFullNode.html | 6 +++--- using-wasabi/BuildSource.html | 6 +++--- using-wasabi/ChangeCoins.html | 6 +++--- using-wasabi/CoinJoin.html | 6 +++--- using-wasabi/ColdWasabi.html | 6 +++--- using-wasabi/Daemon.html | 6 +++--- using-wasabi/DeterministicBuild.html | 6 +++--- using-wasabi/DiscreetMode.html | 6 +++--- using-wasabi/ELI5.html | 6 +++--- using-wasabi/ExternalRestore.html | 6 +++--- using-wasabi/InstallPackage.html | 6 +++--- using-wasabi/PasswordBestPractices.html | 6 +++--- using-wasabi/PayJoin.html | 6 +++--- using-wasabi/RPC.html | 8 ++++---- using-wasabi/Receive.html | 6 +++--- using-wasabi/Send.html | 6 +++--- using-wasabi/StartupParameters.html | 6 +++--- using-wasabi/Testnet.html | 6 +++--- using-wasabi/WalletGeneration.html | 6 +++--- using-wasabi/WalletLoad.html | 6 +++--- using-wasabi/WalletRecovery.html | 6 +++--- using-wasabi/WasabiSetupVM.html | 6 +++--- using-wasabi/index.html | 6 +++--- why-wasabi/AddressReuse.html | 6 +++--- why-wasabi/Coins.html | 6 +++--- why-wasabi/LegalConcern.html | 6 +++--- why-wasabi/NetworkLevelPrivacy.html | 6 +++--- why-wasabi/TransactionGraph.html | 6 +++--- why-wasabi/TransactionSurveillanceCompanies.html | 6 +++--- why-wasabi/WhyFinancialPrivacy.html | 6 +++--- why-wasabi/WhyPrivacyImportant.html | 6 +++--- why-wasabi/index.html | 6 +++--- 101 files changed, 217 insertions(+), 217 deletions(-) rename assets/{404.html-CSa7Nz9_.js => 404.html-DGGa0TW_.js} (82%) rename assets/{AddressReuse.html-DbG97EUQ.js => AddressReuse.html-BZIIpGTg.js} (97%) rename assets/{BIPs.html-D5zJfk6V.js => BIPs.html-Dwwh4MNK.js} (97%) rename assets/{BackupBestPractices.html-O2Wi4N0t.js => BackupBestPractices.html-DMW1-yKl.js} (98%) rename assets/{BitcoinFullNode.html-BStS9Wl_.js => BitcoinFullNode.html-Bs7E4TRd.js} (98%) rename assets/{BuildSource.html-Dj6lYZQa.js => BuildSource.html-CB8LFRd2.js} (98%) rename assets/{ChangeCoins.html-DN004OvY.js => ChangeCoins.html-BFdFQMtC.js} (98%) rename assets/{CoinJoin.html-Dh9ky-gL.js => CoinJoin.html-5YDCAxeA.js} (99%) rename assets/{Coins.html-Cskm5RN2.js => Coins.html-DccT-AZB.js} (98%) rename assets/{ColdWasabi.html-DTuOXsd-.js => ColdWasabi.html-BDOafOTR.js} (99%) rename assets/{ContributionChecklist.html-Drz65i8W.js => ContributionChecklist.html-PJh7KuO7.js} (98%) rename assets/{Daemon.html-C329pe91.js => Daemon.html-I1RPJ_3x.js} (98%) rename assets/{DeterministicBuild.html-jKw4SlJ8.js => DeterministicBuild.html-RoLg3UQY.js} (89%) rename assets/{DiscreetMode.html-FvOse1pm.js => DiscreetMode.html-tr5KQw1O.js} (96%) rename assets/{ELI5.html-DfDF-Qvi.js => ELI5.html-DR7wgsW5.js} (98%) rename assets/{ExternalRestore.html-CRS-Huqd.js => ExternalRestore.html-DfRPUUKG.js} (96%) rename assets/{FAQ-Contribution.html-CJS80rgG.js => FAQ-Contribution.html-BuaDVOGH.js} (98%) rename assets/{FAQ-GeneralBitcoinPrivacy.html-AkZkt5So.js => FAQ-GeneralBitcoinPrivacy.html-H_B_tf1u.js} (99%) rename assets/{FAQ-Installation.html-LTT39ng4.js => FAQ-Installation.html-a94aUrlk.js} (99%) rename assets/{FAQ-Introduction.html-D5iJx8Cs.js => FAQ-Introduction.html-CmWmFBw4.js} (99%) rename assets/{FAQ-UseWasabi.html-noM30uxn.js => FAQ-UseWasabi.html-uYBqV63A.js} (99%) rename assets/{Glossary-GeneralBitcoin.html-B-_tRKqz.js => Glossary-GeneralBitcoin.html-ckdZxJsG.js} (99%) rename assets/{Glossary-PrivacyWasabi.html-BiXCt2At.js => Glossary-PrivacyWasabi.html-DqfNKkbh.js} (99%) rename assets/{InstallPackage.html-D4f2GNqt.js => InstallPackage.html-B2XMhgob.js} (99%) rename assets/{LICENSE.html-CcYHu7n7.js => LICENSE.html-tEi9Cyzl.js} (92%) rename assets/{LegalConcern.html-CCv43Rfj.js => LegalConcern.html-p1dtNiIf.js} (99%) rename assets/{NetworkLevelPrivacy.html-BkVkjp52.js => NetworkLevelPrivacy.html-yEBz1wzp.js} (99%) rename assets/{PasswordBestPractices.html-BLh76ZwZ.js => PasswordBestPractices.html-DeqmX9LQ.js} (99%) rename assets/{PayJoin.html-CDKaUHzz.js => PayJoin.html-CYU7F1JU.js} (98%) rename assets/{RPC.html-CWcUhsmq.js => RPC.html-DAODCFkf.js} (99%) rename assets/{Receive.html-DJ-IChEN.js => Receive.html-B3vnDoLn.js} (98%) rename assets/{Security.html-zR3z54mc.js => Security.html-CjcZ0NtV.js} (99%) rename assets/{Send.html-D0pe3AOm.js => Send.html-D3Odg27s.js} (99%) rename assets/{StartupParameters.html-DmpGxDRn.js => StartupParameters.html-C0HQ6Gu6.js} (98%) rename assets/{Testnet.html-p9vBqYtC.js => Testnet.html-DRlHBRt4.js} (98%) rename assets/{TransactionGraph.html-5x7EW62O.js => TransactionGraph.html-DKr0EbYV.js} (96%) rename assets/{TransactionSurveillanceCompanies.html-rwuC602A.js => TransactionSurveillanceCompanies.html-BC3VvVts.js} (99%) rename assets/{WalletGeneration.html-tKnNedDb.js => WalletGeneration.html-mAdC83BR.js} (98%) rename assets/{WalletLoad.html-sLQIFgev.js => WalletLoad.html-CTTR-YGw.js} (98%) rename assets/{WalletRecovery.html-CvgB9Wgw.js => WalletRecovery.html-CU0GMqJf.js} (97%) rename assets/{WasabiSetupVM.html-xF8KcB87.js => WasabiSetupVM.html-CivLF5Jv.js} (99%) rename assets/{WhyFinancialPrivacy.html-BvkR2YhS.js => WhyFinancialPrivacy.html-DIgudC3m.js} (98%) rename assets/{WhyPrivacyImportant.html-BVdMCAaf.js => WhyPrivacyImportant.html-BCWac2YZ.js} (98%) rename assets/{app-3S7gIoGc.js => app-CwImt2bI.js} (98%) rename assets/{index.html-piASmjtj.js => index.html-BQ4xlI3R.js} (91%) rename assets/{index.html-D5H6XWPL.js => index.html-CW5NWqvN.js} (92%) rename assets/{index.html-CuyL9paf.js => index.html-CpUxP59l.js} (94%) rename assets/{index.html-B57YoAW6.js => index.html-DbNou2qf.js} (96%) rename assets/{index.html-CUUtnbsu.js => index.html-DsCPaNFb.js} (97%) rename assets/{index.html-C8GknQiE.js => index.html-QAa_NRbX.js} (98%) rename assets/{index.html-Bwp9TkQs.js => index.html-qf-rUQCE.js} (93%) diff --git a/404.html b/404.html index 52a2c65f2..dbc03e035 100644 --- a/404.html +++ b/404.html @@ -27,11 +27,11 @@ Wasabi Docs - - + + -

404

Looks like we've got some broken links.
Take me home
- +

404

How did we get here?
Take me home
+ diff --git a/FAQ/FAQ-Contribution.html b/FAQ/FAQ-Contribution.html index d9d13f411..2df12e346 100644 --- a/FAQ/FAQ-Contribution.html +++ b/FAQ/FAQ-Contribution.html @@ -27,11 +27,11 @@ Contribution FAQ | Wasabi Docs - - + +

Contributions to Wasabi

How to donate to Wasabi Wallet?

Donations can be made to individual contributors and are highly appreciated.

You can become a Wasabika

How should I start contributing to Wasabi?

Thank you for considering to support this beautiful libre and open-source project! It is the responsibility of everyone using the software to contribute to its growth. Your help is deeply appreciated, and very much needed! First please read the contribution checklist to get introduced to the project and to start out in the right direction. Join our Slackopen in new window and check out our GitHub repositoryopen in new window, so that you can stay up-to-date with the latest contributions.

Is there a bounty program?

Yes! The beauty of Wasabi is that it's not just a very awesome wallet by default, but it has the additional opt-in CoinJoin service. This is provided by zkSNACKs Ltd.open in new window, and in exchange for this service, the user pays a coordination fee. In return, zkSNACKs is supporting several developers to dedicate their full time to contribute to this open-source project. There are also contribution games where a bounty is paid out to any contributor worthy the prize.

How can I report a bug?

Code is speech, and can never be perfect. Thus it is expected that there are many known and unknown bugs, quirks and issues in Wasabi. Such a complex software requires constant and rigorous review by the developers and the users, this is everyone's responsibility working with Wasabi.

When you stumble upon an issue that needs fixing, please first check the open issuesopen in new window and pull requestsopen in new window if there is already someone working on it. If yes, then you can comment your situation and bug report under the open issue. If no, then please consider to open a new issueopen in new window and give a detailed report on the problem. It is especially helpful when you provide a step-by-step guide on how to reproduce what you have found. There is constantly a lot of work done to the code base, thus it's good to know which version of Wasabi, and what operating system you are using. In some cases it might be useful to see your logs, though please consider your privacy and encrypt this data properly in direct communication with the developers.

DANGER

If you find a bug that puts users' privacy or security at serious risk, please take great care with responsible disclosure! Send an email to adam.ficsor73@gmail.com, preferably using PGP encryption 21D7 CA45 565D BCCE BE45 115D B4B7 2266 C47E 075Eopen in new window.

How can I request a feature?

Wasabi is a quite beautiful piece of software already. Yet there are also 1001 things that could be just a little better, or even quite substantially superior. The beauty and bane of libre and open-source software is that it is never complete, there is always more work to be done.

Regardless if you are a new user of Wasabi, or a veteran black belt Wasabika, any suggestions on how to improve are very welcome. Please first check the existing issuesopen in new window and pull requestsopen in new window if someone has the same feature request as you. If yes, then you can comment your desired improvement under the open issue. If no, then please consider to open a new issueopen in new window and give a detailed request. It makes sense to first explain the problem you have in the incumbent version of Wasabi, this is the place to express your frustrations and annoyances. Then describe the solution that you have envisioned, with all the nuances and details of how this would fix your problem. To flesh our your argument, please consider alternatives and different approaches to this feature request.

How can I get help and support?

You are already on the right track by first checking this documentationopen in new window for the knowledge you are seeking. It's likely that you are not the first person who has an issue or a question, and hopefully someone has curated the answer in here already. You can use the search function in the top navbar to look for a specific topic, and the sidebar menu as a table of content. You can also use our GitHub Discussionsopen in new window to find solutions to different issues and to ask questions if necessary. If your trouble is specific to the code, then it might also be suitable to check the existing GitHub issuesopen in new window and open a new one.

What does the Wasabi project need help with?

Wasabi is libre and open-source software, thus it relies on the support of several contributors on all fronts. Of course, this includes coding new features, bug fixes and stability improvements. Yet just equally important is the review of the commits of all other Wasabikas. It's not just the contributions to the code, but also to the documentation and the effort to educate peers using Wasabi. This includes education in meatspace tribe gatherings, but also in cyberspace peer support. So basically, we need help with building and shilling Wasabi!

- + diff --git a/FAQ/FAQ-GeneralBitcoinPrivacy.html b/FAQ/FAQ-GeneralBitcoinPrivacy.html index 2d7ea62fd..d47ba5e1f 100644 --- a/FAQ/FAQ-GeneralBitcoinPrivacy.html +++ b/FAQ/FAQ-GeneralBitcoinPrivacy.html @@ -27,12 +27,12 @@ Bitcoin Privacy FAQ | Wasabi Docs - - + +

General Bitcoin Privacy

Why Privacy matters

I have nothing to hide, do I still need financial privacy?

What did you say to your spouse in bed last night? How much money did you earn last month? What websites have you visited yesterday?

TIP

It's not that I have nothing to hide, it's that I have nothing to share.

There are many tasks in everyday life that are simply none of your business. Knowledge you choose not to share with others, things you only tell one individual, actions that you do while nobody is watching. How much money you earn, and where you spend it, is only your business, and of no concern to most other individuals.

How is financial privacy an essential element to fungibility in Bitcoin?

Fungibility is the possibility for an individual receiving bitcoin to safely ignore any connection between this bitcoin and any particular individual or use case it interacted with in the past. If you can meaningfully distinguish one coin from another, then their fungibility is weak. If Bitcoin fungibility is too weak in practice, then it cannot be decentralized: if someone important announces a list of stolen coins they won't accept coins derived from, you must carefully check coins you receive against that list and return the ones that fail. Everyone gets stuck checking blacklists issued by various authorities because in that world we'd all not like to get stuck with bad coins. This adds friction and transactional costs and makes Bitcoin less valuable as money.

How is financial privacy essential for entrepreneurs?

If you run a business, you cannot effectively set prices if your suppliers and customers can see all your transactions against your will. You cannot compete effectively if your competition is tracking your sales. Individually your informational leverage is lost in your private dealings if you don't have privacy over your accounts: if you pay your landlord in Bitcoin without enough privacy in place, your landlord will see when you've received a pay raise and can hit you up for more rent.

How is financial privacy essential for personal safety?

If thieves can see your income, holdings, and spending, they can use this information to target and exploit you. Without privacy, malicious parties have more ability to steal your identity, snatch your large purchases off your doorstep, or impersonate businesses you transact with towards you. They can tell exactly how much to try to scam you for. If thieves don't know how much bitcoin you have, then they don't know if you are worth the effort to attack.

How is financial privacy essential for human dignity?

No one wants the snotty barista at the coffee shop or their nosy neighbors commenting on their income or spending habits. No one wants their baby-crazy in-laws asking why they're buying contraception (or sex toys). Your employer has no business knowing what church you donate to. Only in a perfectly enlightened discrimination-free world where no one has undue authority over anyone else could we retain our dignity and make our lawful transactions freely without self-censorship if we don't have privacy.

Most importantly, financial privacy isn't incompatible with things like law enforcement or transparency. You can always keep records, be ordered (or volunteer) to provide them to whomever, have judges hold against your interest when you can't produce records (as is the case today). None of this requires globally visible public records.

The Privacy of Bitcoin

How is Bitcoin good in terms of privacy?

Privacy in traditional banking is guaranteed by the institutions that make up the system, such as banks, credit card companies, and governments. They (try to) ensure that your bank balance stays a secret. This puts them in a powerful position, where only they have complete oversight as to what is going on.

Instead, in Bitcoin pseudonyms protect your identity. In the Bitcoin ecosystem, everyone can see the history of every account balance, but they cannot see who controls an account. All addresses and transactions are recorded in Bitcoin’s publicly distributed database, the blockchain. The addresses do not have names or IP addresses attached to them, so it is not always possible to know which transaction belongs to which individual.

How is Bitcoin bad in terms of privacy?

Bitcoin is by default a transparent system, in which every piece of information is available to the public. As such, every Bitcoin user requires some level of protection. Anyone with substantial wealth in Bitcoin would not want to advertise their funds to every person they transact with, for obvious reasons. But every time you spend just a tiny portion of your bitcoin, you might reveal your wealth to the other party. Doing that on the internet is like flashing large stacks of cash in a dark back alley, so obviously it’s not advisable! A criminal might see how much you have and decide to come after it. Distributing your wealth between several wallets and using a different address for each transaction is a common practice that prevents others from knowing how much bitcoin you have.

Each Bitcoin transaction contains at least one input (where the Bitcoin are from) and at least one output (where the Bitcoin are being sent). This means that once a single address is known, there is a trail to follow the Bitcoin.

Another characteristic of Bitcoin transactions is that the value of the input always needs to match the value of the previous transaction output. If you previously received 1 bitcoin, and you want to spend 0.4 bitcoin, the transaction needs to spend the whole 1 bitcoin. 0.4 bitcoin will go as payment, then 0.6 bitcoin will return to you as change. Your Bitcoin wallet will handle this process automatically, but it is important to understand the principle in order to use it anonymously.

The owner of the original bitcoin doesn't know whom you paid the money or what you did with it, but they can see the amounts and addresses involved. They can see two outputs of the transaction: one worth 0.4 bitcoin and one worth 0.6 bitcoin. They might not know for certain which is the purchase and which is the change, but they can apply heuristics to estimate it.

Similarly, if you receive 0.5 bitcoin but want to spend 1 bitcoin, you need to own additional coins with a combined value of at least 0.5 bitcoin in them. When spending two coins within one transaction, it is often assumed that both of these coins belong to the same entity, this is the common input ownership heuristic.

Why is it important to run a full node?

TIP

Not your node ~ not your rules

When you download and install bitcoindopen in new window, you define the precise rules of your monetary system. Then you call out to other nodes and only connect to the peers who have agreed to play by the same rules. All those who break your own rules, you simply disconnect and ignore. Your full node defines, verifies and enforces the sound money you use to store your value.

How does a full node protect my privacy?

When you run your own full node, then on your local computer you can verify exactly if the bitcoin you receive are actually valid. When you do not verify this for yourself, then you need to ask another trusted third party how much money you have. Regardless how you ask this other server, there is now more metadata available to potentially link your coins to your identity. There are bad ways to communicate, like querying a block explorer over clearnet, and good ways to communicate, like using BIP 158open in new window block filters over Tor. But regardless, running your own full node means that you don't need to communicate with anyone about your specific coins and this is strictly better.

How can I set up a full node?

Wasabi comes pre-installed with bitcoind from Bitcoin Knotsopen in new window and it can be started on the same desktop or laptop computer with just one click. This is likely the most convenient solution for Wasabikas.

There are also other node implementations different from Bitcoin Knots, such as Bitcoin Coreopen in new window or Libbitcoinopen in new window, that could be used as well.

Instead, if you prefer to use some dedicated hardware solutions, these are some of the most reliable projects:

Why is it important to use a new address for every payment?

Addresses being used more than once is very damaging to privacy because that links together more blockchain transactions with proof that they were created by the same entity. The most private and secure way to use bitcoin is to send a brand new address to each person who pays you. After an address has received a coin, it should never be used again. Also, a brand new bitcoin address should be demanded from the recipient when sending bitcoin. Wasabi has a user interface which discourages address reuse by removing from the GUI addresses which have received a coin.

It has been argued that the phrase "bitcoin address" was a bad name for this object because it implies it can be reused like an email address. A better name would be something like "bitcoin invoice".

Bitcoin isn't anonymous but pseudonymous, and the pseudonyms are bitcoin addresses. Avoiding address reuse is like throwing away a pseudonym after it has been used.

What is a coinjoin Sudoku?

Coinjoin Sudoku is a type of intra-transaction analysis attack on coinjoin transactions that aims to link inputs and outputs together based on their combinatorial sums. You can read more about coinjoin Sudoku hereopen in new window.

The Privacy of Tor

How does Tor protect my network-level privacy?

When you make a Bitcoin transaction, you are essentially creating a message on your phone or computer and sending it to the Bitcoin network. Someone operating a large number of nodes on the Bitcoin network might be able to match some of your transactions to your IP address, then deanonymize your stack of bitcoin.

It is relatively easy to avoid this on a computer by relaying all transactions through the Tor network. Wasabi routes all traffic via Tor’s SOCKS5 proxy, by default.

To maintain your anonymity, use the Tor Browser or the Tails operating system, if possible. Route everything through Tor by default.

It is also good practice to route your chats through the Tor network. You can also configure many cloud storage providers in this way.

Why does Tor process keep running after closing Wasabi Wallet?

There are two main reasons: user experience and privacy.

If a user closes Wasabi and then starts it again, he's already connected to Tor and he does not need to build a new Tor circuit. This means that Wasabi's startup will be much faster, because the Tor circuit is already established.

Regarding the privacy, this is done to avoid time correlation attacks when using Wasabi Wallet. In fact, if a user creates a new Tor circuit every time he opens Wasabi Wallet, he would send a series of information to the Bitcoin network, which could allow a correlation and deanonymization of the user himself.

My country/ISP is blocking/censoring Tor, how can I use Wasabi with Tor bridges?

Tor bridges, also called Tor bridge relays, are alternative entry points to the Tor network that are not listed in the public Tor directory. If you suspect that your access to the Tor network is being blocked, you may want to use bridges. You can read more on The Tor Project's dedicated page about bridgesopen in new window.

Steps with Tor Browser:

  1. Download and install the Tor Browseropen in new window. See hereopen in new window on how to do that when Tor website is blocked.

  2. You'll need to specify the Tor folder, as Wasabi's bundled Tor doesn't come with the PluggableTransports folder, so you'll need to specify a folder where the fully-featured Tor is located. See the next step.

  3. Start Wasabi with TorFolder (to specify where Tor Browser's Tor binary is located, along with the PluggableTransports folder) and TorBridges (to specify which bridge(s) to use) startup parameters:

    --torfolder="$HOME/tor-browser_en-US/Browser/TorBrowser/Tor --torbridges="<bridgeDefinition>"

    To use multiple Tor bridges:

    --torbridges="<bridgeDefinition>;<secondBridgeDefinition>;<thirdBridgeDefinition>"

When using obfs4 or webtunnel, at least two bridges should be specified for Tor's Conflux feature to work properly and for better performance.

Default folders where Tor Browser's Tor is located:

  • Windows: C:\Users<USER>\Desktop\Tor Browser\Browser\TorBrowser\Tor
  • macOS: /Applications/Tor Browser.app/Contents/MacOS/Tor
  • linux: $HOME/tor-browser_en-US/Browser/TorBrowser/Tor

Currently only the obfs4, Snowflake and webtunnel pluggable transports can be used, others are not supported.

For example, to specify a single obfs4 Tor bridge, one can use:

$ --torfolder="$HOME/tor-browser_en-US/Browser/TorBrowser/Tor" --torbridges="obfs4 95.216.9.24:14288 2F26D43258285FEB39E4320888DFAFA8A0D20E11 cert=RJHxHEYW2JnFMTZdf2mdwpEhm7B8RQMCK6ttBL/fPhfdrF20ooAuaITK5MqZooVpXsSVVQ iat-mode=0"
 
- + diff --git a/FAQ/FAQ-Installation.html b/FAQ/FAQ-Installation.html index 441e38461..fb86ad93b 100644 --- a/FAQ/FAQ-Installation.html +++ b/FAQ/FAQ-Installation.html @@ -27,11 +27,11 @@ Installation FAQ | Wasabi Docs - - + +

Installation of Wasabi

Installing the Package

Where can I download Wasabi?

You can find the recent version of the compiled packages for Linux, Windows and Mac available on the official wasabiwallet.ioopen in new window. It's always best to download software directly from the official source acknowledged by the developers. In order to preserve your network level privacy from the very first step on, please consider visiting the Tor onion service wasabiukrxmkdgve5kynjztuovbg43uxcbcxn6y2okcrsg7gb6jdmbad.onionopen in new window. The old versions of the software can be found in the releasesopen in new window of the GitHub repository, hereopen in new window you also find the libre & open source code for when you want to build it yourself. Please take special care to verify the PGP signatures of zkSNACKs' PGP public key 6FB3 872B 5D42 292F 5992 0797 8563 4832 8949 861Eopen in new window over the software packages and code commits.

Why is it important to verify PGP signatures?

DANGER

Don't trust ~ verify.

These are not just empty words. Self sovereignty is at the core of Bitcoin in general, and Wasabi specifically. You have powerful tools at your disposal, yet they only work when used as they are designed. Wasabi is tailor made so that you do not have to trust anyone, but you have the power to verify everything.

With PGP signatures you can verify that the software package you download is actually the one by the developers. Every release of Wasabi is signed by zkSNACKsopen in new window, the company behind Wasabi. You can verify that the PGP public key 6FB3 872B 5D42 292F 5992 0797 8563 4832 8949 861Eopen in new window is actually the one of zkSNACKsopen in new window by exploring the web of trustopen in new window. When you have a software package that was signed by this PGP public key, then you can be sure that this is an official release approved by zkSNACKs. This protects you against malicious man in the middle attacks where bad guys give you a fake version of Wasabi with malicious code.

Watch the videoopen in new window

How can I verify PGP signatures?

On the WasabiWallet.ioopen in new window website you can download the packages of the latest release. To verify the signature you also need to download the separate signature .asc file. In the terminal, change the directory to the one with the downloaded files, and verify the signature with gpg --verify + the corresponding signature file name, depending on which operating system you are.

Everything is valid if it returns Good signature from zkSNACKs and that it was signed with the Primary key fingerprint: 6FB3 872B 5D42 292F 5992 0797 8563 4832 8949 861E.

For an in-depth guide for Debian and Ubuntu, other Linux, Windows, and macOS see the main documentation.

Watch the videoopen in new window

How do I install Wasabi on Debian and Ubuntu?

Download the most recent .deb package and the .deb.asc signature file from the wasabiwallet.ioopen in new window or the Tor onion serviceopen in new window.

Download Wasabi Wallet for Debian

Verify the signature of the package with gpg --verify Wasabi-2.0.8.1.deb.asc Wasabi-2.0.8.1.deb and ensure that the software was signed by zkSNACKs' PGP public key 6FB3 872B 5D42 292F 5992 0797 8563 4832 8949 861Eopen in new window.

Now install Wasabi with sudo apt install ./Wasabi-2.0.8.1.deb, and run it with wassabee. Check out the main documentation for a step-by-step guide.

Watch the videoopen in new window

How do I install Wasabi on other Linux?

Download the most recent .tar.gz package and the .tar.gz.asc signature file from the wasabiwallet.ioopen in new window or the Tor onion serviceopen in new window.

Download Wasabi Wallet for Linux

Verify the signature of the package with gpg --verify Wasabi-2.0.8.1.tar.gz.asc Wasabi-2.0.8.1.tar.gz and ensure that the software was signed by zkSNACKs' PGP public key 6FB3 872B 5D42 292F 5992 0797 8563 4832 8949 861Eopen in new window. Now install Wasabi with sudo tar -pxzf Wasabi-2.0.8.1.tar.gz, and run it with ./wassabee. Check out the main documentation for a step-by-step guide.

How do I install Wasabi on Windows?

Download the most recent .msi package and the .msi.asc signature file from the wasabiwallet.ioopen in new window or the Tor onion serviceopen in new window.

Download Wasabi Wallet for Windows

The Wasabi package is signed and automatically verified on Windows upon installation.

Wasabi Wallet Windows signature verification

Optionally, you can still verify the PGP signature of the package by right-clicking on the signature file > More GpgEX options > Verify and ensure the software was signed by zkSNACKs' PGP public key 6FB3 872B 5D42 292F 5992 0797 8563 4832 8949 861Eopen in new window. Now install Wasabi by double-clicking the .msi file. Check out the main documentation for a step-by-step guide.

How do I install Wasabi on macOS?

Download the most recent .dmg package and the .dmg.asc signature file from the wasabiwallet.ioopen in new window or the Tor onion serviceopen in new window.

Download Wasabi Wallet for macOS

The Wasabi package is signed and automatically verified on macOS upon installation.

Optionally, you can still verify the PGP signature of the package with sudo gpg2 --verify Wasabi-2.0.8.1.dmg.asc and ensure that the software has been signed by zkSNACKs' PGP public key 6FB3 872B 5D42 292F 5992 0797 8563 4832 8949 861Eopen in new window. Now install Wasabi by double-clicking the .dmg file. Check out the main documentation for a step-by-step guide.

Watch the videoopen in new window

Why are there two different packages for macOS (intel and Apple Silicon)?

Intel and Apple Silicon are two different processors types that Apple uses for their computers. These processors work a bit differently from each other. With the architecture that Wasabi uses, these two different processors need their own specific code binary in order to make it work.

What happens when I install the wrong package for macOS?

Wasabi will crash on startup or run significantly slower than it should. This will not harm your computer.

Do I need to install Tor separately?

No, because Wasabi has Tor built into the software. All Wasabi network traffic goes via Tor by default - no need to set up Tor yourself.

You can turn off Tor in the Settings. Be careful, as this will compromise your privacy. When you coinjoin over clearnet, the coordinator would know the links between your inputs and outputs based on your IP address. When you broadcast a transaction over clearnet, the connected full node will know the link between your transaction and your IP address.

Can I use Wasabi on Tails?

Since Wasabi version 2.0.8open in new window it is possible to run Wasabi on Tails. To make it work, Wasabi should be started with the --UseTor=EnabledOnlyRunning start up parameter or specify "UseTor": "EnabledOnlyRunning" in the config file. So Wasabi uses the existing Tor process, instead of starting a new one.

Can I use Wasabi on Whonix?

Since Wasabi version 2.0.8open in new window it is possible to run Wasabi on Whonix. To make it work, Wasabi should be started with the --UseTor=EnabledOnlyRunning start up parameter or specify "UseTor": "EnabledOnlyRunning" in the config file. So Wasabi uses the existing Tor process, instead of starting a new one.

What are the differences between the Debian/Ubuntu version and the "Other Linux" version?

Debian/Ubuntu version contains .deb package. Other Linux version contains .tar.gz package.

The advantages of the .deb format is solely packaging related. It installs Wasabi in your computer, so you're able to access it from start menu, remove it through apt, and so on.

The "Other Linux" option is just a generic install method not targeted to Debian/Ubuntu specifically but that works on it anyway because it is still linux.

There's no difference in the code, the same binaries are being delivered in different formats.

Update Wasabi

Why should I update Wasabi?

Wasabi is cutting edge software and is being worked on by the developers on a daily basis. Once in a while (+- every month) all the changes/improvements are being released in a new Wasabi version. The changes can contain (critical) bug fixes, small improvements, new features etc. It's always a good idea to run (one of) the latest Wasabi versions.

How do I check the current version of Wasabi?

In the GUI, go to the SearchBar at the top of the screen and click on About Wasabi. Here the current version of your Wasabi is displayed.

You can also verify the version using the command line by executing wassabeed --version.

Wasabi is cutting edge software, so it is well-advised to stay up-to-date.

How do I know about a new version of Wasabi?

When a new major version [v2.X.X] has been released, you'll see an orange update icon in the bottom right, upon hovering over it you can see Version 2.X.X is now available.

Wasabi Update Available

Clicking on Update uses the default browser to go to the website, where you can download this new version. There are occasional silent releases like [v2.X.X.X] which fix small issues, and these are not announced in the GUI, so you will not see the orange update icon. The websiteopen in new window always contains the most recent version. All releases (major and minor) are announced on the social media like Twitteropen in new window and Redditopen in new window.

How do I securely upgrade Wasabi?

To upgrade Wasabi, you need to download the new version. Downloading and installing the newer Wasabi package will overwrite the previous one, while preserving your files like your wallets etc. So to upgrade Wasabi, simply download and install the new version like at first install.

You can download the software build for the different operating systems on the main websiteopen in new window or better over Toropen in new window. For extra security, it is reccommended to also download the signatures of the build and verify them with zkSNACKs' PGP public keyopen in new window. For step-by-step instructions, follow this guide or see this video: Watch the videoopen in new window

What does Auto download new version in the settings mean?

If enabled, the software will automatically download the new version's installer upon a new release. If disabled, the software will only signal, but not automatically download, that there is a new version available.

Auto download new version is currently only available for Windows and macOS

For Linux, this setting does not work. A new version will have to be installed manually.

How does the Auto download new version work?

The software will automatically download the new version's installer upon a new release. After it is downloaded, the user can press "Update on Close" to run the installer when closing Wasabi. The installer is downloaded from GitHubopen in new window.

Advanced Installation

How do I compile Wasabi from source?

If you cannot wait until the next release, and you want to experience the most cutting-edge version of Wasabi, then you can build the source code.

The only two required tools are Gitopen in new window and .NET 8.0 SDKopen in new window for "Build apps". You can download every line of the Wasabi code by git clone https://github.com/WalletWasabi/WalletWasabi.git, this will create a new directory called WalletWasabi. In order to build and run the Wallet software, change directory to cd WalletWasabi/WalletWasabi.Fluent.Desktop. Wasabi is written in C# with the .NET framework, and it is very easy to run it. Simply execute dotnet run from the WalletWasabi.Fluent.Desktop folder. You can update the master branch with git pull.

How can I verify the deterministic build?

The guide for the deterministic builds can be found in the WalletWasabi repositoryopen in new window.

My antivirus marks Wasabi Wallet as a virus. Am I downloading the right software?

After you have downloaded Wasabi from the official websiteopen in new window or from the official GitHub repositoryopen in new window, make sure you have verified the PGP signatures.

If you have downloaded and verified digital signatures and your antivirus continues to report Wasabi as positive, you don't have to worry about anything; it is a false positive.

If you are still not sure, before starting Wasabi, you can check that it is safe by uploading and scan it via VirusTotalopen in new window.

TIP

Remember to report Wasabi as a safe software/false positive to your antivirus. In doing so you will help users who use the same antivirus.

Why is the executable called wassabee?

The most obvious thing would be to call the executable Wasabi Wallet.exe on Windows and Wasabi Wallet on Linux and Mac.

However launching Wasabi Wallet from certain terminals/command lines is problematic, so we should remove the spacing: WasabiWallet, and the case sensitivity differences between the operating systems can also cause issues, so that must go too: wasabiwallet.

But it's too long, it needs a faster way to launch: wasabi.

However this is too generic, it'll certainly cause conflicts, we need to make it unique: wassabee.

Also, this sounds awesome and is a fun inside jokeopen in new window.

- + diff --git a/FAQ/FAQ-Introduction.html b/FAQ/FAQ-Introduction.html index fe20ab2ec..9285c304d 100644 --- a/FAQ/FAQ-Introduction.html +++ b/FAQ/FAQ-Introduction.html @@ -27,11 +27,11 @@ Introduction FAQ | Wasabi Docs - - + +

Introduction to Wasabi

The Basics

Who can use Wasabi?

Every single line of code in Wasabi, the walletopen in new window, the backend serveropen in new window, the daemonopen in new window, the testsopen in new window, the packageropen in new window, the libraryopen in new window, the apiopen in new window, the documentationopen in new window - has always been and will always be libre and open-source under the MIT licenseopen in new window. This means that anyone, yes, ANYONE can use Wasabi without permission, for any use case, free of charge.

Wasabi is used by individuals to make everyday payments, to manage their hardware wallet long term hodlings, and to CoinJoin their sats for added privacy. Entrepreneurs may use Wasabi to defend their customers from spies and to ensure a private business relationship. While kids may use Wasabi to stack the sats gifted by grandma, and learn the importance of hodling.

TIP

Wasabi is a tool for everyone.

What is a coinjoin?

Coinjoin is a mechanism by which multiple participants combine their coins (or UTXOs, to be more precise) into one large transaction with multiple inputs and multiple outputs. An observer cannot determine which output belongs to which input, and neither can the participants themselves. This makes it difficult for outside parties to trace where a particular coin originated from and where it was sent to (as opposed to regular bitcoin transactions, where there is usually one sender and one receiver).

This can be done with non-custodial software like Wasabi that eliminates the risk of funds disappearing or being stolen. Each of the signatures are created on the participants’ computers after thorough verification, so nobody can alter the transaction or redirect the funds. The funds will always be in a Bitcoin address that you control.

In very simple terms, coinjoin means: “when you want to make a transaction, find someone else who also wants to make a transaction and make a joint transaction together”.

See also the Bitcoin Wiki on coinjoinsopen in new window

Do I need to trust Wasabi with my coins?

Since Wasabi's coinjoin implementation is trustless by design, there is no need for participants to trust each other or a third party. Both the sending address (the coinjoin input) and the receiving address (the coinjoin output) are controlled by your own private keys. The Wasabi server merely coordinates the process of combining each participant's input into one single transaction, but the Wasabi Wallet can neither steal your coins, nor figure out which outputs belong to which inputs (look up “WabiSabi coinjoin” if you want to know more).

What is the privacy I get after mixing with Wasabi?

This depends on how you handle your outputs after the coinjoin. There are some ways how you can unintentionally undo the mixing by being careless. For example, if you send a mixed coin to an already used address, then anyone can see that both coins are controlled by the same entity. More importantly, anyone who knows that the address belongs to you knows that you own that mixed coin. Address reuse compromises your privacy. Another deanonymizing scenario occurs when you combine mixed outputs with unmixed ones when sending: a third party will be able to make the connection between them as belonging to the same sender. This is why you need to be careful with non-private/change coins.

The practice of being careful with your post-mix outputs is commonly facilitated through coin control. Find out more about coin control in here. However, Wasabi Wallet is build in a way to help the user to avoid privacy leaks when using the wallet.

Why is Wasabi Bitcoin-only?

There are countless reasons why it is the only logical choice to be bitcoin-only. With Bitcoin we have a once in a lifetime opportunity to manifest libre sound money. If we succeed, then an utmost beautiful agora of sovereign individuals may emerge. If we fail, then this will conjure up the most horrific Orwellian nightmare. There is no room for wasted time and energy, this great work requires our full attention. Any line of code written to support a random shitcoin takes away scarce developer time to work on real problems.

What is considered a sufficient anonymity score?

It is difficult to determine a sufficient anonymity score since enough research hasn’t been conducted to provide a definitive answer. The right anonymity score depends on your own personal threat model. However, to be on the safe side, with Wasabi Wallet 2.0 an anonymity score of 5 and above could be considered sufficient.

Is there a way to check Wasabi's uptime status?

Yes, you can check the status of Wasabi-related services and websites (like APIs, Backend, etc.) via UptimeRobot Wasabi Status Pageopen in new window.

What software supplies the block filters that Wasabi uses?

The zkSNACKs coordinator supplies identical filters to every client. This means that you rely on the Wasabi backendopen in new window to provide valid filters. But because you download the blocks from a random Bitcoin peer-to-peer node - or your own node - the coordinator cannot spy on which blocks you are interested in. Furthermore, the random node will only know which block is needed but it won't have any clue which transaction(s) belongs to the wallet.

Is the Backend's (Coordinator) code open-source?

Yes, you can verify the code on GitHubopen in new window.

Is there an Android/iOs version?

No, Wasabi and CoinJoin features require considerable computational power, not currently replicable on a smartphone.

Where can I find Wasabi Wallet on social media?

You can find us on Twitteropen in new window, Redditopen in new window, YouTubeopen in new window, Facebookopen in new window, Instagramopen in new window and Discordopen in new window. For chat groups you can find us on Slackopen in new window, Telegramopen in new window and Keybaseopen in new window.

Also, remember to follow our blogopen in new window to get the latest insights and information about Wasabi Wallet and Bitcoin privacy.

For advanced Wasabikas

Can the coordinator attack me?

The developers have gone to great lengths to ensure that the coordinator cannot steal funds nor link inputs to outputs. The nature of Wasabi is that you should not need to trust the developers or the Wasabi coordinating server, as you can verify that the code does not leak information to anyone. Due to the nature of coinjoin transactions users don't need to trust other users or the coordinator against theft, leaving denial of service and attacks on privacy as the main concerns

The only known possible 'malicious' actions that the server could perform are two sides of the same coin;

  • Blacklisted UTXO's: Though this would not affect the users who are able to successfully mix with other 'honest/real' peers.
  • Targeted Sybil Attack: The follow-up concern is the inverse of the above. It is possible that the server could only include one 'honest/real' coin in the mix and supply the other coins themselves. This gives a false sense of security, but does not worsen the existing privacy of the coin. It would also be noticeable to all users excluding the user being targeted as their coins would not be mixed. It has been argued that this 'attack' would be very costly in terms of fees because the number of coins being mixed is verifiable. Though it is true that remixes pay zero coordination fee to zkSNACKs, they do pay mining fees. See hereopen in new window for more info.

What is the history of Wasabi?

Ádám Ficsor worked with several others on a privacy-focused Bitcoin wallet called Hidden Wallet all the way back in December 2015open in new window. Wasabi 1.0 was unveiled in 2018 at the Building on Bitcoin conference by Ádám. At the time, Wasabi was essentially HiddenWallet rebranded and rewritten from scratch with some new features. Key dates:

  • The 1.0 Beta release was on August 1, 2018 (on the first anniversary of UASF)
  • The 1.0 release was on October 31, 2018 (on the tenth anniversary of the Bitcoin Whitepaper)
  • The 2.0 Testnet release was on March 1, 2022
  • The 2.0 release was on June 15, 2022

Watch the videoopen in new window

Watch the videoopen in new window

Why is Wasabi libre and open-source software?

Wasabi follows Bitcoin's philosophy by making the software open-sourceopen in new window and by publishing it under MIT licenseopen in new window. Bitcoin users prefer open-source software to proprietary software for a number of reasons, including:

Control

Many people prefer open-source software because they have more control over the software they run.

They can examine the code to make sure it's not doing anything they don't want it to do, and they can change parts of it they don't like. Users who aren't programmers also benefit from open-source software, since they can use this software for any purpose.

Training

Other people like open-source software because it helps them become better programmers.

Open-source code is publicly accessible. Students can easily study it as they learn to make better software. Students can also share their work with others, inviting comments and critique, as they develop their skills. When people discover mistakes in programs' source code, they can share those mistakes with others to help them avoid making those same mistakes themselves.

Security

Some people prefer open-source software because they consider it more secure and stable than proprietary software.

Anyone can view and modify open-source software. Other users may spot and correct errors or omissions that a program's original authors might have missed. And because so many programmers can work on a piece of open-source software without asking for permission from original authors, they can fix, update, and upgrade open-source software more quickly than they can proprietary software.

Stability

Many users prefer open-source software to proprietary software for important, long-term projects.

Programmers publicly distribute the source code for open-source software. Users relying on that software for critical tasks can be sure their tools won't disappear or fall into disrepair if their original creators stop working on them. Additionally, open-source software tends to both incorporate and operate according to open standards.

What is the general idea of WabiSabi coinjoin?

While fungibility is an essential property of good money, Bitcoin has its limitations in this area. Numerous fungibility improvements have been proposed; however, none of them have addressed the privacy issues in full. WabiSabi is designed so that no participant, outside observer or even the coordinator can spy on the user. The scope of WabiSabi is not limited to a single transaction, it extends to transaction chains and it addresses various network layer deanonymizations. However, its scope is limited to Bitcoin's first layer. Even if an off-chain anonymity solution gets widely adopted, ultimately the entrance and exit transactions will always be settled on-chain. Therefore, there will always be need for on-chain privacy.

Ideal fungibility requires every Bitcoin transaction to be indistinguishable from each other, but it is an unrealistic goal. WabiSabi's objective is to break all links between coins. Thus, WabiSabi enables the usage of Bitcoin in a fully anonymous way.

WabiSabi defines a pre-mix and a post-mix wallet and a mixing technique. Pre-mix wallet functionality can be added to any Bitcoin wallet without much overhead. Post-mix wallets on the other hand have strong privacy requirements, regarding coin selection, private transaction and balance retrieval, transaction input and output indexing and broadcasting. The requirements and recommendations for pre and post-mix wallets together define the Wallet Privacy Framework. Coins from pre-mix wallets to post-mix wallets are moved by mixing. Most on-chain mixing techniques, like CoinShuffle, CoinShuffle++, TumbleBit's Classic Tumbler mode, or ZeroLink can be used. However WabiSabi defines its own mixing technique: WabiSabi coinjoin.

For more info please see WabiSabiopen in new window.

What are the supported operating systems?

Wasabi runs in most operating systems with 64-bit architecture. For the complete list of all the officially supported operating systems, click hereopen in new window.

What are the minimal requirements to run Wasabi?

As long as your operating system is supportedopen in new window, Wasabi should be able to run on your hardware. The more transactions a wallet has made, the more resources Wasabi will consume, particularly RAM. The software can also consume a significant amount of CPU for specific tasks, such as coinjoins or wallet loading. Approximately 3 GB of disk space are also needed, mainly to store the block filters. If you are running the wallet on a system with scarce resources, consider using the daemonopen in new window instead of the GUI application.

- + diff --git a/FAQ/FAQ-UseWasabi.html b/FAQ/FAQ-UseWasabi.html index ebf98cf37..f868478da 100644 --- a/FAQ/FAQ-UseWasabi.html +++ b/FAQ/FAQ-UseWasabi.html @@ -27,8 +27,8 @@ Use of Wasabi FAQ | Wasabi Docs - - + +

Use of Wasabi

General

How do I start using Wasabi?

  1. Download & Install Wasabi (like with any other software) from the official websiteopen in new window.
  2. Create a new wallet or use an already existing one, by importing or recovering your own wallet.
  3. Receive some bitcoin.
  4. Wait, and let the wallet do some coinjoins. Your wallet's privacy progress % will increase.
  5. Enjoy your private bitcoin funds! Spend some, send to your hardware wallet (for cold storage) or leave them in Wasabi for a while.

How do I generate a new wallet?

You can generate as many new wallets as you'd like, for no extra cost and without asking for permission.

Click the Add Wallet button in the bottom left corner of the main view or in the searchbar.

Add new wallet in Wasabi

Click Create a new wallet.

Create a new wallet in Wasabi

As with everything in Wasabi, you are required to label this new wallet. Make sure that you are precise so that you know what this wallet is for and click Continue.

Name a new wallet in Wasabi

Now you will see the 12 recovery words. This is the mnemonic seed that you should back up, together with the passphrase you create in the next phase, in order to recover your wallet. When you've backed everything up, click Continue.

Wasabi Wallet recovery words

In this page you should confirm the words, as a check that you've written down your mnemonic seed in the correct order. Once you're done, click Continue.

Confirm recovery words

Add a passphrase. It is used to encrypt the private key (extracted from the extended private key) on the computer and needed to open the wallet and to recovered it in the future. Make sure that you properly back up and write down this passphrase.

Confirm the passphrase and click Continue.

Add a passphrase in Wasabi

Careful!!

Without knowledge of the passphrase, you CANNOT spend your bitcoin!!

Make sure, and triple-check that you have done a proper backup of BOTH the passphrase AND the mnemonic. If you only have the recovery words, but not the passphrase, then you will NOT be able to open your wallet or to recover it.

In order to protect your backup, consider storing the passphrase and recovery words in different locations.

Now you get to choose your wallets coinjoin strategy. Select one and click Continue.

Wasabi Wallet coinjoin strategies

Can I rename my Wallet?

Yes. A wallet can be renamed at the Wallet Settings.

Alternatively, the wallet file can be manually renamed by doing the following: Type Wallet Folder in the search bar at the top of the main view to access the Wallets folder and rename the .json wallet file. Or you can navigate to the Wallets folder (inside the Wasabi data folder) and rename the .json wallet file. Then go to WalletBackups folder (inside the Wasabi data folder) and rename the .json wallet file.

TIP

You need to mark the “show hidden files” setting to see the Wasabi data folder.

WARNING

To avoid problems, make sure you close Wasabi Wallet before proceeding to rename any of your wallets.

What is the password used for?

The password (named passphrase since Wasabi version 2.0.7open in new window you set is used:

Wasabi stores only the BIP38 encrypted blob, so you'll need to type in the passphrase to open the wallet and to spend from Wasabi.

DANGER

The passphrase will unlock your bitcoin to anyone who has access to the recovery words backup or the computer! If your backup gets compromised, this passphrase is the only thing protecting your precious sats.

What password should I use?

DANGER

It is VERY important to use a random and long passphrase.

Since it is very difficult for humans to generate true randomness, it is good to use a tool to help find a strong passphrase. This can be the Diceware english wordlistopen in new window for true off-line password generation. A secure password manager software might also be used, but be careful here.

Where can I find the Wasabi data folder?

You can easily reach it from inside Wasabi by typing Data Folder in the search bar at the top of the main view.

Or you can manually navigate to it (depending on which OS you have):

  • Windows: /Users/{your username}/AppData/Roaming/WalletWasabi/Client
  • Linux: /home/{your username}/.walletwasabi/client
  • macOS: /Users/{your username}/.walletwasabi/client

TIP

You need to mark the “show hidden files” setting to see it.

Can I spend my bitcoin without the password?

DANGER

NO!!! Without knowledge of your passphrase, even when you have the wallet file and recovery words, you CANNOT spend your bitcoin!

When creating a new wallet, after labeling it properly, the next step is to select a long and random passphrase. Every time you want to spend your coins from Wasabi, you MUST provide this passphrase. So even if you have these words securely engraved in metal, without the passphrase, you cannot restore the backup of your wallet.

TIP

Always back up your mnemonic recovery words, and your passphrase in two separate secure locations.

Why BIP 38?

BIP 38open in new window is a good standard, a well-tested and very secure way to encrypt a private key. It is also implemented in the NBitcoin libraryopen in new window, which is used by Wasabi. Additionally, there is no standard way (BIP) to encrypt HD wallets. Take into account that it is not only encryption what BIP 38 provides but also a brute-force protection.

What are the terms and conditions?

The most important parts of the legal documents are summarized in the following points:

  • The service is open-source under the MIT license.
  • The service is provided on a non-custodial basis. Safekeeping of keys are the sole responsibility of the user.
  • The user is solely responsible to act according to their local laws and regulations.
  • We do not store any personally identifiable information. Moreover, our trustless software architecture prevents us from gathering this information in the first place.
  • A transaction fee is only charged by the service provider for CoinJoin transactions.
  • We only provide written support, and NEVER ask for recovery words, passphrases or similar security critical information.

Read the whole document of terms and conditions, privacy policy, and legal statement hereopen in new window

Can I import a watch-only extended public key?

Yes, but not yet in the GUI, you will need to manually create a new wallet file.

Open a text editor and paste the following wallet structure:

{
@@ -74,6 +74,6 @@
                       0.3 BTC (Change Coin Charlie)
 

There is no way to know which of the anon set output coins are owned by which of the input owners.

All an observer knows is that a specific anon set output coin is owned by one of the owners of one of the input coins, that is 3 people - hence an anonymity set of 3.

Your Wasabi software has limited information on what the actually achieved anonymity set is, so the anonymity set that the software presents you is just an estimation, not an accurate value. With Wasabi we are trying to do lower estimations, rather than higher ones.

What is the anonymity score?

The anonymity score is a way to estimate the level of entropy of a UTXO in an unequal-but-highly-composable output value coinjoin.

It is different than anonymity set. For example, if the outputs are [1, 1, 1, 1, 0.5, 0.5, 0.5, 0.5, 0.4, 0.4, 0.2, 0.2, 0.2, 0.2, 0.2, 0.1, 0.1, 0.1, 0.1, 0.1] then, even when each of those 1s have anonscore 4, there are still lots of combinations of outputs that sum up to 1, so the anonset should be much higher but the anonscore is extremely conservative and takes into account many other things.

What is the difference between anonymity set and anonymity score?

The anonscore evolved into existence from the anonset, but with some differences. What differs is the kind of coinjoins they are applied to, where anonset was for Wasabi 1 and anonscore is for current Wasabi 2. In Wasabi 1 coinjoins there are unequal inputs, some equal outputs, and change coins. In Wasabi 2 coinjoins there are many equal inputs, many equal outputs, and (sometimes) some unique value outputs, that are not necessarily change coins. In fact most of the times they are well mixed coins.

Basically the anonymity score is an extremely conservative anonymity set calculation.

What are the equal denominations created in a coinjoin round?

The standard denominations are: 5000, 6561, 8192, 10000, 13122, 16384, 19683, 20000, 32768, 39366, 50000, 59049, 65536, 100000, 118098, 131072, 177147, 200000, 262144, 354294, 500000, 524288, 531441, 1000000, 1048576, 1062882, 1594323, 2000000, 2097152, 3188646, 4194304, 4782969, 5000000, 8388608, 9565938, 10000000, 14348907, 16777216, 20000000, 28697814, 33554432, 43046721, 50000000, 67108864, 86093442, 100000000, 129140163, 134217728, 200000000, 258280326, 268435456, 387420489, 500000000, 536870912, 774840978, 1000000000, 1073741824, 1162261467, 2000000000, 2147483648, 2324522934, 3486784401, 4294967296, 5000000000, 6973568802, 8589934592, 10000000000, 10460353203, 17179869184, 20000000000, 20920706406, 31381059609, 34359738368, 50000000000, 62762119218, 68719476736, 94143178827, 100000000000, 137438953472 sats.

So, there are 79 denominations from 0.00005000 BTC up to 1374.38953472 BTC.

What is happening in the input registration phase?

During this phase the client selects which coin(s) will be registered for coinjoin. Wasabi then generates the related input proofs. After that, a unique Tor identity will be generated for each input, which will be used to send the input ownership proof to the coordinator.

The coordinator now verifies that this input is allowed to register (i.e. there is still room for more inputs, the coin is confirmed, the input proof is valid etc.). If all checks are valid, the coordinator creates and sends back the credentials.

Since the goal is to have at least the minimum input count in one round, the input registration phase can fail if too few participants registered in the available time frame.

What is happening in the connection confirmation phase?

Because the input registration phase takes some time, the coordinator needs to ensure that everyone is still online and ready to continue. So in the connection confirmation phase every Alice sends a signal to the coordinator that she is still online, and when all Alices do so, or after a timeout and the number of online Alices is still larger than the minimum number of inputs, this phase ends.

What is happening in the output registration phase?

In this phase, every client needs to change the value of their credentials to the desired output values. For example, the client presents to the coordinator two old credentials and two newly created ones. The two pairs sum up to the exact same value, which the coordinator can verify, without knowing the amount value of the credentials. This process may repeat multiple times.

The client now creates a new Tor identity called Bob, which is not tied to Alice. Bob now sends the coordinator an unblinded credential (signed by the coordinator) and a bitcoin address.

What is happening in the signing phase?

After all inputs and outputs are registered, the coordinator has all the information to build the coinjoin transaction. This raw (unsigned) transaction is sent to all Alices, each of them verifies that the transaction is valid and then signs it. The signatures are sent back to the coordinator who accumulates all of them. The singing phase is concluded when the coordinator receives all the valid signatures for all registered inputs.

What is happening during the blame round?

If the signing phase fails from becoming successful due to some Alices disrupting the round, then a blame round will be created with the successful Alices. In the blame round a new coinjoin will be constructed by repeating the coinjoin phases. All Alices have to sign this new transaction and send their signature to the coordinator.

What is happening in the broadcasting phase?

In the broadcasting phase the coordinator sends the signed final CoinJoin transaction to several random Bitcoin peer to peer nodes, and it is gossiped throughout the network to the miners.

Is there any additional anonymity using multiple wallets for CoinJoins?

You'd gain 1 less anonymity set than if you'd only mix with one wallet (and Wasabi doesn't display that). On the other hand, the systemic anonymity is slightly improved if a few people are mixing with multiple wallets, because that removes the certainty on this Blockchain analysis assumption.

How is the anonymity set target determined for CoinJoins?

2*2 = 4 and 3*3 = 9. 2->3: 50% increase, 4->9:125% increase. So remixing with larger anonsets is exponentially more effective than smaller anonsets. Regarding why do we want 100 number, is among some other reasons, because that was our calculation to be that would make rounds happen in every 2-5 minutes, considering the liquidity of some custodial mixers. Regarding DoS attack, right now our DoS configuration is set to be pretty permissive and this seems to be sufficient for the time being. If a DoS attack would happen, Wasabi team would just harden it in the config file and would kick the bad actors out. Now if even that would fail, then we can start thinking about lowering the required peers and also other methods.

I'd like to experience coinjoin but I'm not comfortable using real Bitcoin. What can I do?

You can try to make a coinjoin via Wasabi on the Bitcoin TestNet (an alternative Bitcoin network, to be used for testing). Go to Settings > Bitcoin and change the network to TestNet. Then restart your Wasabi and create a new wallet, this is needed because Wasabi differentiates between "Main wallets" and "TestNet wallets". This wallet will synchronize for the TestNet, and generate TestNet addresses. You can get tBTC from faucets like: coinfaucet.eu/en/btc-testnetopen in new window or bitcoinfaucet.uo1.netopen in new window

Does Wasabi have to stay on during coinjoin?

Yes, Wasabi needs to stay on during coinjoins, you cannot be offline and still participate in coinjoins.

A coinjoin transaction is different from a normal transaction (where you are the only person signing), as it requires multiple participants to sign the same transaction.

Here is how Wasabi handles different scenarios:

During input registration phaseAfter input registration phase
You close WasabiYour registered coins are automatically dequeuedWasabi will make you wait until the round finishes
Wasabi goes offlineYour registered coins are automatically timed out by the coordinator after 1 minuteThe coin(s) that disrupted the round will be banned for 6h from participating in another coinjoin. (This is to prevent DoS attacksopen in new window)

What if there's a power outage during CoinJoin? Do I lose my coins?

No you don't. CoinJoins are atomic, they either happen or they don't. If your wallet crashes or your computer goes offline during CoinJoin you simply don't participate in this CoinJoin, look at table here for more info.

How much anonymity set do I need?

The amount of privacy needed depends on your individual threat model, who is trying to deanonymize you? It is commonly said that an anonymity set of 50 is sufficient to evade low-level blockchain forensics analysis, but it might not protect you against large adversaries. At least one round to re-mix your coins can increase your privacy drastically. With Wasabi this can be achieved in a matter of hours.

How does my wallet communicate with the Wasabi coordinator server?

Wasabi communicates in many ways to the coordinator server, and it is always over the Tor network.

First of all, Wasabi uses BIP 158 block filtersopen in new window to ensure network level privacy. You can follow these FAQs to have a full explanation on the theme:

Then, there are five different phases in a CoinJoin. You can follow these links to have a full explanation on that:

  1. Input registration phase
  2. Connection confirmation phase
  3. Output registration phase
  4. Signing phase
  5. Broadcasting phase

The backend server also sends you information about the current mempool for fee estimation as well as the US Dollar exchange rate.

What is the address of the coordinator?

The coordinator possibly gets paid in every coinjoin. Wasabi is using a fresh unused coordinator address for every coinjoin round.

What is the maximum number of coins that can be registered in a coinjoin?

Wasabi Wallet's default client is configured to register 1 up to 10 inputs per coinjoin round. However, as the coordinator cannot enforce this, a custom client could use a different configuration.

How many coins/outputs do I get from a coinjoin?

Wasabi Wallet's default client is configured to register 1 up to 10 outputs per coinjoin round. However, as the coordinator cannot enforce this, a custom client could use a different configuration.

Can I manually select which coins to register for coinjoin?

No, that is currently not possible. The automatic coinjoin robot registers the coins, based on multiple factors.

TIP

You can enable the red coin isolation setting, in case you want to prevent possible input heuristics (from outside observers) of anonscore 1 coins into the same coinjoin round.

How to exclude/freeze coins from coinjoin?

Since Wasabi version 2.0.8open in new window it is possible to exclude coins from participating in coinjoin in the GUI.

Click on the music box menu items -> select Exclude Coins -> select the coins to exclude.

Music Box Menu Items

The coins will remain excluded until they are manually deselected.

Alternatively, coins can be excluded from coinjoin using the excludefromcoinjoin RPC call.

How long does it take to make my wallet 100% private?

Depending on many factors, like the Anonymity score target, the coinjoin strategy, and the amount of bitcoin, it can take from a couple hours to multiple days.

What coinjoin strategy should I select?

There is no answer for all, or a "best" strategy, it depends on the user's privacy needs. The coinjoin strategy should be selected according to the user's preference: Do you want to Minimize costs, Maximize speed, or Maximize privacy? Or the user can create their own Custom strategy.

Wasabi Coinjoin Strategy

The default coinjoin strategy is `Maximize Speed`

This strategy is sufficient for most users

What is the coinjoin strategy?

A coinjoin strategy has specific pre-configured coinjoin settings.

There are multiple coinjoin settings which the user is able to configure according to their own prefence. Each coinjoin strategy has different specific settings for optimal performance. After a coinjoin strategy is selected, its settings are applied. It is supposed to make it easy for the user to select their preference, without having to know about the specific settings and how to configure them themselves.

Read more here.

What are the differences/settings per coinjoin strategy?

Minimize CostsMaximize SpeedMaximize Privacy
Anonymity score target55random between 27 and 75
Coinjoin time preferenceweekshourshours
Red coin isolationnot enablednot enabledenabled

What does the Auto-start coinjoin threshold mean in the coinjoin settings?

It is the amount at which your funds will automatically participate in coinjoin in the background. If the non-private wallet balance is less than this amount coinjoin will not automatically start. A use case is that it might not be economical to coinjoin with this non-private amount (fee amount compared to coinjoin amount).

For example, if the non-private balance is 0.005 BTC and the Auto-start coinjoin threshold is 0.01 BTC, the user will have to manually press Play to start coinjoining. The default Auto-start coinjoin threshold is 0.01 BTC.

Auto-start coinjoin threshold

What does the Red coin isolation mean in the coinjoin settings?

When the Red coin isolation is enabled, only a single coin with anonymity score 1 will be allowed into the coinjoin registration. To prevent possible coinjoin input heuristics from outside observers. The Red coin isolation is enabled by default when the Maximize Privacy coinjoin strategy is selected.

Red Coin Isolation

Do coinjoin transactions signal RBF?

No. Coinjoin transactions do not signal RBF.

Why do my coins occasionally get banned from participating in CoinJoin?

A CoinJoin consists of multiple users registering inputs (coins) and blinded outputs. Once the appropriate number of participants have registered, the actual transaction (the CoinJoin) is constructed by the coordinator, and given to all participants in the span of about 60 seconds. At this point, all registered participants must sign off on the CoinJoin, and if a single one of the participants fails to sign their input, the entire CoinJoin must be restarted.

So this introduces a problem, or an attack vector - a malicious user could purposefully register coins, only to wait for the signing phase and not sign. This would halt the entire CoinJoin process for all other participants and Wasabi would no longer work. This is also known as denial of service attackopen in new window.

So a simple solution looks like this - the coordinator could collect signatures from all inputs, and if one or more input refuses to sign, the coordinator could record that input and temporarily (or even permanently) ban that coin from participation. This is a nice solution, as it mitigates a single coin from ruining all CoinJoins, but it too comes with trade-offs.

For example, most of the time, users fail to sign a CoinJoin for non-malicious reasons. Perhaps their Tor connection went down in precisely that moment, or perhaps their WiFi had a temporary flicker at the wrong time. Further, some users don't even realize that the signing phase is happening, and sometimes shut down their computer at exactly the wrong moment. All of these things hinder a successful CoinJoin for all other participants, but by pure accident.

If you are one of the victims of this temporary banning then simply wait for the ban to expire and try again. The best thing you can do to avoid the issue is to have a strong internet connection and keep your computer online throughout the whole process.

Note:

Banning does not mean freezing. You can send banned coins to anyone you want. This is a temporary ban on your coins in participation of the CoinJoin.

How do I change the coordinator?

Since Wasabi version 2.0.8open in new window, the coordinator can be changed in the GUI in the Coordinator tab in the settings.

Go to settings -> select coordinator tab -> paste/enter the new URI -> restart Wasabi -> Wasabi will now use this coordinator.

Settings Coordinator URI

(The displayed (default) coordinator in the image doesn't work.)

Alternatively, the MainNetCoordinatorUri can be changed in the config file.

Backup and Recovery

How do I back up my mnemonic words?

TIP

Write down your recovery words!

Wasabi uses BIP 39: mnemonic code for generating deterministic keysopen in new window to enable easy backups of all private keys in the wallet. The mnemonic is displayed as 12 recovery words that are only shown once during the wallet generation.

Wasabi Wallet recovery words

DANGER

In order to restore a wallet, you need BOTH the recovery words AND the passphrase!

It is a good idea to keep the two in separate analog backups, such as a laminated paper written with pencil. In order to defend against nature destroying fragile paper, you can consider stamping the words into metal. Use two different backups and locations for the mnemonic and passphrase, because whoever has both [including a physical attacker] has full access to your sats. Find a secure physical location to store the backups, maybe a home safe, or an expert security deposit box.

Please see Wasabi Backup Best Practices for more information about backups.

How do I back up my wallet file?

Although you can back up your private keys with the mnemonic words and passphrase, this is only a last resort recovery. If you want to also secure your address labels, the anonscore and additional metadata, then you can do a digital backup. Simply copy the WalletBackups folder with the wallet.json files from your Wasabi data folder onto suitable hardware, for example an encrypted USB stick. Note that this file has the encrypted private key (extracted from the extended private key), meaning that you only need the passphrase to spend the bitcoin. This also contains the extended public key, the public keys, and the address labels, meaning that it completely links all the coins, both pre and post mix, with clear proof.

WARNING

Make sure to back up your passphrase separately because it is necessary to spend your bitcoin.

TIP

The wallet file backup is sensitive, in terms of privacy, but not critical in terms of loss of funds (if a passphrase was used when generating the wallet). So it is good advice to encrypt this wallet file.

What do I need to recover my wallet?

To recover your wallet you need either your Recovery Words + Passphrase, or the Wallet File + Passphrase, as shown in the table below.

Recovery WordsWallet FilePassphrase
Recovery Words✔️
Wallet File✔️
Passphrase✔️✔️

TIP

If no passphrase was entered at the wallet creation, then the Recovery Words or Wallet File alone are enough to recover the wallet.

Can I recover my wallet without the password?

No. The passphrase/password you set is used as a 13th word (passphrase) as described in BIP39, you should back it up when you generate a wallet. It is necessary to spend your bitcoin or to recover your wallet, as shown in this table.

What should I do if I forget my password?

Try every possibility you can think of to find your passphrase, you have an unlimited number of tries. If that still doesn't work, you might want to try external password crackers or recovery tools, but be careful to only use well-tested, well-reviewed ones.

I lost the recovery words but I still have the .json file and the password. Is my wallet still recoverable?

Yes, but in this case it is advisable to create a new wallet and back up the new recovery words and the passphrase, then move your bitcoin there.

The .json file contains the encrypted secret that requires the passphrase to derive your private keys. That gives you access to your bitcoin.

Can I verify the Recovery Words of an existing wallet?

Yes. Go to Wallet Settings > Verify Recovery Words. Type in your recovery words in the correct order, click on Verify and it will show you if they are correct or not.

Wasabi Wallet Verify Recovery Words

Hardware Wallet

Watch the videoopen in new window

Watch the videoopen in new window

Watch the videoopen in new window

What hardware wallets does Wasabi support?

Wasabi uses the Bitcoin Core Hardware Wallet Interface (HWI)open in new window which allows it to support a variety of hardware wallets. For the complete list of all the officially supported hardware wallets, click hereopen in new window.

Why does Wasabi use the Hardware Wallet Interface?

Wasabi uses the Bitcoin Core Hardware Wallet Interface [HWI]open in new window, a python library tool for proper integration of off-line signing devices. It provides a standard way for any software wallet to communicate with any hardware wallet without needing any device specific drivers. HWI was developed and carefully reviewed over several years, with outstanding contributions by Andrew Chowopen in new window. Wasabi implements C# code that executes the HWI tool. Wasabi uses this powerful tool because there are no other dependencies necessary to support all the existing and future hardware wallets.

Does Wasabi support the hidden wallets of hardware wallets?

Partially. Only device side passphrase is supported. PC side passphrase is not. This means that the hidden wallet feature can be used with Trezor T, Ledger Nano S, Nano S Plus, Nano X and ColdCard. After the 12 or 24 words, enter the passphrase as the 13th or 25th word on the hardware wallet. It’s part of BIP 39open in new window.

How can I generate a Wasabi skeleton wallet file in ColdCard?

On the ColdCard you go to Advanced > MicroSD Card > Export Wallet > Wasabi Wallet and it will save a skeleton json-file to the MicroSD card in the hardware wallet.

Read more here.

How can I import the Wasabi skeleton wallet file?

Take the MicroSD card from the ColdCard and plug it in the computer with the Wasabi Wallet software. In Wasabi Wallet go to Add Wallet and select Import a wallet. Now select the Wasabi skeleton json-file from the MicroSD card, if this fails you can manually enter the file location in Wasabi Wallet window and load the file.

Read more here.

How can I generate a receiving address of my hardware wallet?

In Wasabi Wallet you load your previously imported wallet (from Wasabi skeleton, or USB detection) and go to the Receive dialog, here you enter a label for the observers of the incoming transaction and click Continue. In the receive dialog, previously generated addresses (which haven't received any funds yet) can be viewed and copied at Addresses Awaiting Payment.

Read more here.

How can I sign a transaction with a USB connected hardware wallet?

To send a transaction you will need to connect your hardware wallet and unlock the device (using PIN or password).

  • Go to Send, enter the address to send to and the amount of bitcoin to spend.
  • Enter the label of whom you are sending to.
  • At the Preview Transaction screen, check if all the information is correct.
  • After you have checked that everything is correct, click Send Now to sign it with the connected hardware wallet and broadcast the transaction to the network.

Read more here.

How can I build and export a transaction to ColdCard?

  • Enable PSBT workflow in the Wallet Settings.
  • Go to Send and enter the destination address and amount.
  • Click Continue.
  • Enter the label of whom you are sending to.
  • At the Preview Transaction screen, check that everything is correct.
  • Click on Save PSBT file and save the file to the MicroSD card.
  • You can then insert the MicroSD card (containing the PSBT) in the Coldcard for manual verification and signing.

Read more here.

How can I sign a transaction on the ColdCard?

On the ColdCard (Mk2, firmware 2.1.1 and up) you enter the PIN code to unlock the hardware wallet and press Ready To Sign with the MicroSD card containing the previously generated transaction or PSBT-file. Verify the address and amount and the ColdCard will then create a signed.psbt and final.txn file on the MicroSD card. The finalized transaction (xxx-final.txn) can now be broadcast by Wasabi Wallet with the Broadcaster tool, or even a radio or satellite dish if someone is listening!

Read more here.

How can I import and broadcast a final transaction from ColdCard?

In the top search bar, go to Broadcaster and then select Import Transaction, now you can select the previously finalized (and signed) transaction file from the MicroSD card. If this fails you can manually type the path to this file in Wasabi Wallet to load the transaction. Now click Broadcast Transaction to send it off over Tor to a random Bitcoin node so it can flood over to the miners for confirmation in a block.

Read more here.

TIP

A Broadcast button will be displayed next to the Send button, when PSBT workflow is enabled, for an easier workflow.

Can I coinjoin bitcoins on my hardware wallet?

No, that is currently not possible. A coinjoin is a multi round interactive process, and requires fast signing by the participants, thus the keys need to be on a hot computer. Thus currently you have to send the bitcoins from your hardware wallet to a hot Wasabi Wallet, do the coinjoin and then send them back to a new address on the Hardware wallet for cold-storage.

Read more here.

TIP

Trezor now supports coinjoin with the Trezor Suite, using same rounds as Wasabi Wallet users. Read more hereopen in new window.

Does Ledger Live send my public keys and addresses to a third party server?

Only if you add your accounts in the app, but not if you update your device firmware or install apps. When using the Ledger Live software wallet to manage your coins, you send all of your used, and 20 unused addresses to Ledger's nodes. Sourceopen in new window

Your extended public key, however, is not shared with Ledger's node, but rather stored encrypted on your local machine.

Read more hereopen in new window.

Ledger could potentially analyze information from API calls to their nodes to link addresses to individual users, though Ledger says no logs are kept during normal operation.

To avoid any privacy leak, you can use a Ledger hardware wallet in combination with Wasabi as a software interface, and because Wasabi does not leak your addresses, your transaction history is not shared with anyone.

After I coinjoined my coins and reached 100% privacy, I sent them to my hardware wallet and now the coins have anonscore 1. Why?

Everything is working as expected.

The anonymity score (number) is tied to your wallet that you used to coinjoin, if you send a coinjoined coin to another Wasabi Wallet of yours (hardware wallet or normal wallet) it will have an anonscore of 1 because this wallet doesn't know all of the coinjoin history.

You should put a meaningful label when you generate a receive address in your hardware wallet, e.g. "private UTXO" (something that reminds you that you got this UTXO from your Wasabi Wallet and that it was coinjoined).

Can I use Trezor One with Wasabi?

No. Unfortunately, Trezor One is not supported by Wasabi Wallet. For the complete list of all the officially supported hardware wallets, click hereopen in new window.

Can I use BitBox with Wasabi?

No. Unfortunately, BitBox is not supported by Wasabi Wallet. For the complete list of all the officially supported hardware wallets, click hereopen in new window.

How can I type in the passphrase of my Trezor T?

After connecting the Trezor T to your computer and upon trying to load your wallet, you get a message on the Trezor T to choose where to type your passphrase, on the device or the host (computer), choose the first option (device) then enter the passprase using the touchscreen of your Trezor T. Wasabi wallet will now load this passphrase protected wallet.

I have coinjoined with a Trezor device on Trezor Suite, but in Wasabi I cannot see my coins?

Trezor uses only Taproot for coinjoin, with a non-standard derivation path. So Wasabi does not know about the existence of the Trezor Suite coinjoin coins.

How can I use Hardware Wallets on Linux (udev rules)?

Since Wasabi version 2.0.8open in new window the Wasabi package contains the required udev rules, so they don't need to be manually installed.

On older versions, you need to create a set of udev rules for the hardware wallet to be reachable.

Udev rules instructions can be found hereopen in new window.

History

How can I check the transactions history?

The wallet's main page displays the history of all transactions made with this specific wallet. It includes receiving, sending, and coinjoin transactions.

Wasabi Wallet History

How can I see coinjoins in the history list?

Coinjoin transactions are indicated with a shield icon:

History Coinjoin

When the wallet has made multiple coinjoins, the coinjoins will be clustered. Coinjoin clusters are indicated with a double shield icon. To see the individual coinjoins, the cluster can be expanded by clicking the arrow on the left:

History Coinjoin Expanded

A coinjoin is a payment within the same wallet, thus it only shows the coordination fee (if any) and mining fee leaving the wallet.

Can I sort the history items?

Yes, the history items can be sorted by clicking on the transactions sort button:

Sort Date Column

Can I search for a transaction ID in the history?

Yes. This can be done by pasting the transaction ID into the search bar or by manually typing part of the transaction ID. After clicking the result, the transaction will be highlighted in the history.

SearchBar Search TX

TIP

It will only show results of the wallets which are currently open.

Can I export a list of transactions?

There is currently no convenient way to export a list with transaction details inside the GUI. However, you can see the wallet.json files inside the WalletBackups folder (you can find it in your Wasabi data folder) which contains all the public keys, labels and anonset.

You can use the Wasabi RPC server gethistory call to get a list of all transactions, including date, block height, amount, label and tx id.

Settings

How do I connect my own full node to Wasabi?

There are three different ways of using your Bitcoin full node with Wasabi:

  • If you have a full node already running on the same computer as Wasabi, it will automatically be detected and used by default.
  • If you have a full node on a remote computer, then you can connect to it by specifying the local network IP address or Tor onion service in the Wasabi Settings tab.

Wasabi Wallet Remote P2P Bitcoin Endpoint full node

  • If you are not yet running a full node, Wasabi has the bitcoind binaries included, and with one click in the Settings, you can start Bitcoin Knots together with Wasabi.

Wasabi Wallet local Bitcoin Knots full node integration

Watch the videoopen in new window

How can I turn off Tor?

You can turn off Network anonymization (Tor) in the Settings. Note that this is a privacy concern, especially when you coinjoin and when you broadcast a transaction. In the first case, the coordinator would know the links between your inputs and outputs based on your IP address. In the second case, if you happen to broadcast a transaction of yours to a full node that is spying on you, it will know the link between your transaction and your IP address.

DANGER

It is recommended to always use Tor! The setting to turn it off is only intended for debugging and trouble shooting.

How can I change the anonymity score target?

The anonscore target is a wallet specific setting which is determined by the Coinjoin Strategy, but can also be manually changed in the Coinjoin Settings dialog.

On the main view click the three dots on the top right corner after loading the wallet. Choose Coinjoin Settings, click Change (Coinjoin strategy), click Customize. Move the Anonymity score target slider to the desired value and click Done.

Coinjoin Settings Anonymity score target

Alternatively, you can change the anonymity score target by editing the wallet file. Go to the SearchBar and click Wallet Folder and open the wallet json file and edit the AnonScoreTarget value.

"AnonScoreTarget": 5,
 

What is the dust threshold?

Dust can mean a lot of thingsopen in new window, depending on how you look at it. It can be a non-economical input, that is a UTXO that has less value than the fees it would cost to spend this coin. A dust attack is actually about forced address reuseopen in new window, the malicious actor sends very small amounts into old addresses and consolidation of these dust UTXOs can link several coins in a wallet cluster.

Specifically in the context of Wasabi, with the dust threshold settings you can limit the value of spam coins shown in the GUI. Coins that you receive from other wallets (so no self-spend) which are less than the dust threshold in value and are received on an already used address are not shown. For example: When it is set to 0.0000 5000 BTC, and you receive a coin worth 0.0000 4000 BTC from a different wallet to an already used address, then this transaction and the coin in the coin list will not be shown.

Wasabi Wallet Dust threshold settings

Where can I find the logs?

In the SearchBar you can see there are several logs available.

  • The Logs shows the general log information about Wasabi Wallet.
  • The Tor Logs shows the Tor specific logs.

Wasabi Wallet SearchBar Help&Support and Open

Alternatively, you can find the logs inside your Wasabi data folder.

How to activate/deactivate discreet mode?

You can activate/deactivate Discreet Mode by clicking the Discreet Mode icon in the bottom left corner of the main view.

Read more here.

Discreet Mode Icon

How can I change to the white theme?

You can change from the default dark to the white theme by disabling Dark Mode in the Settings. Alternatively, you can switch to Dark Mode in the .walletwasabi/client/UIConfig.json data folder. Open the UIConfig.json file and change the line from "DarkModeEnabled": true to "DarkModeEnabled": false. Save the file and restart Wasabi. Please note that Wasabi is designed for the dark theme, and some color schemes might not look beautiful in the white mode.

Wasabi Wallet white theme

Coin Control Best Practices

What are coins?

Bitcoin uses a system of inputs and outputs to keep track of who owns how many sats. Every transaction specifies one or more inputs, the chunk of bitcoin being spent, and one or more outputs, the destination of who receives the bitcoin. A coin is also called an unspent transaction output (UTXO), meaning that this output has not been used as the input of a new transaction - it is yet to be spent. In order to spend a UTXO, the valid signature and script has to be provided in the transaction. This ensures that only with knowledge of the correct private key can this coin be sent to a new address. This chain of links between inputs being spent and outputs being generated is verified by every full node, and stored on the blockchain.

How can I enable (manual) coin control?

The default send workflow uses the automatic coin selection algorithm, which is optimized in a way that "traditional" coin control is obsolete. However, the user can review which coins are selected, or select different coins using the (manual) coin control. This can be done by pressing and holding the keystroke alt (or option on mac device) at the Preview Transaction screen, which will bring up the Review coins button to click on.

Send Review Coins

This is a developer feature

Do NOT use the manual coin control if you do not know what you are doing. Misusing it can have seriously bad privacy consequences.

How do I select coins for spending?

In the normal send workflow, Wasabi automatically selects which coins to send.

To send a specific coin, the user can use the Wallet Coins dialog (a.k.a coinlist). The coinlist can be brought up by pressing the keyboard combination CTRL + C + D simultaneously on the main view or via the search bar.

This is for advanced usage only

Users should stick to the default send workflow. Misusing the coinlist for sending can result in critical privacy risks.

Wallet Coins Send Selected Coins

This is not full coin control

You can only send coins in full. There is no possiblity to enter a bitcoin amount or receive change.

Can I consolidate anonset coins?

It is advisable to limit the recombining of mixed coins because it can only decrease the privacy of these coins. This reveals that all the consolidated UTXOs are controlled by one entity, which was not known before the consolidation. That said, if you combine only a couple of mixed coins, you might not reveal your pre-coinjoin transaction history, especially when you did several re-mixes. So consolidating some private coins is OK to do.

Take great care!

Never consolidate non-private coins with private (mixed) coins, as this negates the privacy benefits of the coinjoin.

Watch the videoopen in new window

How can I send my anonset coins to my hardware wallet?

Most hardware wallets communicate with servers to provide you with your balance. This reveals your public key to the server, which damages your privacy - the hardware wallet company can now link together all your addresses. As a result it is not recommended that you send your mixed coins to an address associated with your hardware wallet unless you are confident that you have set up your hardware wallet in a way that it does not communicate with a 3rd party server (see below).

You can, however, manage your hardware wallet with the Wasabi interface. Alternatively, you can use your hardware wallet with Electrum, and in order to not leak any information to third-party servers run your own Electrum Personal Serveropen in new window, ElectrumXopen in new window or Electrsopen in new window.

What can I do with small change?

There are no hard and fast rules for what to do with the change. Generally try to avoid having change by using the change avoidance suggestions when sending. Generally change should be coinjoined, Wasabi automatically coinjoins the change if possible (if the change is more than the coinjoin minimum).

You should treat change as a kind of toxic waste (handled with great care). You can spend the change to the same entity as the initial transaction, without loosing much privacy. Only spend the change to another entity, if these two won't make you trouble knowing you interact with both of them. If needed, you can consolidate several change coins, but we advise you to do it in a coinjoin. In JoinMarket you can specify the exact amount of coinjoin, so it can be exactly the amount of the change. Or open a new Lightning Network node (not your main Lightning node), create a channel to a random peer on the network and route the funds back to you.

TIP

For more information, see this dedicated chapter.

Music Box

What does Awaiting cheaper coinjoins mean?

It means your wallet is waiting to participate in a cheaper coinjoin round(s) because the fee rate of the current coinjoin(s) is higher than the median of the selected Coinjoin time preference.

What does Awaiting the blame round mean?

If some other participant disrupted the round by failing to sign the coinjoin transaction, this message briefly appears before a new coinjoin, known as the blame round, is created with the responsive participants from the failed round.

What does Insufficient funds eligible for coinjoin mean?

This message is displayed when some coins cannot coinjoin, for example when they are unconfirmed or below the minimum coinjoin amount.

What does Some funds are rejected from coinjoining mean?

If an input has failed to sign during a previous round it registered to, it will be temporarily banned to prevent denial of service attacks. Coinjoin coordinators may also reject funds for risk management purposes. You can view the ban time at the Wallet Coins dialog via the search bar or with the keyboard shortcut “CTRL + C + D”.

Buy Anything Button

What is the Buy Anything Button?

The Buy Anything button was introduced in Wasabi version 2.0.5 which can be used to make purchases directly with Bitcoin. The button is an integration using Shopinbit'sopen in new window premium concierge service and travel booking services which are now conveniently accessible from your wallet. You can Buy Anything because ShopinBit has a team of experts that handle your customized orders, whether it's electronics, cars, flights, or hotels. There is currently a $1,000 minimum purchase limit for this service.

How does the Buy Anything Button work?

When clicking on the Buy Anything Button, the user communicates with ShopinBit over a new Tor identity (unless Tor is disabled in the Settings). The user gets asked some questions, like what he wants to buy, and some follow-up questions needed for the order. After the details are confirmed in the chat, a bitcoin address gets displayed to pay the invoice. Once ShopinBit has received the bitcoin on the address with a confirmation, they will start processing the order. The processing time depends on what has been bought. For example, a physical product may take weeks to deliver but a spontaneous travel booking can be arranged within days.

Does the Buy Anything Button hurt my privacy?

The Buy Anything Button does not compromise your wallet's privacy. Things like the wallet balance and history are still private. However, when providing some personal details like e-mail and shipping address for the order, then ShopinBit is aware of these, the same as when ordering directly from them or any other merchant. They are aware of this and that's why they ask for the minimal required info possible to complete the order. Your wallet information is never connected to the information used for ordering anything.

But of course, make sure to use private coins when sending them/anyone your bitcoin!

What can I order and for whom is this available?

ShopinBit can get you anything that is legal in Poland. Some services may or may not be available depending on the jurisdiction. Their Terms and Conditions are displayed and required to be accepted before ordering. For (legal) information and questions, please refer to the Shopinbit websiteopen in new window.

Advanced Usage

Can I change the default ports for the Wasabi's bundled Tor?

Yes. Since Wasabi version 2.0.6open in new window it is possible to specify the Tor SOCKS5 and the Tor control ports. This can be done by specifying the port(s) at startup with the startup parameters.

Where does the BTC exchange rate come from?

Wasabi fetches the BTC/USD exchange rate from one of these exchanges: blockchain.com, Bitstamp, CoinGecko, Coinbase, Gemini and Coingate. It first tries to fetch the exchange rate from blockchain.com, if that's not possible it will try to fetch it from the next exchange in the listed order (and so on, until success).

- + diff --git a/FAQ/index.html b/FAQ/index.html index c648277ba..e5a8d1f66 100644 --- a/FAQ/index.html +++ b/FAQ/index.html @@ -27,11 +27,11 @@ Frequently Asked Questions | Wasabi Docs - - + +

Frequently Asked Questions

This is an archive with many questions that Wasabikas have asked most frequently, including:

  • Answers about the basics of privacy and Bitcoin in general.
  • The important details of how to install Wasabi properly, and the best practices for using it.
  • Further guidance for those who are interested in contributing to Wasabi.

Chapters

- + diff --git a/assets/404.html-CSa7Nz9_.js b/assets/404.html-DGGa0TW_.js similarity index 82% rename from assets/404.html-CSa7Nz9_.js rename to assets/404.html-DGGa0TW_.js index ea12d1c41..461524d0e 100644 --- a/assets/404.html-CSa7Nz9_.js +++ b/assets/404.html-DGGa0TW_.js @@ -1 +1 @@ -import{_ as t,o as e,c as o,a}from"./app-3S7gIoGc.js";const n={},c=a("p",null,"404 Not Found",-1),l=[c];function s(_,r){return e(),o("div",null,l)}const d=t(n,[["render",s],["__file","404.html.vue"]]),h=JSON.parse('{"path":"/404.html","title":"","lang":"en-US","frontmatter":{"layout":"NotFound"},"headers":[],"git":{},"filePathRelative":null}');export{d as comp,h as data}; +import{_ as t,o as e,c as o,a}from"./app-CwImt2bI.js";const n={},c=a("p",null,"404 Not Found",-1),l=[c];function s(_,r){return e(),o("div",null,l)}const d=t(n,[["render",s],["__file","404.html.vue"]]),h=JSON.parse('{"path":"/404.html","title":"","lang":"en-US","frontmatter":{"layout":"NotFound"},"headers":[],"git":{},"filePathRelative":null}');export{d as comp,h as data}; diff --git a/assets/AddressReuse.html-DbG97EUQ.js b/assets/AddressReuse.html-BZIIpGTg.js similarity index 97% rename from assets/AddressReuse.html-DbG97EUQ.js rename to assets/AddressReuse.html-BZIIpGTg.js index 21756979f..e593a9567 100644 --- a/assets/AddressReuse.html-DbG97EUQ.js +++ b/assets/AddressReuse.html-BZIIpGTg.js @@ -1 +1 @@ -import{_ as d,r as o,o as r,c as u,a as e,d as t,w as a,b as s,e as c}from"./app-3S7gIoGc.js";const h={},p=e("h1",{id:"address-reuse",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#address-reuse"},[e("span",null,"Address Reuse")])],-1),m=e("p",null,"The first rule of Bitcoin privacy:",-1),_=e("blockquote",null,[e("p",null,"Never reuse addresses!")],-1),f=e("p",null,"The second rule of Bitcoin privacy:",-1),b=e("blockquote",null,[e("p",null,"NEVER reuse addresses!!")],-1),y={class:"table-of-contents"},v=e("hr",null,null,-1),g=e("h2",{id:"problem",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#problem"},[e("span",null,"Problem")])],-1),w=e("h3",{id:"easy-wallet-clustering",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#easy-wallet-clustering"},[e("span",null,"Easy wallet clustering")])],-1),k=e("p",null,"If an address is used more than once, it means that the same private key can spend all its coins. It is very easy to find all the UTXOs of an address, and thus to find out how many bitcoin the private key holds.",-1),x=e("p",null,"Further, in a transaction where one output has a reused address, then it is very likely that this output is the payment destination, and not the change. Most wallets automatically generate new change addresses for every transaction, but payment addresses are selected manually by the user.",-1),A={href:"https://en.bitcoin.it/wiki/Address_reuse",target:"_blank",rel:"noopener noreferrer"},R={href:"https://en.bitcoin.it/Privacy#Address_reuse",target:"_blank",rel:"noopener noreferrer"},P=e("p",null,"There are different types of address reuse:",-1),I=e("h3",{id:"publicly-advertised-addresses-donations",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#publicly-advertised-addresses-donations"},[e("span",null,"Publicly advertised addresses (donations)")])],-1),T=e("p",null,"Here, a person publishes a single address to a public forum, like in the bio of a social media network or on a website, and anyone can send bitcoin to this address.",-1),W=e("h3",{id:"dusting",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#dusting"},[e("span",null,"Dusting")])],-1),B={href:"https://en.bitcoin.it/Privacy#Forced_address_reuse",target:"_blank",rel:"noopener noreferrer"},E=c('

Intentionally malicious

Since Wasabi is libre and open-source, anyone can modify a fork of Wasabi to make sure the same two addresses are recycled in every CoinJoin registration. This is someone intentionally deanonymizing himself, and he might have quite dubious motives.

Wasabi's Solution

Remove used address from GUI

Wasabi encourages the user to not reuse addresses. You always get a new Bitcoin address whenever you generate one. Previously generated addresses, which haven't received bitcoin yet, are displayed at Addresses Awaiting Payment. An address is automatically removed from the Addresses Awaiting Payment list once that address receives funds.

',5);function N(S,U){const n=o("router-link"),i=o("ExternalLinkIcon"),l=o("RouteLink");return r(),u("div",null,[p,m,_,f,b,e("nav",y,[e("ul",null,[e("li",null,[t(n,{to:"#problem"},{default:a(()=>[s("Problem")]),_:1}),e("ul",null,[e("li",null,[t(n,{to:"#easy-wallet-clustering"},{default:a(()=>[s("Easy wallet clustering")]),_:1})]),e("li",null,[t(n,{to:"#publicly-advertised-addresses-donations"},{default:a(()=>[s("Publicly advertised addresses (donations)")]),_:1})]),e("li",null,[t(n,{to:"#dusting"},{default:a(()=>[s("Dusting")]),_:1})]),e("li",null,[t(n,{to:"#intentionally-malicious"},{default:a(()=>[s("Intentionally malicious")]),_:1})])])]),e("li",null,[t(n,{to:"#wasabi-s-solution"},{default:a(()=>[s("Wasabi's Solution")]),_:1}),e("ul",null,[e("li",null,[t(n,{to:"#remove-used-address-from-gui"},{default:a(()=>[s("Remove used address from GUI")]),_:1})])])])])]),v,g,w,k,x,e("p",null,[s("Read more about the privacy concerns of address reuse in the "),e("a",A,[s("separate entry"),t(i)]),s(" and the "),e("a",R,[s("privacy chapter"),t(i)]),s(" of the Bitcoin wiki.")]),P,I,T,W,e("p",null,[s("With a "),e("a",B,[s("forced address reuse attack"),t(i)]),s(", an attacker sends a small amount of bitcoin to an already existing address. The attacker hopes that this dust coin is consolidated with another coin, thus linking the two in a cluster.")]),E,e("p",null,[s("To protect against forced address reuse attack (Dusting), Wasabi has a modifiable "),t(l,{to:"/FAQ/FAQ-UseWasabi.html#what-is-the-dust-threshold"},{default:a(()=>[s("dust limit")]),_:1}),s(", where the wallet does not show coins below a certain threshold value.")])])}const D=d(h,[["render",N],["__file","AddressReuse.html.vue"]]),F=JSON.parse(`{"path":"/why-wasabi/AddressReuse.html","title":"Address Reuse","lang":"en-US","frontmatter":{"title":"Address Reuse","description":"On the nuances of address reuse, why it is bad and how to fix it. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Problem","slug":"problem","link":"#problem","children":[{"level":3,"title":"Easy wallet clustering","slug":"easy-wallet-clustering","link":"#easy-wallet-clustering","children":[]},{"level":3,"title":"Publicly advertised addresses (donations)","slug":"publicly-advertised-addresses-donations","link":"#publicly-advertised-addresses-donations","children":[]},{"level":3,"title":"Dusting","slug":"dusting","link":"#dusting","children":[]},{"level":3,"title":"Intentionally malicious","slug":"intentionally-malicious","link":"#intentionally-malicious","children":[]}]},{"level":2,"title":"Wasabi's Solution","slug":"wasabi-s-solution","link":"#wasabi-s-solution","children":[{"level":3,"title":"Remove used address from GUI","slug":"remove-used-address-from-gui","link":"#remove-used-address-from-gui","children":[]}]}],"git":{"updatedTime":1720425186000},"filePathRelative":"why-wasabi/AddressReuse.md"}`);export{D as comp,F as data}; +import{_ as d,r as o,o as r,c as u,a as e,d as t,w as a,b as s,e as c}from"./app-CwImt2bI.js";const h={},p=e("h1",{id:"address-reuse",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#address-reuse"},[e("span",null,"Address Reuse")])],-1),m=e("p",null,"The first rule of Bitcoin privacy:",-1),_=e("blockquote",null,[e("p",null,"Never reuse addresses!")],-1),f=e("p",null,"The second rule of Bitcoin privacy:",-1),b=e("blockquote",null,[e("p",null,"NEVER reuse addresses!!")],-1),y={class:"table-of-contents"},v=e("hr",null,null,-1),g=e("h2",{id:"problem",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#problem"},[e("span",null,"Problem")])],-1),w=e("h3",{id:"easy-wallet-clustering",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#easy-wallet-clustering"},[e("span",null,"Easy wallet clustering")])],-1),k=e("p",null,"If an address is used more than once, it means that the same private key can spend all its coins. It is very easy to find all the UTXOs of an address, and thus to find out how many bitcoin the private key holds.",-1),x=e("p",null,"Further, in a transaction where one output has a reused address, then it is very likely that this output is the payment destination, and not the change. Most wallets automatically generate new change addresses for every transaction, but payment addresses are selected manually by the user.",-1),A={href:"https://en.bitcoin.it/wiki/Address_reuse",target:"_blank",rel:"noopener noreferrer"},R={href:"https://en.bitcoin.it/Privacy#Address_reuse",target:"_blank",rel:"noopener noreferrer"},P=e("p",null,"There are different types of address reuse:",-1),I=e("h3",{id:"publicly-advertised-addresses-donations",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#publicly-advertised-addresses-donations"},[e("span",null,"Publicly advertised addresses (donations)")])],-1),T=e("p",null,"Here, a person publishes a single address to a public forum, like in the bio of a social media network or on a website, and anyone can send bitcoin to this address.",-1),W=e("h3",{id:"dusting",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#dusting"},[e("span",null,"Dusting")])],-1),B={href:"https://en.bitcoin.it/Privacy#Forced_address_reuse",target:"_blank",rel:"noopener noreferrer"},E=c('

Intentionally malicious

Since Wasabi is libre and open-source, anyone can modify a fork of Wasabi to make sure the same two addresses are recycled in every CoinJoin registration. This is someone intentionally deanonymizing himself, and he might have quite dubious motives.

Wasabi's Solution

Remove used address from GUI

Wasabi encourages the user to not reuse addresses. You always get a new Bitcoin address whenever you generate one. Previously generated addresses, which haven't received bitcoin yet, are displayed at Addresses Awaiting Payment. An address is automatically removed from the Addresses Awaiting Payment list once that address receives funds.

',5);function N(S,U){const n=o("router-link"),i=o("ExternalLinkIcon"),l=o("RouteLink");return r(),u("div",null,[p,m,_,f,b,e("nav",y,[e("ul",null,[e("li",null,[t(n,{to:"#problem"},{default:a(()=>[s("Problem")]),_:1}),e("ul",null,[e("li",null,[t(n,{to:"#easy-wallet-clustering"},{default:a(()=>[s("Easy wallet clustering")]),_:1})]),e("li",null,[t(n,{to:"#publicly-advertised-addresses-donations"},{default:a(()=>[s("Publicly advertised addresses (donations)")]),_:1})]),e("li",null,[t(n,{to:"#dusting"},{default:a(()=>[s("Dusting")]),_:1})]),e("li",null,[t(n,{to:"#intentionally-malicious"},{default:a(()=>[s("Intentionally malicious")]),_:1})])])]),e("li",null,[t(n,{to:"#wasabi-s-solution"},{default:a(()=>[s("Wasabi's Solution")]),_:1}),e("ul",null,[e("li",null,[t(n,{to:"#remove-used-address-from-gui"},{default:a(()=>[s("Remove used address from GUI")]),_:1})])])])])]),v,g,w,k,x,e("p",null,[s("Read more about the privacy concerns of address reuse in the "),e("a",A,[s("separate entry"),t(i)]),s(" and the "),e("a",R,[s("privacy chapter"),t(i)]),s(" of the Bitcoin wiki.")]),P,I,T,W,e("p",null,[s("With a "),e("a",B,[s("forced address reuse attack"),t(i)]),s(", an attacker sends a small amount of bitcoin to an already existing address. The attacker hopes that this dust coin is consolidated with another coin, thus linking the two in a cluster.")]),E,e("p",null,[s("To protect against forced address reuse attack (Dusting), Wasabi has a modifiable "),t(l,{to:"/FAQ/FAQ-UseWasabi.html#what-is-the-dust-threshold"},{default:a(()=>[s("dust limit")]),_:1}),s(", where the wallet does not show coins below a certain threshold value.")])])}const D=d(h,[["render",N],["__file","AddressReuse.html.vue"]]),F=JSON.parse(`{"path":"/why-wasabi/AddressReuse.html","title":"Address Reuse","lang":"en-US","frontmatter":{"title":"Address Reuse","description":"On the nuances of address reuse, why it is bad and how to fix it. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Problem","slug":"problem","link":"#problem","children":[{"level":3,"title":"Easy wallet clustering","slug":"easy-wallet-clustering","link":"#easy-wallet-clustering","children":[]},{"level":3,"title":"Publicly advertised addresses (donations)","slug":"publicly-advertised-addresses-donations","link":"#publicly-advertised-addresses-donations","children":[]},{"level":3,"title":"Dusting","slug":"dusting","link":"#dusting","children":[]},{"level":3,"title":"Intentionally malicious","slug":"intentionally-malicious","link":"#intentionally-malicious","children":[]}]},{"level":2,"title":"Wasabi's Solution","slug":"wasabi-s-solution","link":"#wasabi-s-solution","children":[{"level":3,"title":"Remove used address from GUI","slug":"remove-used-address-from-gui","link":"#remove-used-address-from-gui","children":[]}]}],"git":{"updatedTime":1720425980000},"filePathRelative":"why-wasabi/AddressReuse.md"}`);export{D as comp,F as data}; diff --git a/assets/BIPs.html-D5zJfk6V.js b/assets/BIPs.html-Dwwh4MNK.js similarity index 97% rename from assets/BIPs.html-D5zJfk6V.js rename to assets/BIPs.html-Dwwh4MNK.js index fe28394a7..9c3680f47 100644 --- a/assets/BIPs.html-D5zJfk6V.js +++ b/assets/BIPs.html-Dwwh4MNK.js @@ -1 +1 @@ -import{_ as a,r as n,o as l,c as p,a as e,d as t,w as s,b as i}from"./app-3S7gIoGc.js";const b={},c=e("h1",{id:"supported-bips",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#supported-bips"},[e("span",null,"Supported BIPs")])],-1),h={class:"table-of-contents"},d=e("p",null,"Wasabi Wallet strives toward establishing solid industry best practices and standards. Here is a list of all the supported and integrated Bitcoin Improvement Proposals:",-1),u=e("h2",{id:"what-is-supported",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-is-supported"},[e("span",null,"What is supported")])],-1),m={href:"https://github.com/bitcoin/bips/blob/master/bip-0021.mediawiki",target:"_blank",rel:"noopener noreferrer"},_={href:"https://github.com/bitcoin/bips/blob/master/bip-0032.mediawiki",target:"_blank",rel:"noopener noreferrer"},f={href:"https://github.com/bitcoin/bips/blob/master/bip-0038.mediawiki",target:"_blank",rel:"noopener noreferrer"},g={href:"https://github.com/bitcoin/bips/blob/master/bip-0039.mediawiki",target:"_blank",rel:"noopener noreferrer"},k={href:"https://github.com/bitcoin/bips/blob/master/bip-0044.mediawiki",target:"_blank",rel:"noopener noreferrer"},P={href:"https://github.com/bitcoin/bips/blob/master/bip-0072.mediawiki",target:"_blank",rel:"noopener noreferrer"},w={href:"https://github.com/bitcoin/bips/blob/master/bip-0078.mediawiki",target:"_blank",rel:"noopener noreferrer"},B={href:"https://github.com/bitcoin/bips/blob/master/bip-0084.mediawiki",target:"_blank",rel:"noopener noreferrer"},I={href:"https://github.com/bitcoin/bips/blob/master/bip-0086.mediawiki",target:"_blank",rel:"noopener noreferrer"},v={href:"https://github.com/bitcoin/bips/blob/master/bip-0125.mediawiki",target:"_blank",rel:"noopener noreferrer"},W={href:"https://github.com/bitcoin/bips/blob/master/bip-0141.mediawiki",target:"_blank",rel:"noopener noreferrer"},S={href:"https://github.com/bitcoin/bips/blob/master/bip-0143.mediawiki",target:"_blank",rel:"noopener noreferrer"},x={href:"https://github.com/bitcoin/bips/blob/master/bip-0144.mediawiki",target:"_blank",rel:"noopener noreferrer"},y={href:"https://github.com/bitcoin/bips/blob/master/bip-0158.mediawiki",target:"_blank",rel:"noopener noreferrer"},T={href:"https://github.com/bitcoin/bips/blob/master/bip-0173.mediawiki",target:"_blank",rel:"noopener noreferrer"},D={href:"https://github.com/bitcoin/bips/blob/master/bip-0174.mediawiki",target:"_blank",rel:"noopener noreferrer"},K={href:"https://github.com/bitcoin/bips/blob/master/bip-0341.mediawiki",target:"_blank",rel:"noopener noreferrer"},V=e("h2",{id:"what-is-not-supported",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-is-not-supported"},[e("span",null,"What is not supported")])],-1),C={href:"https://github.com/bitcoin/bips/blob/master/bip-0037.mediawiki",target:"_blank",rel:"noopener noreferrer"},H={href:"https://github.com/bitcoin/bips/blob/master/bip-0069.mediawiki",target:"_blank",rel:"noopener noreferrer"};function L(N,O){const r=n("router-link"),o=n("ExternalLinkIcon");return l(),p("div",null,[c,e("nav",h,[e("ul",null,[e("li",null,[t(r,{to:"#what-is-supported"},{default:s(()=>[i("What is supported")]),_:1})]),e("li",null,[t(r,{to:"#what-is-not-supported"},{default:s(()=>[i("What is not supported")]),_:1})])])]),d,u,e("ul",null,[e("li",null,[e("a",m,[i("BIP 21: URI Scheme"),t(o)])]),e("li",null,[e("a",_,[i("BIP 32: Hierarchical Deterministic Wallets"),t(o)])]),e("li",null,[e("a",f,[i("BIP 38: Password-Protected Private Key"),t(o)])]),e("li",null,[e("a",g,[i("BIP 39: Mnemonic Code for Generating Deterministic Keys"),t(o)])]),e("li",null,[e("a",k,[i("BIP 44: Multi-Account Hierarchy for Deterministic Wallets"),t(o)])]),e("li",null,[e("a",P,[i("BIP 72: bitcoin: uri extensions for Payment Protocol"),t(o)])]),e("li",null,[e("a",w,[i("BIP 78: A Simple Payjoin Proposal"),t(o)])]),e("li",null,[e("a",B,[i("BIP 84: Derivation scheme for P2WPKH based accounts"),t(o)])]),e("li",null,[e("a",I,[i("BIP 86: Key Derivation for Single Key P2TR Outputs"),t(o)])]),e("li",null,[e("a",v,[i("BIP 125: Opt-In full Replace-by-Fee Signaling"),t(o)])]),e("li",null,[e("a",W,[i("BIP 141: Segregated Witness (Consensus Layer)"),t(o)])]),e("li",null,[e("a",S,[i("BIP 143: Transaction Signature Verification for Version 0 Witness Program"),t(o)])]),e("li",null,[e("a",x,[i("BIP 144: Segregated Witness (Peer Services)"),t(o)])]),e("li",null,[e("a",y,[i("BIP 158: Block filters"),t(o)])]),e("li",null,[e("a",T,[i("BIP 173: Base32 address format for native v0-16 witness outputs"),t(o)])]),e("li",null,[e("a",D,[i("BIP 174: Partially Signed Bitcoin Transaction Format"),t(o)])]),e("li",null,[e("a",K,[i("BIP 341: Taproot: SegWit version 1 spending rules"),t(o)])])]),V,e("ul",null,[e("li",null,[e("a",C,[i("BIP 37: Bloom filters"),t(o)])]),e("li",null,[e("a",H,[i("BIP 69: Lexicographical Indexing of Transaction Inputs and Outputs"),t(o)])])])])}const A=a(b,[["render",L],["__file","BIPs.html.vue"]]),E=JSON.parse('{"path":"/using-wasabi/BIPs.html","title":"Supported BIPs","lang":"en-US","frontmatter":{"title":"Supported BIPs","description":"A collection and explanation of all the Bitcoin Improvement Proposals that are supported by Wasabi. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"What is supported","slug":"what-is-supported","link":"#what-is-supported","children":[]},{"level":2,"title":"What is not supported","slug":"what-is-not-supported","link":"#what-is-not-supported","children":[]}],"git":{"updatedTime":1720425186000},"filePathRelative":"using-wasabi/BIPs.md"}');export{A as comp,E as data}; +import{_ as a,r as n,o as l,c as p,a as e,d as t,w as s,b as i}from"./app-CwImt2bI.js";const b={},c=e("h1",{id:"supported-bips",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#supported-bips"},[e("span",null,"Supported BIPs")])],-1),h={class:"table-of-contents"},d=e("p",null,"Wasabi Wallet strives toward establishing solid industry best practices and standards. Here is a list of all the supported and integrated Bitcoin Improvement Proposals:",-1),u=e("h2",{id:"what-is-supported",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-is-supported"},[e("span",null,"What is supported")])],-1),m={href:"https://github.com/bitcoin/bips/blob/master/bip-0021.mediawiki",target:"_blank",rel:"noopener noreferrer"},_={href:"https://github.com/bitcoin/bips/blob/master/bip-0032.mediawiki",target:"_blank",rel:"noopener noreferrer"},f={href:"https://github.com/bitcoin/bips/blob/master/bip-0038.mediawiki",target:"_blank",rel:"noopener noreferrer"},g={href:"https://github.com/bitcoin/bips/blob/master/bip-0039.mediawiki",target:"_blank",rel:"noopener noreferrer"},k={href:"https://github.com/bitcoin/bips/blob/master/bip-0044.mediawiki",target:"_blank",rel:"noopener noreferrer"},P={href:"https://github.com/bitcoin/bips/blob/master/bip-0072.mediawiki",target:"_blank",rel:"noopener noreferrer"},w={href:"https://github.com/bitcoin/bips/blob/master/bip-0078.mediawiki",target:"_blank",rel:"noopener noreferrer"},B={href:"https://github.com/bitcoin/bips/blob/master/bip-0084.mediawiki",target:"_blank",rel:"noopener noreferrer"},I={href:"https://github.com/bitcoin/bips/blob/master/bip-0086.mediawiki",target:"_blank",rel:"noopener noreferrer"},v={href:"https://github.com/bitcoin/bips/blob/master/bip-0125.mediawiki",target:"_blank",rel:"noopener noreferrer"},W={href:"https://github.com/bitcoin/bips/blob/master/bip-0141.mediawiki",target:"_blank",rel:"noopener noreferrer"},S={href:"https://github.com/bitcoin/bips/blob/master/bip-0143.mediawiki",target:"_blank",rel:"noopener noreferrer"},x={href:"https://github.com/bitcoin/bips/blob/master/bip-0144.mediawiki",target:"_blank",rel:"noopener noreferrer"},y={href:"https://github.com/bitcoin/bips/blob/master/bip-0158.mediawiki",target:"_blank",rel:"noopener noreferrer"},T={href:"https://github.com/bitcoin/bips/blob/master/bip-0173.mediawiki",target:"_blank",rel:"noopener noreferrer"},D={href:"https://github.com/bitcoin/bips/blob/master/bip-0174.mediawiki",target:"_blank",rel:"noopener noreferrer"},K={href:"https://github.com/bitcoin/bips/blob/master/bip-0341.mediawiki",target:"_blank",rel:"noopener noreferrer"},V=e("h2",{id:"what-is-not-supported",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-is-not-supported"},[e("span",null,"What is not supported")])],-1),C={href:"https://github.com/bitcoin/bips/blob/master/bip-0037.mediawiki",target:"_blank",rel:"noopener noreferrer"},H={href:"https://github.com/bitcoin/bips/blob/master/bip-0069.mediawiki",target:"_blank",rel:"noopener noreferrer"};function L(N,O){const r=n("router-link"),o=n("ExternalLinkIcon");return l(),p("div",null,[c,e("nav",h,[e("ul",null,[e("li",null,[t(r,{to:"#what-is-supported"},{default:s(()=>[i("What is supported")]),_:1})]),e("li",null,[t(r,{to:"#what-is-not-supported"},{default:s(()=>[i("What is not supported")]),_:1})])])]),d,u,e("ul",null,[e("li",null,[e("a",m,[i("BIP 21: URI Scheme"),t(o)])]),e("li",null,[e("a",_,[i("BIP 32: Hierarchical Deterministic Wallets"),t(o)])]),e("li",null,[e("a",f,[i("BIP 38: Password-Protected Private Key"),t(o)])]),e("li",null,[e("a",g,[i("BIP 39: Mnemonic Code for Generating Deterministic Keys"),t(o)])]),e("li",null,[e("a",k,[i("BIP 44: Multi-Account Hierarchy for Deterministic Wallets"),t(o)])]),e("li",null,[e("a",P,[i("BIP 72: bitcoin: uri extensions for Payment Protocol"),t(o)])]),e("li",null,[e("a",w,[i("BIP 78: A Simple Payjoin Proposal"),t(o)])]),e("li",null,[e("a",B,[i("BIP 84: Derivation scheme for P2WPKH based accounts"),t(o)])]),e("li",null,[e("a",I,[i("BIP 86: Key Derivation for Single Key P2TR Outputs"),t(o)])]),e("li",null,[e("a",v,[i("BIP 125: Opt-In full Replace-by-Fee Signaling"),t(o)])]),e("li",null,[e("a",W,[i("BIP 141: Segregated Witness (Consensus Layer)"),t(o)])]),e("li",null,[e("a",S,[i("BIP 143: Transaction Signature Verification for Version 0 Witness Program"),t(o)])]),e("li",null,[e("a",x,[i("BIP 144: Segregated Witness (Peer Services)"),t(o)])]),e("li",null,[e("a",y,[i("BIP 158: Block filters"),t(o)])]),e("li",null,[e("a",T,[i("BIP 173: Base32 address format for native v0-16 witness outputs"),t(o)])]),e("li",null,[e("a",D,[i("BIP 174: Partially Signed Bitcoin Transaction Format"),t(o)])]),e("li",null,[e("a",K,[i("BIP 341: Taproot: SegWit version 1 spending rules"),t(o)])])]),V,e("ul",null,[e("li",null,[e("a",C,[i("BIP 37: Bloom filters"),t(o)])]),e("li",null,[e("a",H,[i("BIP 69: Lexicographical Indexing of Transaction Inputs and Outputs"),t(o)])])])])}const A=a(b,[["render",L],["__file","BIPs.html.vue"]]),E=JSON.parse('{"path":"/using-wasabi/BIPs.html","title":"Supported BIPs","lang":"en-US","frontmatter":{"title":"Supported BIPs","description":"A collection and explanation of all the Bitcoin Improvement Proposals that are supported by Wasabi. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"What is supported","slug":"what-is-supported","link":"#what-is-supported","children":[]},{"level":2,"title":"What is not supported","slug":"what-is-not-supported","link":"#what-is-not-supported","children":[]}],"git":{"updatedTime":1720425980000},"filePathRelative":"using-wasabi/BIPs.md"}');export{A as comp,E as data}; diff --git a/assets/BackupBestPractices.html-O2Wi4N0t.js b/assets/BackupBestPractices.html-DMW1-yKl.js similarity index 98% rename from assets/BackupBestPractices.html-O2Wi4N0t.js rename to assets/BackupBestPractices.html-DMW1-yKl.js index 700643101..1808d5390 100644 --- a/assets/BackupBestPractices.html-O2Wi4N0t.js +++ b/assets/BackupBestPractices.html-DMW1-yKl.js @@ -1 +1 @@ -import{_ as n,r,o as l,c as s,a as e,d as t,w as i,e as d,b as o}from"./app-3S7gIoGc.js";const c={},h=e("h1",{id:"wasabi-backup-best-practices",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#wasabi-backup-best-practices"},[e("span",null,"Wasabi Backup Best Practices")])],-1),p={class:"table-of-contents"},u=d('

Common mediums for backups

Written on a piece of paper

Printed on a piece of paper

On laminated paper

Engraved / etched / ablated / stamped on a piece of metal

Stored digitally on a computer

Stored digitally on CD, floppy disk, laserdisc, or mini-disc

Stored digitally on a flash drive

A pre-funded physical bitcoin coin (where the manufacturer generates and installs the secret key)

These are the methods you can use for your Wasabi backup and their benefits and tradeoffs.

',18);function m(f,y){const a=r("router-link");return l(),s("div",null,[h,e("nav",p,[e("ul",null,[e("li",null,[t(a,{to:"#common-mediums-for-backups"},{default:i(()=>[o("Common mediums for backups")]),_:1}),e("ul",null,[e("li",null,[t(a,{to:"#written-on-a-piece-of-paper"},{default:i(()=>[o("Written on a piece of paper")]),_:1})]),e("li",null,[t(a,{to:"#printed-on-a-piece-of-paper"},{default:i(()=>[o("Printed on a piece of paper")]),_:1})]),e("li",null,[t(a,{to:"#on-laminated-paper"},{default:i(()=>[o("On laminated paper")]),_:1})]),e("li",null,[t(a,{to:"#engraved-etched-ablated-stamped-on-a-piece-of-metal"},{default:i(()=>[o("Engraved / etched / ablated / stamped on a piece of metal")]),_:1})]),e("li",null,[t(a,{to:"#stored-digitally-on-a-computer"},{default:i(()=>[o("Stored digitally on a computer")]),_:1})]),e("li",null,[t(a,{to:"#stored-digitally-on-cd-floppy-disk-laserdisc-or-mini-disc"},{default:i(()=>[o("Stored digitally on CD, floppy disk, laserdisc, or mini-disc")]),_:1})]),e("li",null,[t(a,{to:"#stored-digitally-on-a-flash-drive"},{default:i(()=>[o("Stored digitally on a flash drive")]),_:1})]),e("li",null,[t(a,{to:"#a-pre-funded-physical-bitcoin-coin-where-the-manufacturer-generates-and-installs-the-secret-key"},{default:i(()=>[o("A pre-funded physical bitcoin coin (where the manufacturer generates and installs the secret key)")]),_:1})])])])])]),u])}const b=n(c,[["render",m],["__file","BackupBestPractices.html.vue"]]),k=JSON.parse('{"path":"/using-wasabi/BackupBestPractices.html","title":"Wasabi Backup Best Practices","lang":"en-US","frontmatter":{"title":"Wasabi Backup Best Practices","description":"A detailed guide about the best practices of backing up your passphrases and recovery words. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Common mediums for backups","slug":"common-mediums-for-backups","link":"#common-mediums-for-backups","children":[{"level":3,"title":"Written on a piece of paper","slug":"written-on-a-piece-of-paper","link":"#written-on-a-piece-of-paper","children":[]},{"level":3,"title":"Printed on a piece of paper","slug":"printed-on-a-piece-of-paper","link":"#printed-on-a-piece-of-paper","children":[]},{"level":3,"title":"On laminated paper","slug":"on-laminated-paper","link":"#on-laminated-paper","children":[]},{"level":3,"title":"Engraved / etched / ablated / stamped on a piece of metal","slug":"engraved-etched-ablated-stamped-on-a-piece-of-metal","link":"#engraved-etched-ablated-stamped-on-a-piece-of-metal","children":[]},{"level":3,"title":"Stored digitally on a computer","slug":"stored-digitally-on-a-computer","link":"#stored-digitally-on-a-computer","children":[]},{"level":3,"title":"Stored digitally on CD, floppy disk, laserdisc, or mini-disc","slug":"stored-digitally-on-cd-floppy-disk-laserdisc-or-mini-disc","link":"#stored-digitally-on-cd-floppy-disk-laserdisc-or-mini-disc","children":[]},{"level":3,"title":"Stored digitally on a flash drive","slug":"stored-digitally-on-a-flash-drive","link":"#stored-digitally-on-a-flash-drive","children":[]},{"level":3,"title":"A pre-funded physical bitcoin coin (where the manufacturer generates and installs the secret key)","slug":"a-pre-funded-physical-bitcoin-coin-where-the-manufacturer-generates-and-installs-the-secret-key","link":"#a-pre-funded-physical-bitcoin-coin-where-the-manufacturer-generates-and-installs-the-secret-key","children":[]}]}],"git":{"updatedTime":1720425186000},"filePathRelative":"using-wasabi/BackupBestPractices.md"}');export{b as comp,k as data}; +import{_ as n,r,o as l,c as s,a as e,d as t,w as i,e as d,b as o}from"./app-CwImt2bI.js";const c={},h=e("h1",{id:"wasabi-backup-best-practices",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#wasabi-backup-best-practices"},[e("span",null,"Wasabi Backup Best Practices")])],-1),p={class:"table-of-contents"},u=d('

Common mediums for backups

Written on a piece of paper

Printed on a piece of paper

On laminated paper

Engraved / etched / ablated / stamped on a piece of metal

Stored digitally on a computer

Stored digitally on CD, floppy disk, laserdisc, or mini-disc

Stored digitally on a flash drive

A pre-funded physical bitcoin coin (where the manufacturer generates and installs the secret key)

These are the methods you can use for your Wasabi backup and their benefits and tradeoffs.

',18);function m(f,y){const a=r("router-link");return l(),s("div",null,[h,e("nav",p,[e("ul",null,[e("li",null,[t(a,{to:"#common-mediums-for-backups"},{default:i(()=>[o("Common mediums for backups")]),_:1}),e("ul",null,[e("li",null,[t(a,{to:"#written-on-a-piece-of-paper"},{default:i(()=>[o("Written on a piece of paper")]),_:1})]),e("li",null,[t(a,{to:"#printed-on-a-piece-of-paper"},{default:i(()=>[o("Printed on a piece of paper")]),_:1})]),e("li",null,[t(a,{to:"#on-laminated-paper"},{default:i(()=>[o("On laminated paper")]),_:1})]),e("li",null,[t(a,{to:"#engraved-etched-ablated-stamped-on-a-piece-of-metal"},{default:i(()=>[o("Engraved / etched / ablated / stamped on a piece of metal")]),_:1})]),e("li",null,[t(a,{to:"#stored-digitally-on-a-computer"},{default:i(()=>[o("Stored digitally on a computer")]),_:1})]),e("li",null,[t(a,{to:"#stored-digitally-on-cd-floppy-disk-laserdisc-or-mini-disc"},{default:i(()=>[o("Stored digitally on CD, floppy disk, laserdisc, or mini-disc")]),_:1})]),e("li",null,[t(a,{to:"#stored-digitally-on-a-flash-drive"},{default:i(()=>[o("Stored digitally on a flash drive")]),_:1})]),e("li",null,[t(a,{to:"#a-pre-funded-physical-bitcoin-coin-where-the-manufacturer-generates-and-installs-the-secret-key"},{default:i(()=>[o("A pre-funded physical bitcoin coin (where the manufacturer generates and installs the secret key)")]),_:1})])])])])]),u])}const b=n(c,[["render",m],["__file","BackupBestPractices.html.vue"]]),k=JSON.parse('{"path":"/using-wasabi/BackupBestPractices.html","title":"Wasabi Backup Best Practices","lang":"en-US","frontmatter":{"title":"Wasabi Backup Best Practices","description":"A detailed guide about the best practices of backing up your passphrases and recovery words. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Common mediums for backups","slug":"common-mediums-for-backups","link":"#common-mediums-for-backups","children":[{"level":3,"title":"Written on a piece of paper","slug":"written-on-a-piece-of-paper","link":"#written-on-a-piece-of-paper","children":[]},{"level":3,"title":"Printed on a piece of paper","slug":"printed-on-a-piece-of-paper","link":"#printed-on-a-piece-of-paper","children":[]},{"level":3,"title":"On laminated paper","slug":"on-laminated-paper","link":"#on-laminated-paper","children":[]},{"level":3,"title":"Engraved / etched / ablated / stamped on a piece of metal","slug":"engraved-etched-ablated-stamped-on-a-piece-of-metal","link":"#engraved-etched-ablated-stamped-on-a-piece-of-metal","children":[]},{"level":3,"title":"Stored digitally on a computer","slug":"stored-digitally-on-a-computer","link":"#stored-digitally-on-a-computer","children":[]},{"level":3,"title":"Stored digitally on CD, floppy disk, laserdisc, or mini-disc","slug":"stored-digitally-on-cd-floppy-disk-laserdisc-or-mini-disc","link":"#stored-digitally-on-cd-floppy-disk-laserdisc-or-mini-disc","children":[]},{"level":3,"title":"Stored digitally on a flash drive","slug":"stored-digitally-on-a-flash-drive","link":"#stored-digitally-on-a-flash-drive","children":[]},{"level":3,"title":"A pre-funded physical bitcoin coin (where the manufacturer generates and installs the secret key)","slug":"a-pre-funded-physical-bitcoin-coin-where-the-manufacturer-generates-and-installs-the-secret-key","link":"#a-pre-funded-physical-bitcoin-coin-where-the-manufacturer-generates-and-installs-the-secret-key","children":[]}]}],"git":{"updatedTime":1720425980000},"filePathRelative":"using-wasabi/BackupBestPractices.md"}');export{b as comp,k as data}; diff --git a/assets/BitcoinFullNode.html-BStS9Wl_.js b/assets/BitcoinFullNode.html-Bs7E4TRd.js similarity index 98% rename from assets/BitcoinFullNode.html-BStS9Wl_.js rename to assets/BitcoinFullNode.html-Bs7E4TRd.js index 9b934499d..91e2771c3 100644 --- a/assets/BitcoinFullNode.html-BStS9Wl_.js +++ b/assets/BitcoinFullNode.html-Bs7E4TRd.js @@ -1 +1 @@ -import{a as r,_ as c}from"./SettingsBitcoinCore-DgSldI_2.js";import{_ as d,r as l,o as u,c as h,a as e,d as n,w as i,b as o,e as f}from"./app-3S7gIoGc.js";const b={},y=e("h1",{id:"bitcoin-full-node",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#bitcoin-full-node"},[e("span",null,"Bitcoin Full Node")])],-1),p={class:"table-of-contents"},g=e("h2",{id:"the-importance-of-running-a-full-node",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#the-importance-of-running-a-full-node"},[e("span",null,"The importance of running a full node")])],-1),w=e("p",null,"When running a Bitcoin full node, you define the precise monetary rules that you voluntarily agree on. Nobody else forces this choice upon you. Thus any sovereign individual who wants to claim financial independence must run a full node. Once your own rules are firmly established, your software discovers other nodes in the Bitcoin peer-to-peer network which do not break your rules. These peers send you transactions and blocks which are valid according to their set of rules, and you verify for yourself if they are also correct for you. If one of the proposed transactions breaks your own rules, then you mark it as invalid, disconnect from and ban the node who sent you the malicious transaction.",-1),m=e("div",{class:"custom-container tip"},[e("p",{class:"custom-container-title"},"Claim your monetary sovereignty"),e("p",null,"With your full node you define, verify, and enforce the rules of your sound money Bitcoin.")],-1),_=e("p",null,"Only by running a full node, do you verify by yourself that the money you receive is actually valid bitcoin. You do not trust an external third party, and thus you also do not leak any sensitive financial information.",-1),v={href:"https://bitcoincore.org/",target:"_blank",rel:"noopener noreferrer"},k={href:"https://bitcoinknots.org/",target:"_blank",rel:"noopener noreferrer"},W={href:"https://libbitcoin.info/",target:"_blank",rel:"noopener noreferrer"},B=e("h2",{id:"how-does-wasabi-use-your-bitcoin-full-node",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-does-wasabi-use-your-bitcoin-full-node"},[e("span",null,"How does Wasabi use your Bitcoin full node")])],-1),x={href:"https://github.com/bitcoin/bips/blob/master/bip-0158.mediawiki",target:"_blank",rel:"noopener noreferrer"},T=e("div",{class:"custom-container warning"},[e("p",{class:"custom-container-title"},"Work in progress"),e("p",null,[o("The zkSNACKs server has to be trusted to serve correct filters. This current work in progress integration "),e("strong",null,"does not"),o(" verify consensus within Wasabi.")])],-1),N=e("code",null,"smartfee",-1),P=e("p",null,"The future goal is that the local full node (Knots) is used to generate the BIP 158 block filters from the verified blocks. Only then is there full verification, and no trust in the zkSNACKs server.",-1),I=e("h2",{id:"bitcoind-within-wasabi",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#bitcoind-within-wasabi"},[e("span",null,"bitcoind within Wasabi")])],-1),C={href:"https://bitcoinknots.org",target:"_blank",rel:"noopener noreferrer"},K=f('

Wasabi Wallet Bitcoin Knots full node integration

Using an already existing local Bitcoin full node

If you have a Bitcoin full node already pre-installed on the same computer you use to run Wasabi Wallet, then Wasabi will use your node by default. You do not need to change anything in the settings, it should work plug and play. This is especially useful to save on bandwidth, as you have already downloaded and verified a block with your full node, so you don't need to download it again with Wasabi.

Using an already existing remote Bitcoin full node

If you have a Bitcoin full node already on a remote computer, then Wasabi Wallet can use this too. In the Bitcoin settings, specify the local IP address and port or the Tor onion service of your full node.

Wasabi Wallet remote Bitcoin P2P full node endpoint

Verify that Wasabi is connected to your full node

There are two ways to confirm that your Wasabi client is connected to your own full node.

First, in the Wasabi logs. Once you receive a transaction Wasabi downloads the block containing that transaction from your node, and in the logs you should see: Block {hash} acquired from node '{node}'.

Second, by checking the connected peers inside your full node. Wasabi will show up as one of the connected peers while it is downloading a block. You can check this in the Bitcoin Core / Knots GUI by clicking on Window -> Peers. During the period when Wasabi is fetching a block, it will show up in the User Agent column. Alternatively, you can use the Bitcoin RPC call bitcoin-cli getpeerinfo and see the Wasabi client listed.

',10);function U(F,S){const t=l("router-link"),a=l("ExternalLinkIcon"),s=l("RouteLink");return u(),h("div",null,[y,e("nav",p,[e("ul",null,[e("li",null,[n(t,{to:"#the-importance-of-running-a-full-node"},{default:i(()=>[o("The importance of running a full node")]),_:1})]),e("li",null,[n(t,{to:"#how-does-wasabi-use-your-bitcoin-full-node"},{default:i(()=>[o("How does Wasabi use your Bitcoin full node")]),_:1})]),e("li",null,[n(t,{to:"#bitcoind-within-wasabi"},{default:i(()=>[o("bitcoind within Wasabi")]),_:1})]),e("li",null,[n(t,{to:"#using-an-already-existing-local-bitcoin-full-node"},{default:i(()=>[o("Using an already existing local Bitcoin full node")]),_:1})]),e("li",null,[n(t,{to:"#using-an-already-existing-remote-bitcoin-full-node"},{default:i(()=>[o("Using an already existing remote Bitcoin full node")]),_:1})]),e("li",null,[n(t,{to:"#verify-that-wasabi-is-connected-to-your-full-node"},{default:i(()=>[o("Verify that Wasabi is connected to your full node")]),_:1})])])]),g,w,m,_,e("p",null,[o("There are several software implementations that function as a full node, for example, "),e("a",v,[o("Bitcoin Core"),n(a)]),o(", "),e("a",k,[o("Bitcoin Knots"),n(a)]),o(", or "),e("a",W,[o("LibBitcoin"),n(a)]),o(".")]),B,e("p",null,[o("Wasabi currently has a work in progress partial Bitcoin Knots integration. As of now, the zkSNACKs coordinating server broadcasts "),e("a",x,[o("BIP 158 block filters"),n(a)]),o(" to all Wasabi clients, who locally check if the filter hits for their public keys. Then you know that this block has a transaction of yours included, or maybe it is a false positive.")]),T,e("p",null,[o("If a full node is connected to Wasabi, then the relevant block is fetched from this trusted node, and not from a random P2P node. Wasabi also queries if your local mempool has unconfirmed transactions that are of interest to you. Further, your full node is used to estimate the current mining fee level based on the bitcoind "),N,o(" algorithm. Your full node is not used to broadcast your transactions, as this is done through a random peer-to-peer node with a new tor identity, which is better for your "),n(s,{to:"/why-wasabi/NetworkLevelPrivacy.html"},{default:i(()=>[o("network-level privacy")]),_:1}),o(".")]),P,I,e("p",null,[o("Wasabi Wallet ships with "),e("a",C,[o("Bitcoin Knots"),n(a)]),o(". This means that every Wasabi client has the necessary software to run a Bitcoin full node and define, verify, and enforce monetary consensus with bitcoind, but this verification is not yet used within Wasabi itself, it is a work in progress. By default, bitcoind is not started together with Wasabi. This must be activated explicitly in the settings because this is a bandwidth, CPU and storage-intensive program. It is optional to keep bitcoind running even after Wasabi Wallet is shut down, so as to verify blocks as soon as they are received.")]),K])}const L=d(b,[["render",U],["__file","BitcoinFullNode.html.vue"]]),O=JSON.parse('{"path":"/using-wasabi/BitcoinFullNode.html","title":"Bitcoin Full Node","lang":"en-US","frontmatter":{"title":"Bitcoin Full Node","description":"Information and step-by-step guides on how to use your own Bitcoin Core full node together with Wasabi Wallet. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"The importance of running a full node","slug":"the-importance-of-running-a-full-node","link":"#the-importance-of-running-a-full-node","children":[]},{"level":2,"title":"How does Wasabi use your Bitcoin full node","slug":"how-does-wasabi-use-your-bitcoin-full-node","link":"#how-does-wasabi-use-your-bitcoin-full-node","children":[]},{"level":2,"title":"bitcoind within Wasabi","slug":"bitcoind-within-wasabi","link":"#bitcoind-within-wasabi","children":[]},{"level":2,"title":"Using an already existing local Bitcoin full node","slug":"using-an-already-existing-local-bitcoin-full-node","link":"#using-an-already-existing-local-bitcoin-full-node","children":[]},{"level":2,"title":"Using an already existing remote Bitcoin full node","slug":"using-an-already-existing-remote-bitcoin-full-node","link":"#using-an-already-existing-remote-bitcoin-full-node","children":[]},{"level":2,"title":"Verify that Wasabi is connected to your full node","slug":"verify-that-wasabi-is-connected-to-your-full-node","link":"#verify-that-wasabi-is-connected-to-your-full-node","children":[]}],"git":{"updatedTime":1720425186000},"filePathRelative":"using-wasabi/BitcoinFullNode.md"}');export{L as comp,O as data}; +import{a as r,_ as c}from"./SettingsBitcoinCore-DgSldI_2.js";import{_ as d,r as l,o as u,c as h,a as e,d as n,w as i,b as o,e as f}from"./app-CwImt2bI.js";const b={},y=e("h1",{id:"bitcoin-full-node",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#bitcoin-full-node"},[e("span",null,"Bitcoin Full Node")])],-1),p={class:"table-of-contents"},g=e("h2",{id:"the-importance-of-running-a-full-node",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#the-importance-of-running-a-full-node"},[e("span",null,"The importance of running a full node")])],-1),w=e("p",null,"When running a Bitcoin full node, you define the precise monetary rules that you voluntarily agree on. Nobody else forces this choice upon you. Thus any sovereign individual who wants to claim financial independence must run a full node. Once your own rules are firmly established, your software discovers other nodes in the Bitcoin peer-to-peer network which do not break your rules. These peers send you transactions and blocks which are valid according to their set of rules, and you verify for yourself if they are also correct for you. If one of the proposed transactions breaks your own rules, then you mark it as invalid, disconnect from and ban the node who sent you the malicious transaction.",-1),m=e("div",{class:"custom-container tip"},[e("p",{class:"custom-container-title"},"Claim your monetary sovereignty"),e("p",null,"With your full node you define, verify, and enforce the rules of your sound money Bitcoin.")],-1),_=e("p",null,"Only by running a full node, do you verify by yourself that the money you receive is actually valid bitcoin. You do not trust an external third party, and thus you also do not leak any sensitive financial information.",-1),v={href:"https://bitcoincore.org/",target:"_blank",rel:"noopener noreferrer"},k={href:"https://bitcoinknots.org/",target:"_blank",rel:"noopener noreferrer"},W={href:"https://libbitcoin.info/",target:"_blank",rel:"noopener noreferrer"},B=e("h2",{id:"how-does-wasabi-use-your-bitcoin-full-node",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-does-wasabi-use-your-bitcoin-full-node"},[e("span",null,"How does Wasabi use your Bitcoin full node")])],-1),x={href:"https://github.com/bitcoin/bips/blob/master/bip-0158.mediawiki",target:"_blank",rel:"noopener noreferrer"},T=e("div",{class:"custom-container warning"},[e("p",{class:"custom-container-title"},"Work in progress"),e("p",null,[o("The zkSNACKs server has to be trusted to serve correct filters. This current work in progress integration "),e("strong",null,"does not"),o(" verify consensus within Wasabi.")])],-1),N=e("code",null,"smartfee",-1),P=e("p",null,"The future goal is that the local full node (Knots) is used to generate the BIP 158 block filters from the verified blocks. Only then is there full verification, and no trust in the zkSNACKs server.",-1),I=e("h2",{id:"bitcoind-within-wasabi",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#bitcoind-within-wasabi"},[e("span",null,"bitcoind within Wasabi")])],-1),C={href:"https://bitcoinknots.org",target:"_blank",rel:"noopener noreferrer"},K=f('

Wasabi Wallet Bitcoin Knots full node integration

Using an already existing local Bitcoin full node

If you have a Bitcoin full node already pre-installed on the same computer you use to run Wasabi Wallet, then Wasabi will use your node by default. You do not need to change anything in the settings, it should work plug and play. This is especially useful to save on bandwidth, as you have already downloaded and verified a block with your full node, so you don't need to download it again with Wasabi.

Using an already existing remote Bitcoin full node

If you have a Bitcoin full node already on a remote computer, then Wasabi Wallet can use this too. In the Bitcoin settings, specify the local IP address and port or the Tor onion service of your full node.

Wasabi Wallet remote Bitcoin P2P full node endpoint

Verify that Wasabi is connected to your full node

There are two ways to confirm that your Wasabi client is connected to your own full node.

First, in the Wasabi logs. Once you receive a transaction Wasabi downloads the block containing that transaction from your node, and in the logs you should see: Block {hash} acquired from node '{node}'.

Second, by checking the connected peers inside your full node. Wasabi will show up as one of the connected peers while it is downloading a block. You can check this in the Bitcoin Core / Knots GUI by clicking on Window -> Peers. During the period when Wasabi is fetching a block, it will show up in the User Agent column. Alternatively, you can use the Bitcoin RPC call bitcoin-cli getpeerinfo and see the Wasabi client listed.

',10);function U(F,S){const t=l("router-link"),a=l("ExternalLinkIcon"),s=l("RouteLink");return u(),h("div",null,[y,e("nav",p,[e("ul",null,[e("li",null,[n(t,{to:"#the-importance-of-running-a-full-node"},{default:i(()=>[o("The importance of running a full node")]),_:1})]),e("li",null,[n(t,{to:"#how-does-wasabi-use-your-bitcoin-full-node"},{default:i(()=>[o("How does Wasabi use your Bitcoin full node")]),_:1})]),e("li",null,[n(t,{to:"#bitcoind-within-wasabi"},{default:i(()=>[o("bitcoind within Wasabi")]),_:1})]),e("li",null,[n(t,{to:"#using-an-already-existing-local-bitcoin-full-node"},{default:i(()=>[o("Using an already existing local Bitcoin full node")]),_:1})]),e("li",null,[n(t,{to:"#using-an-already-existing-remote-bitcoin-full-node"},{default:i(()=>[o("Using an already existing remote Bitcoin full node")]),_:1})]),e("li",null,[n(t,{to:"#verify-that-wasabi-is-connected-to-your-full-node"},{default:i(()=>[o("Verify that Wasabi is connected to your full node")]),_:1})])])]),g,w,m,_,e("p",null,[o("There are several software implementations that function as a full node, for example, "),e("a",v,[o("Bitcoin Core"),n(a)]),o(", "),e("a",k,[o("Bitcoin Knots"),n(a)]),o(", or "),e("a",W,[o("LibBitcoin"),n(a)]),o(".")]),B,e("p",null,[o("Wasabi currently has a work in progress partial Bitcoin Knots integration. As of now, the zkSNACKs coordinating server broadcasts "),e("a",x,[o("BIP 158 block filters"),n(a)]),o(" to all Wasabi clients, who locally check if the filter hits for their public keys. Then you know that this block has a transaction of yours included, or maybe it is a false positive.")]),T,e("p",null,[o("If a full node is connected to Wasabi, then the relevant block is fetched from this trusted node, and not from a random P2P node. Wasabi also queries if your local mempool has unconfirmed transactions that are of interest to you. Further, your full node is used to estimate the current mining fee level based on the bitcoind "),N,o(" algorithm. Your full node is not used to broadcast your transactions, as this is done through a random peer-to-peer node with a new tor identity, which is better for your "),n(s,{to:"/why-wasabi/NetworkLevelPrivacy.html"},{default:i(()=>[o("network-level privacy")]),_:1}),o(".")]),P,I,e("p",null,[o("Wasabi Wallet ships with "),e("a",C,[o("Bitcoin Knots"),n(a)]),o(". This means that every Wasabi client has the necessary software to run a Bitcoin full node and define, verify, and enforce monetary consensus with bitcoind, but this verification is not yet used within Wasabi itself, it is a work in progress. By default, bitcoind is not started together with Wasabi. This must be activated explicitly in the settings because this is a bandwidth, CPU and storage-intensive program. It is optional to keep bitcoind running even after Wasabi Wallet is shut down, so as to verify blocks as soon as they are received.")]),K])}const L=d(b,[["render",U],["__file","BitcoinFullNode.html.vue"]]),O=JSON.parse('{"path":"/using-wasabi/BitcoinFullNode.html","title":"Bitcoin Full Node","lang":"en-US","frontmatter":{"title":"Bitcoin Full Node","description":"Information and step-by-step guides on how to use your own Bitcoin Core full node together with Wasabi Wallet. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"The importance of running a full node","slug":"the-importance-of-running-a-full-node","link":"#the-importance-of-running-a-full-node","children":[]},{"level":2,"title":"How does Wasabi use your Bitcoin full node","slug":"how-does-wasabi-use-your-bitcoin-full-node","link":"#how-does-wasabi-use-your-bitcoin-full-node","children":[]},{"level":2,"title":"bitcoind within Wasabi","slug":"bitcoind-within-wasabi","link":"#bitcoind-within-wasabi","children":[]},{"level":2,"title":"Using an already existing local Bitcoin full node","slug":"using-an-already-existing-local-bitcoin-full-node","link":"#using-an-already-existing-local-bitcoin-full-node","children":[]},{"level":2,"title":"Using an already existing remote Bitcoin full node","slug":"using-an-already-existing-remote-bitcoin-full-node","link":"#using-an-already-existing-remote-bitcoin-full-node","children":[]},{"level":2,"title":"Verify that Wasabi is connected to your full node","slug":"verify-that-wasabi-is-connected-to-your-full-node","link":"#verify-that-wasabi-is-connected-to-your-full-node","children":[]}],"git":{"updatedTime":1720425980000},"filePathRelative":"using-wasabi/BitcoinFullNode.md"}');export{L as comp,O as data}; diff --git a/assets/BuildSource.html-Dj6lYZQa.js b/assets/BuildSource.html-CB8LFRd2.js similarity index 98% rename from assets/BuildSource.html-Dj6lYZQa.js rename to assets/BuildSource.html-CB8LFRd2.js index ded457932..0cd1ece91 100644 --- a/assets/BuildSource.html-Dj6lYZQa.js +++ b/assets/BuildSource.html-CB8LFRd2.js @@ -1,4 +1,4 @@ -import{_ as c,r as i,o as d,c as u,a as e,d as t,w as n,b as a,e as r}from"./app-3S7gIoGc.js";const h={},p=e("h1",{id:"build-from-source-code",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#build-from-source-code"},[e("span",null,"Build from source code")])],-1),b={class:"table-of-contents"},m=e("h2",{id:"introduction",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#introduction"},[e("span",null,"Introduction")])],-1),g=e("h2",{id:"get-the-requirements",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#get-the-requirements"},[e("span",null,"Get The Requirements")])],-1),f={href:"https://git-scm.com/downloads",target:"_blank",rel:"noopener noreferrer"},v={href:"https://dotnet.microsoft.com/download",target:"_blank",rel:"noopener noreferrer"},_=e("div",{class:"custom-container tip"},[e("p",{class:"custom-container-title"},"Optional for privacy"),e("p",null,"You can disable .NET's telemetry, which is sending some usage information to Microsoft, by typing:"),e("p",null,[e("code",null,"export DOTNET_CLI_TELEMETRY_OPTOUT=1"),a(" on Linux and macOS.")]),e("p",null,[e("code",null,"setx DOTNET_CLI_TELEMETRY_OPTOUT 1"),a(" to disable it permanently on Windows.")])],-1),k=r(`

Get Wasabi

Clone Wasabi repository:

git clone https://github.com/WalletWasabi/WalletWasabi.git
+import{_ as c,r as i,o as d,c as u,a as e,d as t,w as n,b as a,e as r}from"./app-CwImt2bI.js";const h={},p=e("h1",{id:"build-from-source-code",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#build-from-source-code"},[e("span",null,"Build from source code")])],-1),b={class:"table-of-contents"},m=e("h2",{id:"introduction",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#introduction"},[e("span",null,"Introduction")])],-1),g=e("h2",{id:"get-the-requirements",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#get-the-requirements"},[e("span",null,"Get The Requirements")])],-1),f={href:"https://git-scm.com/downloads",target:"_blank",rel:"noopener noreferrer"},v={href:"https://dotnet.microsoft.com/download",target:"_blank",rel:"noopener noreferrer"},_=e("div",{class:"custom-container tip"},[e("p",{class:"custom-container-title"},"Optional for privacy"),e("p",null,"You can disable .NET's telemetry, which is sending some usage information to Microsoft, by typing:"),e("p",null,[e("code",null,"export DOTNET_CLI_TELEMETRY_OPTOUT=1"),a(" on Linux and macOS.")]),e("p",null,[e("code",null,"setx DOTNET_CLI_TELEMETRY_OPTOUT 1"),a(" to disable it permanently on Windows.")])],-1),k=r(`

Get Wasabi

Clone Wasabi repository:

git clone https://github.com/WalletWasabi/WalletWasabi.git
 cd WalletWasabi/WalletWasabi.Fluent.Desktop
 

Run Wasabi

Build and run the Wasabi client application from the WalletWasabi.Fluent.Desktop folder:

dotnet run
 

Update Wasabi

git pull
@@ -6,4 +6,4 @@ import{_ as c,r as i,o as d,c as u,a as e,d as t,w as n,b as a,e as r}from"./app
 git fetch nopara73
 git checkout branchname
 git pull
-
`,2);function y(B,E){const s=i("router-link"),o=i("RouteLink"),l=i("ExternalLinkIcon");return d(),u("div",null,[p,e("nav",b,[e("ul",null,[e("li",null,[t(s,{to:"#introduction"},{default:n(()=>[a("Introduction")]),_:1})]),e("li",null,[t(s,{to:"#get-the-requirements"},{default:n(()=>[a("Get The Requirements")]),_:1})]),e("li",null,[t(s,{to:"#get-wasabi"},{default:n(()=>[a("Get Wasabi")]),_:1})]),e("li",null,[t(s,{to:"#run-wasabi"},{default:n(()=>[a("Run Wasabi")]),_:1})]),e("li",null,[t(s,{to:"#update-wasabi"},{default:n(()=>[a("Update Wasabi")]),_:1})]),e("li",null,[t(s,{to:"#check-out-a-developer-branch"},{default:n(()=>[a("Check out a developer branch")]),_:1})])])]),m,e("p",null,[a("You can compile the source code in order to get the most recent commits by the developers. This enables you to try out features or fixes that are not yet released. This can be the main repository master branch for those changes that should be in the next release, or developer branches for cutting edge features. Be aware that these branches might be unstable and can include bugs that lead to a loss of funds, so use with caution and on "),t(o,{to:"/using-wasabi/Testnet.html"},{default:n(()=>[a("testnet")]),_:1}),a(".")]),g,e("ol",null,[e("li",null,[e("p",null,[a("Install "),e("a",f,[a("Git"),t(l)])])]),e("li",null,[e("p",null,[a("Install "),e("a",v,[a(".NET 8.0 SDK"),t(l)]),a(' for "Build apps"')]),_])]),k,e("div",w,[T,W,e("p",null,[a("These developer branches are not thoroughly reviewed by other contributors, and there might be critical bugs in the software that can even cause loss of funds. So only compile these branches if you know what you are doing, and run them at your own risk only on "),t(o,{to:"/using-wasabi/Testnet.html"},{default:n(()=>[a("testnet")]),_:1}),a(".")])]),x])}const S=c(h,[["render",y],["__file","BuildSource.html.vue"]]),I=JSON.parse('{"path":"/using-wasabi/BuildSource.html","title":"Build from source code","lang":"en-US","frontmatter":{"title":"Build from source code","description":"A step by step guide on how to build Wasabi from source code. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Introduction","slug":"introduction","link":"#introduction","children":[]},{"level":2,"title":"Get The Requirements","slug":"get-the-requirements","link":"#get-the-requirements","children":[]},{"level":2,"title":"Get Wasabi","slug":"get-wasabi","link":"#get-wasabi","children":[]},{"level":2,"title":"Run Wasabi","slug":"run-wasabi","link":"#run-wasabi","children":[]},{"level":2,"title":"Update Wasabi","slug":"update-wasabi","link":"#update-wasabi","children":[]},{"level":2,"title":"Check out a developer branch","slug":"check-out-a-developer-branch","link":"#check-out-a-developer-branch","children":[]}],"git":{"updatedTime":1720425186000},"filePathRelative":"using-wasabi/BuildSource.md"}');export{S as comp,I as data}; +
`,2);function y(B,E){const s=i("router-link"),o=i("RouteLink"),l=i("ExternalLinkIcon");return d(),u("div",null,[p,e("nav",b,[e("ul",null,[e("li",null,[t(s,{to:"#introduction"},{default:n(()=>[a("Introduction")]),_:1})]),e("li",null,[t(s,{to:"#get-the-requirements"},{default:n(()=>[a("Get The Requirements")]),_:1})]),e("li",null,[t(s,{to:"#get-wasabi"},{default:n(()=>[a("Get Wasabi")]),_:1})]),e("li",null,[t(s,{to:"#run-wasabi"},{default:n(()=>[a("Run Wasabi")]),_:1})]),e("li",null,[t(s,{to:"#update-wasabi"},{default:n(()=>[a("Update Wasabi")]),_:1})]),e("li",null,[t(s,{to:"#check-out-a-developer-branch"},{default:n(()=>[a("Check out a developer branch")]),_:1})])])]),m,e("p",null,[a("You can compile the source code in order to get the most recent commits by the developers. This enables you to try out features or fixes that are not yet released. This can be the main repository master branch for those changes that should be in the next release, or developer branches for cutting edge features. Be aware that these branches might be unstable and can include bugs that lead to a loss of funds, so use with caution and on "),t(o,{to:"/using-wasabi/Testnet.html"},{default:n(()=>[a("testnet")]),_:1}),a(".")]),g,e("ol",null,[e("li",null,[e("p",null,[a("Install "),e("a",f,[a("Git"),t(l)])])]),e("li",null,[e("p",null,[a("Install "),e("a",v,[a(".NET 8.0 SDK"),t(l)]),a(' for "Build apps"')]),_])]),k,e("div",w,[T,W,e("p",null,[a("These developer branches are not thoroughly reviewed by other contributors, and there might be critical bugs in the software that can even cause loss of funds. So only compile these branches if you know what you are doing, and run them at your own risk only on "),t(o,{to:"/using-wasabi/Testnet.html"},{default:n(()=>[a("testnet")]),_:1}),a(".")])]),x])}const S=c(h,[["render",y],["__file","BuildSource.html.vue"]]),I=JSON.parse('{"path":"/using-wasabi/BuildSource.html","title":"Build from source code","lang":"en-US","frontmatter":{"title":"Build from source code","description":"A step by step guide on how to build Wasabi from source code. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Introduction","slug":"introduction","link":"#introduction","children":[]},{"level":2,"title":"Get The Requirements","slug":"get-the-requirements","link":"#get-the-requirements","children":[]},{"level":2,"title":"Get Wasabi","slug":"get-wasabi","link":"#get-wasabi","children":[]},{"level":2,"title":"Run Wasabi","slug":"run-wasabi","link":"#run-wasabi","children":[]},{"level":2,"title":"Update Wasabi","slug":"update-wasabi","link":"#update-wasabi","children":[]},{"level":2,"title":"Check out a developer branch","slug":"check-out-a-developer-branch","link":"#check-out-a-developer-branch","children":[]}],"git":{"updatedTime":1720425980000},"filePathRelative":"using-wasabi/BuildSource.md"}');export{S as comp,I as data}; diff --git a/assets/ChangeCoins.html-DN004OvY.js b/assets/ChangeCoins.html-BFdFQMtC.js similarity index 98% rename from assets/ChangeCoins.html-DN004OvY.js rename to assets/ChangeCoins.html-BFdFQMtC.js index 15c8094bd..15562e14c 100644 --- a/assets/ChangeCoins.html-DN004OvY.js +++ b/assets/ChangeCoins.html-BFdFQMtC.js @@ -1 +1 @@ -import{_ as c,r as s,o as l,c as r,a as e,d as n,w as i,b as t,e as o}from"./app-3S7gIoGc.js";const d={},u=e("h1",{id:"change-coins",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#change-coins"},[e("span",null,"Change coins")])],-1),g={class:"table-of-contents"},p=o('

Types of change

Non-Coinjoin change

Let's assume you want to send 0.5 bitcoin to Alice. You enter Alice's address in the To field (destination address), and set the Amount to 0.5 BTC. This will be one output of the transaction.

Since your chosen UTXO is worth 2 bitcoins, after sending 0.5 bitcoin to Alice there will be 1.5 bitcoins change from the original amount. This leftover amount will automatically go to a new address in your wallet, and this is called the change output.

This leftover 1.5 bitcoins change UTXO is connected to the input UTXO of the transaction, and thus also has an anonymity set of 1. As a result, when you send this leftover/change coin in a new transaction, it is clear to any observer that you were part of the transaction that sent 0.5 bitcoin to someone.

This process is applicable to any Bitcoin transaction where the sent amount is less than the total value of the input UTXO.

Coinjoin change

In some few cases, especially for the wealthiest user of a coinjoin, there will be an anonymity score 1 output in a coinjoin transaction. Eventhough it is not trivial to link those to the inputs of the same user, they should be handled with care. Wasabi will not automatically spend those change coins in a payment, but instead register them again in a future coinjoin round.

Why change is an issue

Change is not inherently bad, it's a fundamental part of how Bitcoin and the UTXO model works. However, when sending a coin that is change from an earlier transaction, then the receiver can easily deduce that the sender was also part of the previous transaction that generated the change.

',10),y=o('

You want to avoid merging coins with different anonymity set values whenever possible, because this will link these coins and reduce their anonymity set to the lowest value.

Your options to use change privately

Avoid change in the first place

Whenever possible, choose UTXO's for transactions where the destination addresses receive the entire value of your UTXO's, and you don't get any change back. This can easily be done by clicking the shield icon in the top right corner of the transaction preview screen, and adjusting the payment amount to be slightly higher or lower. This might not be possible in some cases where you have to pay a specific value of a payment request.

Make it difficult to deduce the change

',5),f=o('

Spend the change to the same entity as in the initial transaction

If in the first transaction you have 0.10 bitcoin and send Alice 0.04 bitcoin, you get 0.06 bitcoin back as change in a new address, which Alice can see belongs to you. Now, in a second transaction where you want to send Alice 0.05 bitcoin, you can select that 0.06 bitcoin change coin without losing any privacy, because Alice already knows this is your coin.

In this second transaction you will get back 0.01 bitcoin as change, which again, will still be known to Alice. If in a third transaction you want to send Alice 0.02 bitcoin, then you can consolidate the 0.01 bitcoin change with a new 0.10 bitcoin mixed coin, thus getting 0.09 bitcoin change.

Now Alice will know that you owned the 0.10 bitcoin and that you currently own the 0.09 bitcoin change, but she cannot find out about your premix transaction history.

Wasabi will automatically check if you have a coin with the same label for the current payment recipient, and will use those coins to be spent.

Spend the change with another entity, where you don't mind if each of the two know that you transact with the other entity

When you send a transaction to Alice, then she knows that the change output goes back to you. You can use this change to send bitcoin to Bob, and if he has bad privacy habits, Alice can find out you sent to him. But if you have a trusted relationship with the two, then this is alright, and not part of your threat model.

Coinjoin more

Since Wasabi 2.0 has a minimum amount for coinjoin of only 5000 sats, any change coin with an amount larger than that will be registered in a future coinjoin round. If you wait long enough, Wasabi will make sure that you don't have any anonscore 1 change coin in your wallet, but only private coins not linked to any previous payment.

',9);function w(m,b){const a=s("router-link"),h=s("RouteLink");return l(),r("div",null,[u,e("nav",g,[e("ul",null,[e("li",null,[n(a,{to:"#types-of-change"},{default:i(()=>[t("Types of change")]),_:1}),e("ul",null,[e("li",null,[n(a,{to:"#non-coinjoin-change"},{default:i(()=>[t("Non-Coinjoin change")]),_:1})]),e("li",null,[n(a,{to:"#coinjoin-change"},{default:i(()=>[t("Coinjoin change")]),_:1})])])]),e("li",null,[n(a,{to:"#why-change-is-an-issue"},{default:i(()=>[t("Why change is an issue")]),_:1})]),e("li",null,[n(a,{to:"#your-options-to-use-change-privately"},{default:i(()=>[t("Your options to use change privately")]),_:1}),e("ul",null,[e("li",null,[n(a,{to:"#avoid-change-in-the-first-place"},{default:i(()=>[t("Avoid change in the first place")]),_:1})]),e("li",null,[n(a,{to:"#make-it-difficult-to-deduce-the-change"},{default:i(()=>[t("Make it difficult to deduce the change")]),_:1})]),e("li",null,[n(a,{to:"#spend-the-change-to-the-same-entity-as-in-the-initial-transaction"},{default:i(()=>[t("Spend the change to the same entity as in the initial transaction")]),_:1})]),e("li",null,[n(a,{to:"#spend-the-change-with-another-entity-where-you-don-t-mind-if-each-of-the-two-know-that-you-transact-with-the-other-entity"},{default:i(()=>[t("Spend the change with another entity, where you don't mind if each of the two know that you transact with the other entity")]),_:1})]),e("li",null,[n(a,{to:"#coinjoin-more"},{default:i(()=>[t("Coinjoin more")]),_:1})])])])])]),p,e("p",null,[t("Whenever you are merging coins in one transaction, it becomes clear to any outside observer that these coins belong to the same entity, thus linking the previous transaction history. Thus "),n(h,{to:"/why-wasabi/Coins.html#heuristics-identifying-change"},{default:i(()=>[t("identifying change")]),_:1}),t(" based on some heuristics is a top goal of transaction surveillance.")]),y,e("p",null,[t("There are "),n(h,{to:"/why-wasabi/Coins.html#heuristics-identifying-change"},{default:i(()=>[t("common heuristics identifying change outputs")]),_:1}),t(", try to avoid these with every transaction. Don't reuse addresses, don't send precise amounts but randomize them, use replace by fee (RBF) only if necessary, and try to send to bech32 or bech32m addresses.")]),f])}const k=c(d,[["render",w],["__file","ChangeCoins.html.vue"]]),_=JSON.parse(`{"path":"/using-wasabi/ChangeCoins.html","title":"Change Coins","lang":"en-US","frontmatter":{"title":"Change Coins","description":"Details about the privacy of different types of change and strategies for using them. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Types of change","slug":"types-of-change","link":"#types-of-change","children":[{"level":3,"title":"Non-Coinjoin change","slug":"non-coinjoin-change","link":"#non-coinjoin-change","children":[]},{"level":3,"title":"Coinjoin change","slug":"coinjoin-change","link":"#coinjoin-change","children":[]}]},{"level":2,"title":"Why change is an issue","slug":"why-change-is-an-issue","link":"#why-change-is-an-issue","children":[]},{"level":2,"title":"Your options to use change privately","slug":"your-options-to-use-change-privately","link":"#your-options-to-use-change-privately","children":[{"level":3,"title":"Avoid change in the first place","slug":"avoid-change-in-the-first-place","link":"#avoid-change-in-the-first-place","children":[]},{"level":3,"title":"Make it difficult to deduce the change","slug":"make-it-difficult-to-deduce-the-change","link":"#make-it-difficult-to-deduce-the-change","children":[]},{"level":3,"title":"Spend the change to the same entity as in the initial transaction","slug":"spend-the-change-to-the-same-entity-as-in-the-initial-transaction","link":"#spend-the-change-to-the-same-entity-as-in-the-initial-transaction","children":[]},{"level":3,"title":"Spend the change with another entity, where you don't mind if each of the two know that you transact with the other entity","slug":"spend-the-change-with-another-entity-where-you-don-t-mind-if-each-of-the-two-know-that-you-transact-with-the-other-entity","link":"#spend-the-change-with-another-entity-where-you-don-t-mind-if-each-of-the-two-know-that-you-transact-with-the-other-entity","children":[]},{"level":3,"title":"Coinjoin more","slug":"coinjoin-more","link":"#coinjoin-more","children":[]}]}],"git":{"updatedTime":1720425186000},"filePathRelative":"using-wasabi/ChangeCoins.md"}`);export{k as comp,_ as data}; +import{_ as c,r as s,o as l,c as r,a as e,d as n,w as i,b as t,e as o}from"./app-CwImt2bI.js";const d={},u=e("h1",{id:"change-coins",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#change-coins"},[e("span",null,"Change coins")])],-1),g={class:"table-of-contents"},p=o('

Types of change

Non-Coinjoin change

Let's assume you want to send 0.5 bitcoin to Alice. You enter Alice's address in the To field (destination address), and set the Amount to 0.5 BTC. This will be one output of the transaction.

Since your chosen UTXO is worth 2 bitcoins, after sending 0.5 bitcoin to Alice there will be 1.5 bitcoins change from the original amount. This leftover amount will automatically go to a new address in your wallet, and this is called the change output.

This leftover 1.5 bitcoins change UTXO is connected to the input UTXO of the transaction, and thus also has an anonymity set of 1. As a result, when you send this leftover/change coin in a new transaction, it is clear to any observer that you were part of the transaction that sent 0.5 bitcoin to someone.

This process is applicable to any Bitcoin transaction where the sent amount is less than the total value of the input UTXO.

Coinjoin change

In some few cases, especially for the wealthiest user of a coinjoin, there will be an anonymity score 1 output in a coinjoin transaction. Eventhough it is not trivial to link those to the inputs of the same user, they should be handled with care. Wasabi will not automatically spend those change coins in a payment, but instead register them again in a future coinjoin round.

Why change is an issue

Change is not inherently bad, it's a fundamental part of how Bitcoin and the UTXO model works. However, when sending a coin that is change from an earlier transaction, then the receiver can easily deduce that the sender was also part of the previous transaction that generated the change.

',10),y=o('

You want to avoid merging coins with different anonymity set values whenever possible, because this will link these coins and reduce their anonymity set to the lowest value.

Your options to use change privately

Avoid change in the first place

Whenever possible, choose UTXO's for transactions where the destination addresses receive the entire value of your UTXO's, and you don't get any change back. This can easily be done by clicking the shield icon in the top right corner of the transaction preview screen, and adjusting the payment amount to be slightly higher or lower. This might not be possible in some cases where you have to pay a specific value of a payment request.

Make it difficult to deduce the change

',5),f=o('

Spend the change to the same entity as in the initial transaction

If in the first transaction you have 0.10 bitcoin and send Alice 0.04 bitcoin, you get 0.06 bitcoin back as change in a new address, which Alice can see belongs to you. Now, in a second transaction where you want to send Alice 0.05 bitcoin, you can select that 0.06 bitcoin change coin without losing any privacy, because Alice already knows this is your coin.

In this second transaction you will get back 0.01 bitcoin as change, which again, will still be known to Alice. If in a third transaction you want to send Alice 0.02 bitcoin, then you can consolidate the 0.01 bitcoin change with a new 0.10 bitcoin mixed coin, thus getting 0.09 bitcoin change.

Now Alice will know that you owned the 0.10 bitcoin and that you currently own the 0.09 bitcoin change, but she cannot find out about your premix transaction history.

Wasabi will automatically check if you have a coin with the same label for the current payment recipient, and will use those coins to be spent.

Spend the change with another entity, where you don't mind if each of the two know that you transact with the other entity

When you send a transaction to Alice, then she knows that the change output goes back to you. You can use this change to send bitcoin to Bob, and if he has bad privacy habits, Alice can find out you sent to him. But if you have a trusted relationship with the two, then this is alright, and not part of your threat model.

Coinjoin more

Since Wasabi 2.0 has a minimum amount for coinjoin of only 5000 sats, any change coin with an amount larger than that will be registered in a future coinjoin round. If you wait long enough, Wasabi will make sure that you don't have any anonscore 1 change coin in your wallet, but only private coins not linked to any previous payment.

',9);function w(m,b){const a=s("router-link"),h=s("RouteLink");return l(),r("div",null,[u,e("nav",g,[e("ul",null,[e("li",null,[n(a,{to:"#types-of-change"},{default:i(()=>[t("Types of change")]),_:1}),e("ul",null,[e("li",null,[n(a,{to:"#non-coinjoin-change"},{default:i(()=>[t("Non-Coinjoin change")]),_:1})]),e("li",null,[n(a,{to:"#coinjoin-change"},{default:i(()=>[t("Coinjoin change")]),_:1})])])]),e("li",null,[n(a,{to:"#why-change-is-an-issue"},{default:i(()=>[t("Why change is an issue")]),_:1})]),e("li",null,[n(a,{to:"#your-options-to-use-change-privately"},{default:i(()=>[t("Your options to use change privately")]),_:1}),e("ul",null,[e("li",null,[n(a,{to:"#avoid-change-in-the-first-place"},{default:i(()=>[t("Avoid change in the first place")]),_:1})]),e("li",null,[n(a,{to:"#make-it-difficult-to-deduce-the-change"},{default:i(()=>[t("Make it difficult to deduce the change")]),_:1})]),e("li",null,[n(a,{to:"#spend-the-change-to-the-same-entity-as-in-the-initial-transaction"},{default:i(()=>[t("Spend the change to the same entity as in the initial transaction")]),_:1})]),e("li",null,[n(a,{to:"#spend-the-change-with-another-entity-where-you-don-t-mind-if-each-of-the-two-know-that-you-transact-with-the-other-entity"},{default:i(()=>[t("Spend the change with another entity, where you don't mind if each of the two know that you transact with the other entity")]),_:1})]),e("li",null,[n(a,{to:"#coinjoin-more"},{default:i(()=>[t("Coinjoin more")]),_:1})])])])])]),p,e("p",null,[t("Whenever you are merging coins in one transaction, it becomes clear to any outside observer that these coins belong to the same entity, thus linking the previous transaction history. Thus "),n(h,{to:"/why-wasabi/Coins.html#heuristics-identifying-change"},{default:i(()=>[t("identifying change")]),_:1}),t(" based on some heuristics is a top goal of transaction surveillance.")]),y,e("p",null,[t("There are "),n(h,{to:"/why-wasabi/Coins.html#heuristics-identifying-change"},{default:i(()=>[t("common heuristics identifying change outputs")]),_:1}),t(", try to avoid these with every transaction. Don't reuse addresses, don't send precise amounts but randomize them, use replace by fee (RBF) only if necessary, and try to send to bech32 or bech32m addresses.")]),f])}const k=c(d,[["render",w],["__file","ChangeCoins.html.vue"]]),_=JSON.parse(`{"path":"/using-wasabi/ChangeCoins.html","title":"Change Coins","lang":"en-US","frontmatter":{"title":"Change Coins","description":"Details about the privacy of different types of change and strategies for using them. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Types of change","slug":"types-of-change","link":"#types-of-change","children":[{"level":3,"title":"Non-Coinjoin change","slug":"non-coinjoin-change","link":"#non-coinjoin-change","children":[]},{"level":3,"title":"Coinjoin change","slug":"coinjoin-change","link":"#coinjoin-change","children":[]}]},{"level":2,"title":"Why change is an issue","slug":"why-change-is-an-issue","link":"#why-change-is-an-issue","children":[]},{"level":2,"title":"Your options to use change privately","slug":"your-options-to-use-change-privately","link":"#your-options-to-use-change-privately","children":[{"level":3,"title":"Avoid change in the first place","slug":"avoid-change-in-the-first-place","link":"#avoid-change-in-the-first-place","children":[]},{"level":3,"title":"Make it difficult to deduce the change","slug":"make-it-difficult-to-deduce-the-change","link":"#make-it-difficult-to-deduce-the-change","children":[]},{"level":3,"title":"Spend the change to the same entity as in the initial transaction","slug":"spend-the-change-to-the-same-entity-as-in-the-initial-transaction","link":"#spend-the-change-to-the-same-entity-as-in-the-initial-transaction","children":[]},{"level":3,"title":"Spend the change with another entity, where you don't mind if each of the two know that you transact with the other entity","slug":"spend-the-change-with-another-entity-where-you-don-t-mind-if-each-of-the-two-know-that-you-transact-with-the-other-entity","link":"#spend-the-change-with-another-entity-where-you-don-t-mind-if-each-of-the-two-know-that-you-transact-with-the-other-entity","children":[]},{"level":3,"title":"Coinjoin more","slug":"coinjoin-more","link":"#coinjoin-more","children":[]}]}],"git":{"updatedTime":1720425980000},"filePathRelative":"using-wasabi/ChangeCoins.md"}`);export{k as comp,_ as data}; diff --git a/assets/CoinJoin.html-Dh9ky-gL.js b/assets/CoinJoin.html-5YDCAxeA.js similarity index 99% rename from assets/CoinJoin.html-Dh9ky-gL.js rename to assets/CoinJoin.html-5YDCAxeA.js index 321877f98..b1d149e12 100644 --- a/assets/CoinJoin.html-Dh9ky-gL.js +++ b/assets/CoinJoin.html-5YDCAxeA.js @@ -1 +1 @@ -import{_ as c}from"./AutoStartCoinjoinThreshold-B0lFY-5G.js";import{_ as h}from"./CoinjoinStrategy-BZrDbG5n.js";import{_ as d,r as l,o as u,c as p,a as e,d as i,w as n,b as t,e as r}from"./app-3S7gIoGc.js";const b="/MusicBoxAwaitingToAutoStartCoinjoin.png",f="/MusicBoxAwaitingOtherParticipants.png",m="/MusicBoxCoinjoinInProgress.png",g="/MusicBoxCoinjoinSuccessful.png",y="/SettingsCoinjoinConfigs.png",_="/CoinjoinSettings.png",w="/CoinjoinSettingsAutomaticallyStartCoinjoin.png",j="/CoinjoinStrategySettings.png",v={},x=e("h1",{id:"coinjoin",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#coinjoin"},[e("span",null,"Coinjoin")])],-1),k={class:"table-of-contents"},A=e("h2",{id:"introduction",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#introduction"},[e("span",null,"Introduction")])],-1),C={href:"https://en.bitcoin.it/Privacy#CoinJoin",target:"_blank",rel:"noopener noreferrer"},T={href:"https://bitcointalk.org/index.php?topic=279249.msg2983902",target:"_blank",rel:"noopener noreferrer"},S={href:"https://eprint.iacr.org/2021/206",target:"_blank",rel:"noopener noreferrer"},W={href:"https://youtu.be/dGATztn5Ql8",target:"_blank",rel:"noopener noreferrer"},B=e("img",{src:"https://img.youtube.com/vi/dGATztn5Ql8/maxresdefault.jpg",alt:"WabiSabi Coinjoin Explained in 3 Minutes"},null,-1),I=r('

Coinjoin step-by-step

  1. Launch Wasabi and open your wallet.
  2. Wait. Wasabi coinjoins automatically in the background.
  3. You're done! You can make private payments now.

Music box

After opening a hot wallet, it will automatically start a countdown to start coinjoining (±10 minutes). This and other coinjoin related information is shown in the music box.

Music Box Countdown

',5),M=e("em",null,"Waiting to auto-start coinjoin",-1),q=e("p",null,"A blue aura will show up at the the bottom of the wallet, which indicates that the wallet is coinjoining, and the music box message will change.",-1),F=e("p",null,[e("img",{src:f,alt:"Music Box Awaiting Other Participants",title:"Music Box Awaiting Other Participants"})],-1),P=e("p",null,"After some time the blue aura will change to an orange one, this indicates that the coinjoin process is now in a critical phase. Wasabi will prevent you from shutting down the app during the orange aura to not disrupt the coinjoin round.",-1),Q=e("p",null,[e("img",{src:m,alt:"Music Box Coinjoin In Progress",title:"Music Box Coinjoin In Progress"})],-1),N=r('

Music Box Success

Notice that the wallet might have to repeat the coinjoin steps multiple times before a successful coinjoin is created. So it is possible that the aura colors will change without a successful coinjoin. Please leave Wasabi Wallet running, and eventually there will be a successful coinjoin.

More Details

By default, Wasabi starts automatically coinjoining your funds when the total value of the non-private coins is equal to or above the Auto-start coinjoin threshold (0.01 BTC by default). Automatically start coinjoin can be disabled from the coinjoin settings. In case you want to start the process manually, then click the play button; if you want to stop coinjoin, then click the pause button.

Once a coin achieves enough privacy (reaches the Anonymity score target), then the corresponding amount will show up in the wallet's main view as "PRIVATE".

Notice that it is not yet possible to coinjoin from a hardware wallet, the keys must be "hot" on your computer.

Fees

The coinjoin coordinator sets its own fee policy for the coinjoin service provided.

Although the coordinator cannot steal money from the coinjoin participants, it could set a high mining fee rate and/or a high coordination fee. This would make the participants pay a lot (unnecessarily). To prevent against such behavior the Wasabi client can configure the maximum mining fee rate and the maximum coordination fee it is willing to pay per round. If one of these is higher than the set values, the client will not participate in the coinjoin.

The default values are 0% coordination fee and maximum 150 sat/vByte mining fee rate.

Coinjoin Configurations

WabiSabi protocol step-by-step

WabiSabi protocol requires 5 steps to successfully create and broadcast a coinjoin transaction to the bitcoin network.

The round starts either as soon as the number of registered inputs reaches the maximum, or after the input registration time is reached and as long as the minimum number of inputs is satisfied.

Input registration

',15),O={href:"https://tb-manual.torproject.org/managing-identities/",target:"_blank",rel:"noopener noreferrer"},z=e("strong",null,"Alice",-1),D=r('

The Wasabi coordinator now verifies that:

Only when all these checks are passed, does the coordinator allow this input to be registered. The coordinator creates and sends a credential back to Alice, which has the same amount as the input minus fees.

The input registration phase ends when either: the number of registered inputs reaches the maximum, or when the time elapsed and the minimum number of inputs is satisfied.

Connection confirmation

There are many users registering their inputs (with different Alice for each input) in the first phase, and this takes a while. The connection confirmation phase makes sure that all of them are still online and ready to continue. The coordinator verifies the unique ID from each Alice, and if everyone is still communicating. The coordinator sends a zero value credential to each Alice for each successful connection confirmation.

The round is abandoned and re-started if too many Alices have dropped, for example when their Wasabi is shut down, or when their Tor connection is temporarily broken. The connection confirmation phase ends when all Alices have provided their unique IDs, or after a timeout and the number of online Alices is still larger than the minimum number of inputs.

Output registration

',8),E=e("p",null,"First, every client needs to change the value of their credentials to the desired output values. For this, the client presents to the coordinator two old credentials, and two newly created ones. The coordinator does not know the amount value of any of those credentials, but it can verify, that the two pairs sum up to exactly the same value. For example, a user can present one 5 btc and one 0 btc credential, and redeem one 2 btc and one 3 btc credential. Or a user can present one 4 btc and one 1 btc credential, and redeem one 5 btc and one 0 btc credential. After potentially many rounds of reissuance, each client has exactly the amount credential it desires. Each of these reissuance is perfectly private, so the coordinator cannot link any of them to the same user.",-1),J=e("p",null,[t("Next, your Wasabi client generates multiple new Tor identities called "),e("strong",null,"Bob"),t(", which are in no way tied to any Alice. Bob sends to the Wasabi coordinator:")],-1),L=e("ul",null,[e("li",null,"An unblinded credential signed by the coordinator"),e("li",null,"A new (unused) bitcoin address")],-1),U=e("p",null,"Because the coordinator can verify its own credential, it knows that this credential came into existence after an input of at least this much value was registered. However, it cannot know which input exactly.",-1),V=e("p",null,"It is very important that the coordinator cannot link Alice to Bob. Because Alice has sent the cleartext input, and Bob sends the cleartext output. So, if the two were to be linked, then the coordinator can specifically link the input to the output, meaning that the anonymity set is 1. Because Alice received a credential from the coordinator, and because Bob is a new Tor identity not linked to Alice, the coordinator can verify that nobody is cheating, but it cannot deanonymize the peers.",-1),R=e("p",null,"The output registration phase ends when the value of cleartext outputs is equal to the value of inputs, meaning that all Bobs have registered. If after a timeout not all outputs are registered, then this round is abandoned, the missing inputs are temporarily banned, and a new round is started.",-1),G={class:"custom-container tip"},H=e("p",{class:"custom-container-title"},"Possibility of Taproot outputs from coinjoin",-1),Y={href:"https://github.com/WalletWasabi/WalletWasabi/releases/tag/v2.0.3",target:"_blank",rel:"noopener noreferrer"},K=e("h3",{id:"signing",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#signing"},[e("span",null,"Signing")])],-1),$=r('

Each Alice does the following:

The signing phase ends when the coordinator has received all the valid signatures for all the registered inputs.

Blame round

When the signing phase fails due to some Alices disrupting the round (failing to sign or send the signature to the coordinator), then the successful Alices will continue into a blame round. The blame round will redo the coinjoin phases in order to create a successful coinjoin.

This mechanism also prevents coinjoins from being DDoS-ed, because bad actors that are willingly disturbing rounds won't be able to join the blame round. The client will keep going to the blame round until there are not enough Alices left to meet the minimum input count of blame rounds.

The blame round is not a mandatory phase of the coinjoin process. It was introduced in order to have a higher coinjoin success rate.

Broadcasting

',8),X=r('

Coinjoin Settings

Wasabi Wallet has automatic coinjoin. It is done by the built-in automatic coinjoin "robot". The robot contains instructions/settings, like how often and when to coinjoin. The user is able to specify these settings in the Coinjoin Settings dialog, according to his own preferences. The wallet ships with default settings, which are good enough for most users.

Wasabi Wallet Coinjoin Settings

Coinjoin settings are wallet specific

As the coinjoin settings apply per individual wallet, it is possible to have multiple wallets with different coinjoin settings.

Automatically start coinjoin

This setting is enabled by default.

When this is enabled, the wallet will automatically start coinjoining soon after the wallet is loaded. The wallet will coinjoin until the privacy progress is 100%.

When this is not enabled, the user will have to manually press the Play button in order to start coinjoining.

Coinjoin Settings Automatically Start Coinjoin

Auto-start coinjoin threshold

The default Auto-start coinjoin threshold is 0.01 BTC.

The wallet will not automatically start coinjoining if the non-private balance is below the Auto-start coinjoin threshold, even if the Automatically start coinjoin is enabled. In this case the user has to manually press Play to start coinjoining. This setting can be used to prevent paying (relatively) high fees for smaller bitcoin amounts.

For example, if the non-private balance is 0.005 BTC and the Auto-start coinjoin threshold is 0.01 BTC, the user will have to manually press Play to start coinjoining.

Auto-start Coinjoin Threshold

It is OK to set the Auto-start coinjoin threshold to 0

If you have some small non-private left overs: you can coinjoin these by pressing Play, or wait until you receive more funds. If you want to always automatically coinjoin ALL your coins, this can be set to 0 BTC. Note that you might pay relatively more fees for coinjoining smaller amounts.

Coinjoin Strategy

',16),Z=e("code",null,"Minimize Costs",-1),ee=e("code",null,"Maximize Speed",-1),te=e("code",null,"Maximize Privacy",-1),ie=e("code",null,"Anonymity score target",-1),ne=e("code",null,"Coinjoin time preference",-1),oe=e("code",null,"Red coin isolation",-1),ae=e("p",null,[e("img",{src:j,alt:"Coinjoin Strategy Settings",title:"Coinjoin Strategy Settings"})],-1),se=e("p",null,[t("The default strategy is "),e("code",null,"Maximize Speed"),t(".")],-1),re=e("p",null,"It is possible to make your own custom strategy by using the customize button.",-1),le=e("p",null,[e("img",{src:h,alt:"Coinjoin Strategy",title:"Coinjoin Strategy"})],-1),ce=e("h2",{id:"wasabi-coinjoin-examples",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#wasabi-coinjoin-examples"},[e("span",null,"Wasabi Coinjoin examples")])],-1),he=e("p",null,"Here's a list of Wasabi coinjoin examples and how they appear on a block explorer:",-1),de={href:"https://mempool.space/tx/198aee6e1b2cad9b7c3e4cd12962980fbaab0b20c07016031d0c2416b3ef9b70",target:"_blank",rel:"noopener noreferrer"},ue={href:"http://mempoolhqx4isw62xs7abwphsq7ldayuidyx2v2oethdhhj6mlo2r6ad.onion/tx/198aee6e1b2cad9b7c3e4cd12962980fbaab0b20c07016031d0c2416b3ef9b70",target:"_blank",rel:"noopener noreferrer"},pe={href:"https://mempool.space/tx/b77cb1ad9a1c164c868f89927193178ec44f1006ca154f8b97008d14bf2c4a6e",target:"_blank",rel:"noopener noreferrer"},be={href:"http://mempoolhqx4isw62xs7abwphsq7ldayuidyx2v2oethdhhj6mlo2r6ad.onion/tx/b77cb1ad9a1c164c868f89927193178ec44f1006ca154f8b97008d14bf2c4a6e",target:"_blank",rel:"noopener noreferrer"},fe={href:"https://mempool.space/tx/72f4b05845564c59982b4b5ae0d8aa7322d08907198fbcdae48390fbe0538e8d",target:"_blank",rel:"noopener noreferrer"},me={href:"http://mempoolhqx4isw62xs7abwphsq7ldayuidyx2v2oethdhhj6mlo2r6ad.onion/tx/72f4b05845564c59982b4b5ae0d8aa7322d08907198fbcdae48390fbe0538e8d",target:"_blank",rel:"noopener noreferrer"},ge={href:"https://mempool.space/tx/063f001403aaa4e44f9f35faf44507f373824657a7ef39907a6907298d9ee56e",target:"_blank",rel:"noopener noreferrer"},ye={href:"http://mempoolhqx4isw62xs7abwphsq7ldayuidyx2v2oethdhhj6mlo2r6ad.onion/tx/063f001403aaa4e44f9f35faf44507f373824657a7ef39907a6907298d9ee56e",target:"_blank",rel:"noopener noreferrer"},_e={href:"https://mempool.space/tx/aabb0a2b43b274c9ae287e3837f9f8a8d8a378ce93153dc52de9978d2bb72cbc",target:"_blank",rel:"noopener noreferrer"},we={href:"http://mempoolhqx4isw62xs7abwphsq7ldayuidyx2v2oethdhhj6mlo2r6ad.onion/tx/aabb0a2b43b274c9ae287e3837f9f8a8d8a378ce93153dc52de9978d2bb72cbc",target:"_blank",rel:"noopener noreferrer"};function je(ve,xe){const o=l("router-link"),a=l("ExternalLinkIcon"),s=l("RouteLink");return u(),p("div",null,[x,e("nav",k,[e("ul",null,[e("li",null,[i(o,{to:"#introduction"},{default:n(()=>[t("Introduction")]),_:1})]),e("li",null,[i(o,{to:"#coinjoin-step-by-step"},{default:n(()=>[t("Coinjoin step-by-step")]),_:1}),e("ul",null,[e("li",null,[i(o,{to:"#music-box"},{default:n(()=>[t("Music box")]),_:1})]),e("li",null,[i(o,{to:"#more-details"},{default:n(()=>[t("More Details")]),_:1})]),e("li",null,[i(o,{to:"#fees"},{default:n(()=>[t("Fees")]),_:1})])])]),e("li",null,[i(o,{to:"#wabisabi-protocol-step-by-step"},{default:n(()=>[t("WabiSabi protocol step-by-step")]),_:1}),e("ul",null,[e("li",null,[i(o,{to:"#input-registration"},{default:n(()=>[t("Input registration")]),_:1})]),e("li",null,[i(o,{to:"#connection-confirmation"},{default:n(()=>[t("Connection confirmation")]),_:1})]),e("li",null,[i(o,{to:"#output-registration"},{default:n(()=>[t("Output registration")]),_:1})]),e("li",null,[i(o,{to:"#signing"},{default:n(()=>[t("Signing")]),_:1})]),e("li",null,[i(o,{to:"#blame-round"},{default:n(()=>[t("Blame round")]),_:1})]),e("li",null,[i(o,{to:"#broadcasting"},{default:n(()=>[t("Broadcasting")]),_:1})])])]),e("li",null,[i(o,{to:"#coinjoin-settings"},{default:n(()=>[t("Coinjoin Settings")]),_:1}),e("ul",null,[e("li",null,[i(o,{to:"#automatically-start-coinjoin"},{default:n(()=>[t("Automatically start coinjoin")]),_:1})]),e("li",null,[i(o,{to:"#auto-start-coinjoin-threshold"},{default:n(()=>[t("Auto-start coinjoin threshold")]),_:1})]),e("li",null,[i(o,{to:"#coinjoin-strategy"},{default:n(()=>[t("Coinjoin Strategy")]),_:1})])])]),e("li",null,[i(o,{to:"#wasabi-coinjoin-examples"},{default:n(()=>[t("Wasabi Coinjoin examples")]),_:1})])])]),A,e("p",null,[t("A "),e("a",C,[t("coinjoin"),i(a)]),t(" is a special Bitcoin transaction where several peers get together to literally join their coins in a single transaction. They collaboratively build a transaction where each of them provides some coins as inputs, and fresh addresses as outputs. The concept has been around since the early days of Bitcoin, and it was formalized by the great Greg Maxwell in "),e("a",T,[t("this awesome introductory thread"),i(a)]),t(".")]),e("p",null,[t('The goal is to gain privacy by breaking the link of which input "pays" which output so that none of the outputs can be attributed to the owner of the input. WabiSabi enables centrally coordinated coinjoins with variable amounts in a trustless (meaning nobody can steal) and private (meaning even the coordinator cannot spy) manner, as described in the '),e("a",S,[t("WabiSabi paper"),i(a)]),t(".")]),e("p",null,[e("a",W,[B,i(a)])]),I,e("p",null,[t("After the "),M,t(" countdown is finished the wallet should start participating in the "),i(s,{to:"/using-wasabi/CoinJoin.html#wabisabi-protocol-step-by-step"},{default:n(()=>[t("coinjoin process")]),_:1}),t(".")]),q,F,P,Q,e("p",null,[t("If this is succesfull, the coinjoin is completed and the coinjoin "),i(s,{to:"/FAQ/FAQ-UseWasabi.html#how-can-i-see-coinjoins-in-the-history-list"},{default:n(()=>[t("will show up in the history list")]),_:1}),t(".")]),N,e("p",null,[t("During the "),i(s,{to:"/FAQ/FAQ-UseWasabi.html#what-is-happening-in-the-input-registration-phase"},{default:n(()=>[t("input registration")]),_:1}),t(", the client selects how many and which coins will be registered for coinjoin. These coins need to be confirmed on the Bitcoin blockchain. In the background Wasabi generates input proofs, which are signatures over challenge messages, made with the private keys that lock up the coins. With this, the coordinator can verify that you actually own these coins.")]),e("p",null,[t("Wasabi wallet generates a new "),e("a",O,[t("Tor identity"),i(a)]),t(" called "),z,t(" for each input. She is a separate entity, and for every round you use a new Alice who is not linked to any other input or previous connection. With Alice, you send the input ownership proof to the coordinator.")]),D,e("p",null,[t("Now that all peers are online, we are ready to proceed with the "),i(s,{to:"/FAQ/FAQ-UseWasabi.html#what-is-happening-in-the-output-registration-phase"},{default:n(()=>[t("output registration phase")]),_:1}),t(" of the round.")]),E,J,L,U,V,R,e("div",G,[H,e("p",null,[t("Since Wasabi "),e("a",Y,[t("version 2.0.3"),i(a)]),t(" coinjoin outputs can be SegWit v0 and SegWit v1 (Taproot). If running this version or higher, the client registers the output type in a semi-random way (~50% chance of receiving Taproot output).")])]),K,e("p",null,[t("Now that all inputs and outputs are registered, the coordinator can start the "),i(s,{to:"/FAQ/FAQ-UseWasabi.html#what-is-happening-in-the-signing-phase"},{default:n(()=>[t("signing phase")]),_:1}),t(", by building the coinjoin transaction with all the registered inputs and outputs. It sends this transaction to all the Alices of the round.")]),$,e("p",null,[t("The coinjoin transaction has been successfully built and signed, and it is now ready to be "),i(s,{to:"/FAQ/FAQ-UseWasabi.html#what-is-happening-in-the-broadcasting-phase"},{default:n(()=>[t("broadcast")]),_:1}),t(" to the peers of the Bitcoin network. The coordinator sends this transaction over the Tor network to random Bitcoin P2P nodes, and from there it is gossiped to other nodes and miners. To save on mining fees, the target confirmation time is roughly 24 hours.")]),X,e("p",null,[t("Wasabi ships with 3 coinjoin strategies: "),Z,t(", "),ee,t(", and "),te,t(". Each of these contain different configurations, as shown in "),i(s,{to:"/FAQ/FAQ-UseWasabi.html#what-are-the-differences-settings-per-coinjoin-strategy"},{default:n(()=>[t("this table")]),_:1}),t(". They determine the "),ie,t(", "),ne,t(", and if "),oe,t(" is enabled or not.")]),ae,se,re,le,ce,he,e("ul",null,[e("li",null,[e("a",de,[t("198aee6e1b2cad9b7c3e4cd12962980fbaab0b20c07016031d0c2416b3ef9b70"),i(a)]),t(" | "),e("a",ue,[t(".onion version"),i(a)])]),e("li",null,[e("a",pe,[t("b77cb1ad9a1c164c868f89927193178ec44f1006ca154f8b97008d14bf2c4a6e"),i(a)]),t(" | "),e("a",be,[t(".onion version"),i(a)])]),e("li",null,[e("a",fe,[t("72f4b05845564c59982b4b5ae0d8aa7322d08907198fbcdae48390fbe0538e8d"),i(a)]),t(" | "),e("a",me,[t(".onion version"),i(a)])]),e("li",null,[e("a",ge,[t("063f001403aaa4e44f9f35faf44507f373824657a7ef39907a6907298d9ee56e"),i(a)]),t(" | "),e("a",ye,[t(".onion version"),i(a)])]),e("li",null,[e("a",_e,[t("aabb0a2b43b274c9ae287e3837f9f8a8d8a378ce93153dc52de9978d2bb72cbc"),i(a)]),t(" | "),e("a",we,[t(".onion version"),i(a)])])])])}const Te=d(v,[["render",je],["__file","CoinJoin.html.vue"]]),Se=JSON.parse('{"path":"/using-wasabi/CoinJoin.html","title":"Coinjoin","lang":"en-US","frontmatter":{"title":"Coinjoin","description":"A detailed explanation about how WabiSabi coinjoins work under the hood. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Introduction","slug":"introduction","link":"#introduction","children":[]},{"level":2,"title":"Coinjoin step-by-step","slug":"coinjoin-step-by-step","link":"#coinjoin-step-by-step","children":[{"level":3,"title":"Music box","slug":"music-box","link":"#music-box","children":[]},{"level":3,"title":"More Details","slug":"more-details","link":"#more-details","children":[]},{"level":3,"title":"Fees","slug":"fees","link":"#fees","children":[]}]},{"level":2,"title":"WabiSabi protocol step-by-step","slug":"wabisabi-protocol-step-by-step","link":"#wabisabi-protocol-step-by-step","children":[{"level":3,"title":"Input registration","slug":"input-registration","link":"#input-registration","children":[]},{"level":3,"title":"Connection confirmation","slug":"connection-confirmation","link":"#connection-confirmation","children":[]},{"level":3,"title":"Output registration","slug":"output-registration","link":"#output-registration","children":[]},{"level":3,"title":"Signing","slug":"signing","link":"#signing","children":[]},{"level":3,"title":"Blame round","slug":"blame-round","link":"#blame-round","children":[]},{"level":3,"title":"Broadcasting","slug":"broadcasting","link":"#broadcasting","children":[]}]},{"level":2,"title":"Coinjoin Settings","slug":"coinjoin-settings","link":"#coinjoin-settings","children":[{"level":3,"title":"Automatically start coinjoin","slug":"automatically-start-coinjoin","link":"#automatically-start-coinjoin","children":[]},{"level":3,"title":"Auto-start coinjoin threshold","slug":"auto-start-coinjoin-threshold","link":"#auto-start-coinjoin-threshold","children":[]},{"level":3,"title":"Coinjoin Strategy","slug":"coinjoin-strategy","link":"#coinjoin-strategy","children":[]}]},{"level":2,"title":"Wasabi Coinjoin examples","slug":"wasabi-coinjoin-examples","link":"#wasabi-coinjoin-examples","children":[]}],"git":{"updatedTime":1720425186000},"filePathRelative":"using-wasabi/CoinJoin.md"}');export{Te as comp,Se as data}; +import{_ as c}from"./AutoStartCoinjoinThreshold-B0lFY-5G.js";import{_ as h}from"./CoinjoinStrategy-BZrDbG5n.js";import{_ as d,r as l,o as u,c as p,a as e,d as i,w as n,b as t,e as r}from"./app-CwImt2bI.js";const b="/MusicBoxAwaitingToAutoStartCoinjoin.png",f="/MusicBoxAwaitingOtherParticipants.png",m="/MusicBoxCoinjoinInProgress.png",g="/MusicBoxCoinjoinSuccessful.png",y="/SettingsCoinjoinConfigs.png",_="/CoinjoinSettings.png",w="/CoinjoinSettingsAutomaticallyStartCoinjoin.png",j="/CoinjoinStrategySettings.png",v={},x=e("h1",{id:"coinjoin",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#coinjoin"},[e("span",null,"Coinjoin")])],-1),k={class:"table-of-contents"},A=e("h2",{id:"introduction",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#introduction"},[e("span",null,"Introduction")])],-1),C={href:"https://en.bitcoin.it/Privacy#CoinJoin",target:"_blank",rel:"noopener noreferrer"},T={href:"https://bitcointalk.org/index.php?topic=279249.msg2983902",target:"_blank",rel:"noopener noreferrer"},S={href:"https://eprint.iacr.org/2021/206",target:"_blank",rel:"noopener noreferrer"},W={href:"https://youtu.be/dGATztn5Ql8",target:"_blank",rel:"noopener noreferrer"},B=e("img",{src:"https://img.youtube.com/vi/dGATztn5Ql8/maxresdefault.jpg",alt:"WabiSabi Coinjoin Explained in 3 Minutes"},null,-1),I=r('

Coinjoin step-by-step

  1. Launch Wasabi and open your wallet.
  2. Wait. Wasabi coinjoins automatically in the background.
  3. You're done! You can make private payments now.

Music box

After opening a hot wallet, it will automatically start a countdown to start coinjoining (±10 minutes). This and other coinjoin related information is shown in the music box.

Music Box Countdown

',5),M=e("em",null,"Waiting to auto-start coinjoin",-1),q=e("p",null,"A blue aura will show up at the the bottom of the wallet, which indicates that the wallet is coinjoining, and the music box message will change.",-1),F=e("p",null,[e("img",{src:f,alt:"Music Box Awaiting Other Participants",title:"Music Box Awaiting Other Participants"})],-1),P=e("p",null,"After some time the blue aura will change to an orange one, this indicates that the coinjoin process is now in a critical phase. Wasabi will prevent you from shutting down the app during the orange aura to not disrupt the coinjoin round.",-1),Q=e("p",null,[e("img",{src:m,alt:"Music Box Coinjoin In Progress",title:"Music Box Coinjoin In Progress"})],-1),N=r('

Music Box Success

Notice that the wallet might have to repeat the coinjoin steps multiple times before a successful coinjoin is created. So it is possible that the aura colors will change without a successful coinjoin. Please leave Wasabi Wallet running, and eventually there will be a successful coinjoin.

More Details

By default, Wasabi starts automatically coinjoining your funds when the total value of the non-private coins is equal to or above the Auto-start coinjoin threshold (0.01 BTC by default). Automatically start coinjoin can be disabled from the coinjoin settings. In case you want to start the process manually, then click the play button; if you want to stop coinjoin, then click the pause button.

Once a coin achieves enough privacy (reaches the Anonymity score target), then the corresponding amount will show up in the wallet's main view as "PRIVATE".

Notice that it is not yet possible to coinjoin from a hardware wallet, the keys must be "hot" on your computer.

Fees

The coinjoin coordinator sets its own fee policy for the coinjoin service provided.

Although the coordinator cannot steal money from the coinjoin participants, it could set a high mining fee rate and/or a high coordination fee. This would make the participants pay a lot (unnecessarily). To prevent against such behavior the Wasabi client can configure the maximum mining fee rate and the maximum coordination fee it is willing to pay per round. If one of these is higher than the set values, the client will not participate in the coinjoin.

The default values are 0% coordination fee and maximum 150 sat/vByte mining fee rate.

Coinjoin Configurations

WabiSabi protocol step-by-step

WabiSabi protocol requires 5 steps to successfully create and broadcast a coinjoin transaction to the bitcoin network.

The round starts either as soon as the number of registered inputs reaches the maximum, or after the input registration time is reached and as long as the minimum number of inputs is satisfied.

Input registration

',15),O={href:"https://tb-manual.torproject.org/managing-identities/",target:"_blank",rel:"noopener noreferrer"},z=e("strong",null,"Alice",-1),D=r('

The Wasabi coordinator now verifies that:

Only when all these checks are passed, does the coordinator allow this input to be registered. The coordinator creates and sends a credential back to Alice, which has the same amount as the input minus fees.

The input registration phase ends when either: the number of registered inputs reaches the maximum, or when the time elapsed and the minimum number of inputs is satisfied.

Connection confirmation

There are many users registering their inputs (with different Alice for each input) in the first phase, and this takes a while. The connection confirmation phase makes sure that all of them are still online and ready to continue. The coordinator verifies the unique ID from each Alice, and if everyone is still communicating. The coordinator sends a zero value credential to each Alice for each successful connection confirmation.

The round is abandoned and re-started if too many Alices have dropped, for example when their Wasabi is shut down, or when their Tor connection is temporarily broken. The connection confirmation phase ends when all Alices have provided their unique IDs, or after a timeout and the number of online Alices is still larger than the minimum number of inputs.

Output registration

',8),E=e("p",null,"First, every client needs to change the value of their credentials to the desired output values. For this, the client presents to the coordinator two old credentials, and two newly created ones. The coordinator does not know the amount value of any of those credentials, but it can verify, that the two pairs sum up to exactly the same value. For example, a user can present one 5 btc and one 0 btc credential, and redeem one 2 btc and one 3 btc credential. Or a user can present one 4 btc and one 1 btc credential, and redeem one 5 btc and one 0 btc credential. After potentially many rounds of reissuance, each client has exactly the amount credential it desires. Each of these reissuance is perfectly private, so the coordinator cannot link any of them to the same user.",-1),J=e("p",null,[t("Next, your Wasabi client generates multiple new Tor identities called "),e("strong",null,"Bob"),t(", which are in no way tied to any Alice. Bob sends to the Wasabi coordinator:")],-1),L=e("ul",null,[e("li",null,"An unblinded credential signed by the coordinator"),e("li",null,"A new (unused) bitcoin address")],-1),U=e("p",null,"Because the coordinator can verify its own credential, it knows that this credential came into existence after an input of at least this much value was registered. However, it cannot know which input exactly.",-1),V=e("p",null,"It is very important that the coordinator cannot link Alice to Bob. Because Alice has sent the cleartext input, and Bob sends the cleartext output. So, if the two were to be linked, then the coordinator can specifically link the input to the output, meaning that the anonymity set is 1. Because Alice received a credential from the coordinator, and because Bob is a new Tor identity not linked to Alice, the coordinator can verify that nobody is cheating, but it cannot deanonymize the peers.",-1),R=e("p",null,"The output registration phase ends when the value of cleartext outputs is equal to the value of inputs, meaning that all Bobs have registered. If after a timeout not all outputs are registered, then this round is abandoned, the missing inputs are temporarily banned, and a new round is started.",-1),G={class:"custom-container tip"},H=e("p",{class:"custom-container-title"},"Possibility of Taproot outputs from coinjoin",-1),Y={href:"https://github.com/WalletWasabi/WalletWasabi/releases/tag/v2.0.3",target:"_blank",rel:"noopener noreferrer"},K=e("h3",{id:"signing",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#signing"},[e("span",null,"Signing")])],-1),$=r('

Each Alice does the following:

The signing phase ends when the coordinator has received all the valid signatures for all the registered inputs.

Blame round

When the signing phase fails due to some Alices disrupting the round (failing to sign or send the signature to the coordinator), then the successful Alices will continue into a blame round. The blame round will redo the coinjoin phases in order to create a successful coinjoin.

This mechanism also prevents coinjoins from being DDoS-ed, because bad actors that are willingly disturbing rounds won't be able to join the blame round. The client will keep going to the blame round until there are not enough Alices left to meet the minimum input count of blame rounds.

The blame round is not a mandatory phase of the coinjoin process. It was introduced in order to have a higher coinjoin success rate.

Broadcasting

',8),X=r('

Coinjoin Settings

Wasabi Wallet has automatic coinjoin. It is done by the built-in automatic coinjoin "robot". The robot contains instructions/settings, like how often and when to coinjoin. The user is able to specify these settings in the Coinjoin Settings dialog, according to his own preferences. The wallet ships with default settings, which are good enough for most users.

Wasabi Wallet Coinjoin Settings

Coinjoin settings are wallet specific

As the coinjoin settings apply per individual wallet, it is possible to have multiple wallets with different coinjoin settings.

Automatically start coinjoin

This setting is enabled by default.

When this is enabled, the wallet will automatically start coinjoining soon after the wallet is loaded. The wallet will coinjoin until the privacy progress is 100%.

When this is not enabled, the user will have to manually press the Play button in order to start coinjoining.

Coinjoin Settings Automatically Start Coinjoin

Auto-start coinjoin threshold

The default Auto-start coinjoin threshold is 0.01 BTC.

The wallet will not automatically start coinjoining if the non-private balance is below the Auto-start coinjoin threshold, even if the Automatically start coinjoin is enabled. In this case the user has to manually press Play to start coinjoining. This setting can be used to prevent paying (relatively) high fees for smaller bitcoin amounts.

For example, if the non-private balance is 0.005 BTC and the Auto-start coinjoin threshold is 0.01 BTC, the user will have to manually press Play to start coinjoining.

Auto-start Coinjoin Threshold

It is OK to set the Auto-start coinjoin threshold to 0

If you have some small non-private left overs: you can coinjoin these by pressing Play, or wait until you receive more funds. If you want to always automatically coinjoin ALL your coins, this can be set to 0 BTC. Note that you might pay relatively more fees for coinjoining smaller amounts.

Coinjoin Strategy

',16),Z=e("code",null,"Minimize Costs",-1),ee=e("code",null,"Maximize Speed",-1),te=e("code",null,"Maximize Privacy",-1),ie=e("code",null,"Anonymity score target",-1),ne=e("code",null,"Coinjoin time preference",-1),oe=e("code",null,"Red coin isolation",-1),ae=e("p",null,[e("img",{src:j,alt:"Coinjoin Strategy Settings",title:"Coinjoin Strategy Settings"})],-1),se=e("p",null,[t("The default strategy is "),e("code",null,"Maximize Speed"),t(".")],-1),re=e("p",null,"It is possible to make your own custom strategy by using the customize button.",-1),le=e("p",null,[e("img",{src:h,alt:"Coinjoin Strategy",title:"Coinjoin Strategy"})],-1),ce=e("h2",{id:"wasabi-coinjoin-examples",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#wasabi-coinjoin-examples"},[e("span",null,"Wasabi Coinjoin examples")])],-1),he=e("p",null,"Here's a list of Wasabi coinjoin examples and how they appear on a block explorer:",-1),de={href:"https://mempool.space/tx/198aee6e1b2cad9b7c3e4cd12962980fbaab0b20c07016031d0c2416b3ef9b70",target:"_blank",rel:"noopener noreferrer"},ue={href:"http://mempoolhqx4isw62xs7abwphsq7ldayuidyx2v2oethdhhj6mlo2r6ad.onion/tx/198aee6e1b2cad9b7c3e4cd12962980fbaab0b20c07016031d0c2416b3ef9b70",target:"_blank",rel:"noopener noreferrer"},pe={href:"https://mempool.space/tx/b77cb1ad9a1c164c868f89927193178ec44f1006ca154f8b97008d14bf2c4a6e",target:"_blank",rel:"noopener noreferrer"},be={href:"http://mempoolhqx4isw62xs7abwphsq7ldayuidyx2v2oethdhhj6mlo2r6ad.onion/tx/b77cb1ad9a1c164c868f89927193178ec44f1006ca154f8b97008d14bf2c4a6e",target:"_blank",rel:"noopener noreferrer"},fe={href:"https://mempool.space/tx/72f4b05845564c59982b4b5ae0d8aa7322d08907198fbcdae48390fbe0538e8d",target:"_blank",rel:"noopener noreferrer"},me={href:"http://mempoolhqx4isw62xs7abwphsq7ldayuidyx2v2oethdhhj6mlo2r6ad.onion/tx/72f4b05845564c59982b4b5ae0d8aa7322d08907198fbcdae48390fbe0538e8d",target:"_blank",rel:"noopener noreferrer"},ge={href:"https://mempool.space/tx/063f001403aaa4e44f9f35faf44507f373824657a7ef39907a6907298d9ee56e",target:"_blank",rel:"noopener noreferrer"},ye={href:"http://mempoolhqx4isw62xs7abwphsq7ldayuidyx2v2oethdhhj6mlo2r6ad.onion/tx/063f001403aaa4e44f9f35faf44507f373824657a7ef39907a6907298d9ee56e",target:"_blank",rel:"noopener noreferrer"},_e={href:"https://mempool.space/tx/aabb0a2b43b274c9ae287e3837f9f8a8d8a378ce93153dc52de9978d2bb72cbc",target:"_blank",rel:"noopener noreferrer"},we={href:"http://mempoolhqx4isw62xs7abwphsq7ldayuidyx2v2oethdhhj6mlo2r6ad.onion/tx/aabb0a2b43b274c9ae287e3837f9f8a8d8a378ce93153dc52de9978d2bb72cbc",target:"_blank",rel:"noopener noreferrer"};function je(ve,xe){const o=l("router-link"),a=l("ExternalLinkIcon"),s=l("RouteLink");return u(),p("div",null,[x,e("nav",k,[e("ul",null,[e("li",null,[i(o,{to:"#introduction"},{default:n(()=>[t("Introduction")]),_:1})]),e("li",null,[i(o,{to:"#coinjoin-step-by-step"},{default:n(()=>[t("Coinjoin step-by-step")]),_:1}),e("ul",null,[e("li",null,[i(o,{to:"#music-box"},{default:n(()=>[t("Music box")]),_:1})]),e("li",null,[i(o,{to:"#more-details"},{default:n(()=>[t("More Details")]),_:1})]),e("li",null,[i(o,{to:"#fees"},{default:n(()=>[t("Fees")]),_:1})])])]),e("li",null,[i(o,{to:"#wabisabi-protocol-step-by-step"},{default:n(()=>[t("WabiSabi protocol step-by-step")]),_:1}),e("ul",null,[e("li",null,[i(o,{to:"#input-registration"},{default:n(()=>[t("Input registration")]),_:1})]),e("li",null,[i(o,{to:"#connection-confirmation"},{default:n(()=>[t("Connection confirmation")]),_:1})]),e("li",null,[i(o,{to:"#output-registration"},{default:n(()=>[t("Output registration")]),_:1})]),e("li",null,[i(o,{to:"#signing"},{default:n(()=>[t("Signing")]),_:1})]),e("li",null,[i(o,{to:"#blame-round"},{default:n(()=>[t("Blame round")]),_:1})]),e("li",null,[i(o,{to:"#broadcasting"},{default:n(()=>[t("Broadcasting")]),_:1})])])]),e("li",null,[i(o,{to:"#coinjoin-settings"},{default:n(()=>[t("Coinjoin Settings")]),_:1}),e("ul",null,[e("li",null,[i(o,{to:"#automatically-start-coinjoin"},{default:n(()=>[t("Automatically start coinjoin")]),_:1})]),e("li",null,[i(o,{to:"#auto-start-coinjoin-threshold"},{default:n(()=>[t("Auto-start coinjoin threshold")]),_:1})]),e("li",null,[i(o,{to:"#coinjoin-strategy"},{default:n(()=>[t("Coinjoin Strategy")]),_:1})])])]),e("li",null,[i(o,{to:"#wasabi-coinjoin-examples"},{default:n(()=>[t("Wasabi Coinjoin examples")]),_:1})])])]),A,e("p",null,[t("A "),e("a",C,[t("coinjoin"),i(a)]),t(" is a special Bitcoin transaction where several peers get together to literally join their coins in a single transaction. They collaboratively build a transaction where each of them provides some coins as inputs, and fresh addresses as outputs. The concept has been around since the early days of Bitcoin, and it was formalized by the great Greg Maxwell in "),e("a",T,[t("this awesome introductory thread"),i(a)]),t(".")]),e("p",null,[t('The goal is to gain privacy by breaking the link of which input "pays" which output so that none of the outputs can be attributed to the owner of the input. WabiSabi enables centrally coordinated coinjoins with variable amounts in a trustless (meaning nobody can steal) and private (meaning even the coordinator cannot spy) manner, as described in the '),e("a",S,[t("WabiSabi paper"),i(a)]),t(".")]),e("p",null,[e("a",W,[B,i(a)])]),I,e("p",null,[t("After the "),M,t(" countdown is finished the wallet should start participating in the "),i(s,{to:"/using-wasabi/CoinJoin.html#wabisabi-protocol-step-by-step"},{default:n(()=>[t("coinjoin process")]),_:1}),t(".")]),q,F,P,Q,e("p",null,[t("If this is succesfull, the coinjoin is completed and the coinjoin "),i(s,{to:"/FAQ/FAQ-UseWasabi.html#how-can-i-see-coinjoins-in-the-history-list"},{default:n(()=>[t("will show up in the history list")]),_:1}),t(".")]),N,e("p",null,[t("During the "),i(s,{to:"/FAQ/FAQ-UseWasabi.html#what-is-happening-in-the-input-registration-phase"},{default:n(()=>[t("input registration")]),_:1}),t(", the client selects how many and which coins will be registered for coinjoin. These coins need to be confirmed on the Bitcoin blockchain. In the background Wasabi generates input proofs, which are signatures over challenge messages, made with the private keys that lock up the coins. With this, the coordinator can verify that you actually own these coins.")]),e("p",null,[t("Wasabi wallet generates a new "),e("a",O,[t("Tor identity"),i(a)]),t(" called "),z,t(" for each input. She is a separate entity, and for every round you use a new Alice who is not linked to any other input or previous connection. With Alice, you send the input ownership proof to the coordinator.")]),D,e("p",null,[t("Now that all peers are online, we are ready to proceed with the "),i(s,{to:"/FAQ/FAQ-UseWasabi.html#what-is-happening-in-the-output-registration-phase"},{default:n(()=>[t("output registration phase")]),_:1}),t(" of the round.")]),E,J,L,U,V,R,e("div",G,[H,e("p",null,[t("Since Wasabi "),e("a",Y,[t("version 2.0.3"),i(a)]),t(" coinjoin outputs can be SegWit v0 and SegWit v1 (Taproot). If running this version or higher, the client registers the output type in a semi-random way (~50% chance of receiving Taproot output).")])]),K,e("p",null,[t("Now that all inputs and outputs are registered, the coordinator can start the "),i(s,{to:"/FAQ/FAQ-UseWasabi.html#what-is-happening-in-the-signing-phase"},{default:n(()=>[t("signing phase")]),_:1}),t(", by building the coinjoin transaction with all the registered inputs and outputs. It sends this transaction to all the Alices of the round.")]),$,e("p",null,[t("The coinjoin transaction has been successfully built and signed, and it is now ready to be "),i(s,{to:"/FAQ/FAQ-UseWasabi.html#what-is-happening-in-the-broadcasting-phase"},{default:n(()=>[t("broadcast")]),_:1}),t(" to the peers of the Bitcoin network. The coordinator sends this transaction over the Tor network to random Bitcoin P2P nodes, and from there it is gossiped to other nodes and miners. To save on mining fees, the target confirmation time is roughly 24 hours.")]),X,e("p",null,[t("Wasabi ships with 3 coinjoin strategies: "),Z,t(", "),ee,t(", and "),te,t(". Each of these contain different configurations, as shown in "),i(s,{to:"/FAQ/FAQ-UseWasabi.html#what-are-the-differences-settings-per-coinjoin-strategy"},{default:n(()=>[t("this table")]),_:1}),t(". They determine the "),ie,t(", "),ne,t(", and if "),oe,t(" is enabled or not.")]),ae,se,re,le,ce,he,e("ul",null,[e("li",null,[e("a",de,[t("198aee6e1b2cad9b7c3e4cd12962980fbaab0b20c07016031d0c2416b3ef9b70"),i(a)]),t(" | "),e("a",ue,[t(".onion version"),i(a)])]),e("li",null,[e("a",pe,[t("b77cb1ad9a1c164c868f89927193178ec44f1006ca154f8b97008d14bf2c4a6e"),i(a)]),t(" | "),e("a",be,[t(".onion version"),i(a)])]),e("li",null,[e("a",fe,[t("72f4b05845564c59982b4b5ae0d8aa7322d08907198fbcdae48390fbe0538e8d"),i(a)]),t(" | "),e("a",me,[t(".onion version"),i(a)])]),e("li",null,[e("a",ge,[t("063f001403aaa4e44f9f35faf44507f373824657a7ef39907a6907298d9ee56e"),i(a)]),t(" | "),e("a",ye,[t(".onion version"),i(a)])]),e("li",null,[e("a",_e,[t("aabb0a2b43b274c9ae287e3837f9f8a8d8a378ce93153dc52de9978d2bb72cbc"),i(a)]),t(" | "),e("a",we,[t(".onion version"),i(a)])])])])}const Te=d(v,[["render",je],["__file","CoinJoin.html.vue"]]),Se=JSON.parse('{"path":"/using-wasabi/CoinJoin.html","title":"Coinjoin","lang":"en-US","frontmatter":{"title":"Coinjoin","description":"A detailed explanation about how WabiSabi coinjoins work under the hood. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Introduction","slug":"introduction","link":"#introduction","children":[]},{"level":2,"title":"Coinjoin step-by-step","slug":"coinjoin-step-by-step","link":"#coinjoin-step-by-step","children":[{"level":3,"title":"Music box","slug":"music-box","link":"#music-box","children":[]},{"level":3,"title":"More Details","slug":"more-details","link":"#more-details","children":[]},{"level":3,"title":"Fees","slug":"fees","link":"#fees","children":[]}]},{"level":2,"title":"WabiSabi protocol step-by-step","slug":"wabisabi-protocol-step-by-step","link":"#wabisabi-protocol-step-by-step","children":[{"level":3,"title":"Input registration","slug":"input-registration","link":"#input-registration","children":[]},{"level":3,"title":"Connection confirmation","slug":"connection-confirmation","link":"#connection-confirmation","children":[]},{"level":3,"title":"Output registration","slug":"output-registration","link":"#output-registration","children":[]},{"level":3,"title":"Signing","slug":"signing","link":"#signing","children":[]},{"level":3,"title":"Blame round","slug":"blame-round","link":"#blame-round","children":[]},{"level":3,"title":"Broadcasting","slug":"broadcasting","link":"#broadcasting","children":[]}]},{"level":2,"title":"Coinjoin Settings","slug":"coinjoin-settings","link":"#coinjoin-settings","children":[{"level":3,"title":"Automatically start coinjoin","slug":"automatically-start-coinjoin","link":"#automatically-start-coinjoin","children":[]},{"level":3,"title":"Auto-start coinjoin threshold","slug":"auto-start-coinjoin-threshold","link":"#auto-start-coinjoin-threshold","children":[]},{"level":3,"title":"Coinjoin Strategy","slug":"coinjoin-strategy","link":"#coinjoin-strategy","children":[]}]},{"level":2,"title":"Wasabi Coinjoin examples","slug":"wasabi-coinjoin-examples","link":"#wasabi-coinjoin-examples","children":[]}],"git":{"updatedTime":1720425980000},"filePathRelative":"using-wasabi/CoinJoin.md"}');export{Te as comp,Se as data}; diff --git a/assets/Coins.html-Cskm5RN2.js b/assets/Coins.html-DccT-AZB.js similarity index 98% rename from assets/Coins.html-Cskm5RN2.js rename to assets/Coins.html-DccT-AZB.js index 28f015c1e..f5d7072aa 100644 --- a/assets/Coins.html-Cskm5RN2.js +++ b/assets/Coins.html-DccT-AZB.js @@ -1,4 +1,4 @@ -import{_ as c,r,o as h,c as d,a as e,b as n,d as t,w as i,e as o}from"./app-3S7gIoGc.js";const u={},p=e("h1",{id:"coins",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#coins"},[e("span",null,"Coins")])],-1),b={href:"https://developer.bitcoin.org/devguide/block_chain.html",target:"_blank",rel:"noopener noreferrer"},g={href:"https://en.bitcoin.it/wiki/Coinbase",target:"_blank",rel:"noopener noreferrer"},m={class:"table-of-contents"},f=o('

Problem

UTXOs are not fungible

Each UTXO is a unique snowflake with a public transaction history. For example, when Alice sends a coin to Bob, then Bob does not just have any random UTXO, but he has specifically the coin that Alice has sent him. When Bob sends this coin to Charlie, then Charlie can check the history of the coin and see the transaction from Alice to Bob. But due to the pseudonymity of Bitcoin, he does not necessarily find out that Alice is involved.

Further, when Alice has one non-private coin and one private coin, and she selects both of them as the inputs of a transaction, the linking of these two coins strongly suggests that the coin that was private also belongs to Alice. This means that coin consolidation can lead to an overall decrease in privacy, especially when using an automatic coin selection algorithm.

Wasabi's Solution

Manual coin labeling and selection

Using Wasabi it is mandatory to label every receiving and destination address. This helps the user to know where their coins came from so that they can judge whether there are privacy concerns when sending a specific coin to a specific receiver. The default Send workflow uses the auto coin selection algorithm, which is based on the labeling system.

',8),v=e("h3",{id:"change-avoidance-suggestion",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#change-avoidance-suggestion"},[e("span",null,"Change avoidance suggestion")])],-1),y=e("em",null,"Preview Transaction",-1),w=e("h2",{id:"heuristics-identifying-change",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#heuristics-identifying-change"},[e("span",null,"Heuristics identifying change")])],-1),_=e("h3",{id:"address-reuse",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#address-reuse"},[e("span",null,"Address reuse")])],-1),k=e("p",null,"When several coins have the same address, then they are owned by the same entity. Thus if a transaction has a reused address in the output, it is very likely to be the payment amount from one entity to another. Thus the other output of this transaction is likely to be the change of the entity providing the inputs of the transaction.",-1),x={class:"custom-container warning"},C=e("p",{class:"custom-container-title"},"Remember",-1),T=o(`

Wallet fingerprinting

Different software wallets have different methods of creating Bitcoin transactions. So if it is known that a transaction was created by a specific wallet, then it can be checked how this wallet handles change.

Wasabi tries to build the most common form of transaction structure, thus reducing the likelihood of identifying any given transaction as being from Wasabi. However, Wasabi CoinJoins are very easily fingerprinted, and any coin associated is clearly managed with Wasabi Wallet.

Round numbers

When making a payment, then often the destination address receives a round number of bitcoin. Because the input is usually a non-round number, the other output will also be a non-round number. This makes it clear that the non-round number output is the change back to the sender.

A [0.1293 0112 btc]  -->  B [0.0500 0000 btc]
+import{_ as c,r,o as h,c as d,a as e,b as n,d as t,w as i,e as o}from"./app-CwImt2bI.js";const u={},p=e("h1",{id:"coins",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#coins"},[e("span",null,"Coins")])],-1),b={href:"https://developer.bitcoin.org/devguide/block_chain.html",target:"_blank",rel:"noopener noreferrer"},g={href:"https://en.bitcoin.it/wiki/Coinbase",target:"_blank",rel:"noopener noreferrer"},m={class:"table-of-contents"},f=o('

Problem

UTXOs are not fungible

Each UTXO is a unique snowflake with a public transaction history. For example, when Alice sends a coin to Bob, then Bob does not just have any random UTXO, but he has specifically the coin that Alice has sent him. When Bob sends this coin to Charlie, then Charlie can check the history of the coin and see the transaction from Alice to Bob. But due to the pseudonymity of Bitcoin, he does not necessarily find out that Alice is involved.

Further, when Alice has one non-private coin and one private coin, and she selects both of them as the inputs of a transaction, the linking of these two coins strongly suggests that the coin that was private also belongs to Alice. This means that coin consolidation can lead to an overall decrease in privacy, especially when using an automatic coin selection algorithm.

Wasabi's Solution

Manual coin labeling and selection

Using Wasabi it is mandatory to label every receiving and destination address. This helps the user to know where their coins came from so that they can judge whether there are privacy concerns when sending a specific coin to a specific receiver. The default Send workflow uses the auto coin selection algorithm, which is based on the labeling system.

',8),v=e("h3",{id:"change-avoidance-suggestion",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#change-avoidance-suggestion"},[e("span",null,"Change avoidance suggestion")])],-1),y=e("em",null,"Preview Transaction",-1),w=e("h2",{id:"heuristics-identifying-change",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#heuristics-identifying-change"},[e("span",null,"Heuristics identifying change")])],-1),_=e("h3",{id:"address-reuse",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#address-reuse"},[e("span",null,"Address reuse")])],-1),k=e("p",null,"When several coins have the same address, then they are owned by the same entity. Thus if a transaction has a reused address in the output, it is very likely to be the payment amount from one entity to another. Thus the other output of this transaction is likely to be the change of the entity providing the inputs of the transaction.",-1),x={class:"custom-container warning"},C=e("p",{class:"custom-container-title"},"Remember",-1),T=o(`

Wallet fingerprinting

Different software wallets have different methods of creating Bitcoin transactions. So if it is known that a transaction was created by a specific wallet, then it can be checked how this wallet handles change.

Wasabi tries to build the most common form of transaction structure, thus reducing the likelihood of identifying any given transaction as being from Wasabi. However, Wasabi CoinJoins are very easily fingerprinted, and any coin associated is clearly managed with Wasabi Wallet.

Round numbers

When making a payment, then often the destination address receives a round number of bitcoin. Because the input is usually a non-round number, the other output will also be a non-round number. This makes it clear that the non-round number output is the change back to the sender.

A [0.1293 0112 btc]  -->  B [0.0500 0000 btc]
                           C [0.0792 9962 btc] (= change)
 

TIP

In order to protect your privacy, add or remove (when possible) a couple of sats from the payment amount to obfuscate which output is your change and which one is the payment.

CoinJoin

A CoinJoin has many unequal value inputs, and creates several equal value anonset outputs, as well as unequal value outputs, making it clear that these are the change outputs.

`,9),B={class:"custom-container tip"},W=e("p",{class:"custom-container-title"},"TIP",-1),A=o(`
                C [1 btc]
 A [6 btc]  -->  D [1 btc]
@@ -14,4 +14,4 @@ Second transaction (RBF)
 
 A [1.3576 1516 btc]  -->  B [1.0135 6515 btc]
                           C [0.3440 4721 btc] (= change)
-
`,1);function S(P,U){const l=r("ExternalLinkIcon"),a=r("router-link"),s=r("RouteLink");return h(),d("div",null,[p,e("p",null,[n("Bitcoin has an accounting model of "),e("a",b,[n("unspent transaction output [UTXO]"),t(l)]),n(". A transaction has inputs: the coins that are being spent, and outputs: the corresponding newly created coins (unspent). The input of a transaction has to be an unspent output of a previous transaction. Each UTXO is the tip of the chain of links between inputs and outputs, all the way back to a "),e("a",g,[n("coinbase transaction"),t(l)]),n(" that pays the miner.")]),e("nav",m,[e("ul",null,[e("li",null,[t(a,{to:"#problem"},{default:i(()=>[n("Problem")]),_:1}),e("ul",null,[e("li",null,[t(a,{to:"#utxos-are-not-fungible"},{default:i(()=>[n("UTXOs are not fungible")]),_:1})])])]),e("li",null,[t(a,{to:"#wasabi-s-solution"},{default:i(()=>[n("Wasabi's Solution")]),_:1}),e("ul",null,[e("li",null,[t(a,{to:"#manual-coin-labeling-and-selection"},{default:i(()=>[n("Manual coin labeling and selection")]),_:1})]),e("li",null,[t(a,{to:"#change-avoidance-suggestion"},{default:i(()=>[n("Change avoidance suggestion")]),_:1})])])]),e("li",null,[t(a,{to:"#heuristics-identifying-change"},{default:i(()=>[n("Heuristics identifying change")]),_:1}),e("ul",null,[e("li",null,[t(a,{to:"#address-reuse"},{default:i(()=>[n("Address reuse")]),_:1})]),e("li",null,[t(a,{to:"#wallet-fingerprinting"},{default:i(()=>[n("Wallet fingerprinting")]),_:1})]),e("li",null,[t(a,{to:"#round-numbers"},{default:i(()=>[n("Round numbers")]),_:1})]),e("li",null,[t(a,{to:"#coinjoin"},{default:i(()=>[n("CoinJoin")]),_:1})]),e("li",null,[t(a,{to:"#replace-by-fee"},{default:i(()=>[n("Replace by Fee")]),_:1})])])])])]),f,e("p",null,[n("Read more "),t(s,{to:"/using-wasabi/Receive.html#the-importance-of-labeling"},{default:i(()=>[n("here")]),_:1}),n(".")]),v,e("p",null,[n("When sending bitcoin, the transaction might contain change (back to the sender). This can have privacy downsides as explained "),t(s,{to:"/using-wasabi/ChangeCoins.html#why-change-is-an-issue"},{default:i(()=>[n("here")]),_:1}),n(". When sending in Wasabi the user will be shown with an option to avoid change by slightly increasing or decreasing the send amount in order to avoid change (if possible). There is a shield icon shown at the "),y,n(" screen at the top right corner which displays the options when hovering over with the cursor.")]),w,e("p",null,[n("One prime goal of "),t(s,{to:"/why-wasabi/TransactionSurveillanceCompanies.html"},{default:i(()=>[n("transaction surveillance companies")]),_:1}),n(" is to identify the change coin of a Bitcoin transaction, as this is vital information for building a cluster of coins belonging to one entity. There are several heuristics, practical assumptions which are not guaranteed to be accurate or optimal, that are used to deanonymize users:")]),_,k,e("div",x,[C,e("p",null,[n("Never "),t(s,{to:"/why-wasabi/AddressReuse.html#problem"},{default:i(()=>[n("reuse addresses")]),_:1}),n("!")])]),T,e("div",B,[W,e("p",null,[n("This is why the CoinJoin change has only 1 "),t(s,{to:"/glossary/Glossary-PrivacyWasabi.html#anonymity-set-anonset"},{default:i(()=>[n("anonset")]),_:1}),n(".")])]),A,e("p",null,[e("a",R,[n("BIP 125"),t(l)]),n(" allows for one unconfirmed transaction to be double-spent and replaced by a second transaction that pays a higher fee. However, the output that is reduced in the second transaction is likely to be the change output, as the sender pays the fee.")]),O])}const j=c(u,[["render",S],["__file","Coins.html.vue"]]),J=JSON.parse(`{"path":"/why-wasabi/Coins.html","title":"Coins","lang":"en-US","frontmatter":{"title":"Coins","description":"On the nuances of Bitcoin's coin model with unspent transaction outputs, the privacy problems and how to fix it. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Problem","slug":"problem","link":"#problem","children":[{"level":3,"title":"UTXOs are not fungible","slug":"utxos-are-not-fungible","link":"#utxos-are-not-fungible","children":[]}]},{"level":2,"title":"Wasabi's Solution","slug":"wasabi-s-solution","link":"#wasabi-s-solution","children":[{"level":3,"title":"Manual coin labeling and selection","slug":"manual-coin-labeling-and-selection","link":"#manual-coin-labeling-and-selection","children":[]},{"level":3,"title":"Change avoidance suggestion","slug":"change-avoidance-suggestion","link":"#change-avoidance-suggestion","children":[]}]},{"level":2,"title":"Heuristics identifying change","slug":"heuristics-identifying-change","link":"#heuristics-identifying-change","children":[{"level":3,"title":"Address reuse","slug":"address-reuse","link":"#address-reuse","children":[]},{"level":3,"title":"Wallet fingerprinting","slug":"wallet-fingerprinting","link":"#wallet-fingerprinting","children":[]},{"level":3,"title":"Round numbers","slug":"round-numbers","link":"#round-numbers","children":[]},{"level":3,"title":"CoinJoin","slug":"coinjoin","link":"#coinjoin","children":[]},{"level":3,"title":"Replace by Fee","slug":"replace-by-fee","link":"#replace-by-fee","children":[]}]}],"git":{"updatedTime":1720425186000},"filePathRelative":"why-wasabi/Coins.md"}`);export{j as comp,J as data}; +
`,1);function S(P,U){const l=r("ExternalLinkIcon"),a=r("router-link"),s=r("RouteLink");return h(),d("div",null,[p,e("p",null,[n("Bitcoin has an accounting model of "),e("a",b,[n("unspent transaction output [UTXO]"),t(l)]),n(". A transaction has inputs: the coins that are being spent, and outputs: the corresponding newly created coins (unspent). The input of a transaction has to be an unspent output of a previous transaction. Each UTXO is the tip of the chain of links between inputs and outputs, all the way back to a "),e("a",g,[n("coinbase transaction"),t(l)]),n(" that pays the miner.")]),e("nav",m,[e("ul",null,[e("li",null,[t(a,{to:"#problem"},{default:i(()=>[n("Problem")]),_:1}),e("ul",null,[e("li",null,[t(a,{to:"#utxos-are-not-fungible"},{default:i(()=>[n("UTXOs are not fungible")]),_:1})])])]),e("li",null,[t(a,{to:"#wasabi-s-solution"},{default:i(()=>[n("Wasabi's Solution")]),_:1}),e("ul",null,[e("li",null,[t(a,{to:"#manual-coin-labeling-and-selection"},{default:i(()=>[n("Manual coin labeling and selection")]),_:1})]),e("li",null,[t(a,{to:"#change-avoidance-suggestion"},{default:i(()=>[n("Change avoidance suggestion")]),_:1})])])]),e("li",null,[t(a,{to:"#heuristics-identifying-change"},{default:i(()=>[n("Heuristics identifying change")]),_:1}),e("ul",null,[e("li",null,[t(a,{to:"#address-reuse"},{default:i(()=>[n("Address reuse")]),_:1})]),e("li",null,[t(a,{to:"#wallet-fingerprinting"},{default:i(()=>[n("Wallet fingerprinting")]),_:1})]),e("li",null,[t(a,{to:"#round-numbers"},{default:i(()=>[n("Round numbers")]),_:1})]),e("li",null,[t(a,{to:"#coinjoin"},{default:i(()=>[n("CoinJoin")]),_:1})]),e("li",null,[t(a,{to:"#replace-by-fee"},{default:i(()=>[n("Replace by Fee")]),_:1})])])])])]),f,e("p",null,[n("Read more "),t(s,{to:"/using-wasabi/Receive.html#the-importance-of-labeling"},{default:i(()=>[n("here")]),_:1}),n(".")]),v,e("p",null,[n("When sending bitcoin, the transaction might contain change (back to the sender). This can have privacy downsides as explained "),t(s,{to:"/using-wasabi/ChangeCoins.html#why-change-is-an-issue"},{default:i(()=>[n("here")]),_:1}),n(". When sending in Wasabi the user will be shown with an option to avoid change by slightly increasing or decreasing the send amount in order to avoid change (if possible). There is a shield icon shown at the "),y,n(" screen at the top right corner which displays the options when hovering over with the cursor.")]),w,e("p",null,[n("One prime goal of "),t(s,{to:"/why-wasabi/TransactionSurveillanceCompanies.html"},{default:i(()=>[n("transaction surveillance companies")]),_:1}),n(" is to identify the change coin of a Bitcoin transaction, as this is vital information for building a cluster of coins belonging to one entity. There are several heuristics, practical assumptions which are not guaranteed to be accurate or optimal, that are used to deanonymize users:")]),_,k,e("div",x,[C,e("p",null,[n("Never "),t(s,{to:"/why-wasabi/AddressReuse.html#problem"},{default:i(()=>[n("reuse addresses")]),_:1}),n("!")])]),T,e("div",B,[W,e("p",null,[n("This is why the CoinJoin change has only 1 "),t(s,{to:"/glossary/Glossary-PrivacyWasabi.html#anonymity-set-anonset"},{default:i(()=>[n("anonset")]),_:1}),n(".")])]),A,e("p",null,[e("a",R,[n("BIP 125"),t(l)]),n(" allows for one unconfirmed transaction to be double-spent and replaced by a second transaction that pays a higher fee. However, the output that is reduced in the second transaction is likely to be the change output, as the sender pays the fee.")]),O])}const j=c(u,[["render",S],["__file","Coins.html.vue"]]),J=JSON.parse(`{"path":"/why-wasabi/Coins.html","title":"Coins","lang":"en-US","frontmatter":{"title":"Coins","description":"On the nuances of Bitcoin's coin model with unspent transaction outputs, the privacy problems and how to fix it. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Problem","slug":"problem","link":"#problem","children":[{"level":3,"title":"UTXOs are not fungible","slug":"utxos-are-not-fungible","link":"#utxos-are-not-fungible","children":[]}]},{"level":2,"title":"Wasabi's Solution","slug":"wasabi-s-solution","link":"#wasabi-s-solution","children":[{"level":3,"title":"Manual coin labeling and selection","slug":"manual-coin-labeling-and-selection","link":"#manual-coin-labeling-and-selection","children":[]},{"level":3,"title":"Change avoidance suggestion","slug":"change-avoidance-suggestion","link":"#change-avoidance-suggestion","children":[]}]},{"level":2,"title":"Heuristics identifying change","slug":"heuristics-identifying-change","link":"#heuristics-identifying-change","children":[{"level":3,"title":"Address reuse","slug":"address-reuse","link":"#address-reuse","children":[]},{"level":3,"title":"Wallet fingerprinting","slug":"wallet-fingerprinting","link":"#wallet-fingerprinting","children":[]},{"level":3,"title":"Round numbers","slug":"round-numbers","link":"#round-numbers","children":[]},{"level":3,"title":"CoinJoin","slug":"coinjoin","link":"#coinjoin","children":[]},{"level":3,"title":"Replace by Fee","slug":"replace-by-fee","link":"#replace-by-fee","children":[]}]}],"git":{"updatedTime":1720425980000},"filePathRelative":"why-wasabi/Coins.md"}`);export{j as comp,J as data}; diff --git a/assets/ColdWasabi.html-DTuOXsd-.js b/assets/ColdWasabi.html-BDOafOTR.js similarity index 99% rename from assets/ColdWasabi.html-DTuOXsd-.js rename to assets/ColdWasabi.html-BDOafOTR.js index f6a64bfde..7e100ca15 100644 --- a/assets/ColdWasabi.html-DTuOXsd-.js +++ b/assets/ColdWasabi.html-BDOafOTR.js @@ -1 +1 @@ -import{_ as c,r,o as d,c as h,a as t,d as a,w as o,b as e,e as l}from"./app-3S7gIoGc.js";const u={},w=t("h1",{id:"cold-wasabi-hardware-wallet-mode",tabindex:"-1"},[t("a",{class:"header-anchor",href:"#cold-wasabi-hardware-wallet-mode"},[t("span",null,"Cold-Wasabi Hardware Wallet Mode")])],-1),p={class:"table-of-contents"},b=t("h2",{id:"using-hardware-wallet-step-by-step",tabindex:"-1"},[t("a",{class:"header-anchor",href:"#using-hardware-wallet-step-by-step"},[t("span",null,"Using hardware wallet step-by-step")])],-1),g=l("
  • Start your Wasabi Wallet and go to Add Wallet.
  • Click on Connect to hardware wallet and then connect the hardware wallet via cable. Alternatively, you can import a Coldcard skeleton file via SD card by using Import Wallet at the Add Wallet dialog.
  • Confirm that the detected hardware wallet is correct.
  • Click Open, and wait for the wallet to load.
  • ",4),m=t("code",null,"Send",-1),f={class:"custom-container warning"},v=t("p",{class:"custom-container-title"},"No coinjoin",-1),y=l('

    What is Cold Storage

    Cold storage refers to generating and storing private keys completely offline. This is an often-used security precaution, especially dealing with large amounts of bitcoin. Because the private keys are not on a computer that is connected to the internet, many remote attack vectors are nullified.

    Methods of cold storage include keeping private keys on a:

    Use a hardware wallet for cold storage

    There are multiple ways to exercise cold storage, however it is highly reccommended to use a hardware wallet. This is by far the best and most secure way of using bitcoin for almost all users.

    Hardware Wallet with Wasabi

    ',6),k={href:"https://github.com/bitcoin-core/hwi",target:"_blank",rel:"noopener noreferrer"},W={href:"https://trezor.io",target:"_blank",rel:"noopener noreferrer"},_={href:"https://ledger.com",target:"_blank",rel:"noopener noreferrer"},S={href:"https://coldcard.com",target:"_blank",rel:"noopener noreferrer"},C=l('

    Connecting via USB

    Import the wallet

    1. Go to Add wallet.
    2. Click on Connect to hardware wallet.
    3. Give the wallet a name.
    4. Connect the hardware wallet to the PC and enter the pin on the hardware wallet to unlock it.
    5. Confirm that the correct hardware wallet is detected.
    6. Open the wallet.

    This wallet can be used as a watch-only wallet when the hardware wallet device is not connected.

    Wasabi remembers the wallet's information like xpub, wallet fingerprint and addresses etc. But it never knows the private keys, which are on the hardware wallet. So, you can see the balance and all it's transactions in Wasabi and you can generate addresses, but you cannot send without the hardware wallet being connected. Because you need to sign (confirm) the outgoing transactions on the hardware wallet.

    Receiving bitcoin

    ',5),x=t("div",{class:"custom-container tip"},[t("p",{class:"custom-container-title"},"Verify the receive address on the hardware wallet for extra security"),t("p",null,[e("It's always a good practice to verify that the receive address on Wasabi corresponds to the one on the hardware wallet, before receiving (large amounts of) bitcoin. This could prevent malicious firmware which replaces a receive address with a fake one. You can do this by clicking on "),t("code",null,"Show on the hardware wallet"),e(" at a receive address. The address will now be displayed on the hardware wallet, check that the addresses correspond and then confirm this on the hardware wallet.")])],-1),T=t("h4",{id:"sending-bitcoin",tabindex:"-1"},[t("a",{class:"header-anchor",href:"#sending-bitcoin"},[t("span",null,"Sending bitcoin")])],-1),B=l('
    1. Click the Send button.
    2. Enter the amount and destination address.
    3. Enter the label of whom you are sending to.
    4. At the Preview Transaction screen, check that everything is correct.
    5. Click Send Now.
    6. Connect the hardware wallet & unlock it.
    7. Check on the hardware wallet that everything is correct.
    8. Confirm on the hardware wallet.
    9. The transaction is sent!

    The private keys are not on the computer, thus the transaction is signed on the hardware wallet after you confirm with a physical button click. The final transaction is automatically broadcast over Tor with Wasabi Wallet.

    Connecting Coldcard via SD card

    ',3),j={href:"https://coldcard.com/docs/microsd",target:"_blank",rel:"noopener noreferrer"},I=l('

    Import the skeleton wallet

    Power your Coldcard on a power bank or electricity socket, then unlock it with your pin. Put in a MicroSD card and go to Advanced > MicroSD Card > Export Wallet > Wasabi Wallet. This will write the public keys, wallet fingerprint, derivation path and other metadata to a skeleton file new-wallet.json.

    Protect your public keys!

    This file does not include your private keys, so an attacker cannot use it to spend your bitcoin. However, he can use it to derive a full transaction history, thus it is a potential privacy leak.

    Now insert the SD card to your computer, and open Wasabi Wallet. Go to the Add Wallet dialog, and click Import a wallet, browse to the SD card and select the new-wallet.json file. Wasabi will automatically import and modify this skeleton file and store it in your Wallets and WalletBackups folders.

    Receiving bitcoin

    ',5),P=t("code",null,"NavBar",-1),U=l('

    Sending bitcoin

    Sending bitcoin airgapped works as follows:

    1. Enable PSBT workflow in the Wallet Settings
    2. Click the Send button.
    3. Enter the amount and destination address.
    4. Enter the label of whom you are sending to.
    5. At the Preview Transaction screen, check that everything is correct.
    6. Click Save PSBT file, and save the file on the MicroSD card.
    7. Remove the MicroSD card from the computer and put it into your Coldcard.
    8. On the Coldcard, click Ready to Sign.
    9. Verify the transaction details shown on the Coldcard, and approve to sign the transaction.
    10. Remove the MicroSD card from Coldcard and insert it into the computer.
    11. In Wasabi, click on Broadcaster (in the search bar).
    12. Select Import Transaction.
    13. Select the final signed transaction, which looks like this xxx-final.txn.
    14. Broadcast the transaction.

    Enable PSBT workflow in the settings

    You need to have PSBT workflow enabled in the wallet settings in order to have Save PSBT file show up at the Preview Transaction screen. After it is enabled, a Broadcast button will appear next to the Send button for an easier workflow.

    Cold-Wasabi protocol

    This is how you can safely eat cold Wasabi, or store your coins on a hardware wallet after coinjoining with Wasabi Wallet. Because you cannot do coinjoin with the private keys on the hardware wallet, you will need to generate and load two different wallets in Wasabi. A 'hot' (coinjoin) and a 'cold' (storage) wallet will both be running in parallel, label them accordingly so you don't mix them up.

    GUI tutorial

    Coinjoin on the hot Wasabi

    First

    You should make your existing coins private. It is useful to generate a complete new hot wallet for this, so as to keep the coinjoin transaction history separate from other wallets.

    ',9),A=t("li",null,"Send bitcoin into this Hot-Wasabi Wallet.",-1),N=l('

    Set up your cold-Wasabi

    Second

    In order to separate these new private coins, you should generate a fresh wallet on your hardware device.

    1. Generate a new set of keys on your hardware wallet and make a backup.
    2. Load your hardware wallet device to Wasabi, either via USB or SD card.
    3. Label and generate a receive address for the hardware wallet. For the first setup, you need to connect the hardware wallet to the computer that runs Wasabi, afterwards, you can generate receive addresses without the device being connected.
    4. Copy the receiving address from the cold-Wasabi.

    Send bitcoins from hot to cold Wasabi

    Third

    When your coins are private, it is a good practice to send them out in multiple batches in order to not consolidate all your coins. Wait some time in-between sending them, so that timing analysis becomes more difficult.

    1. Go to the hot-Wasabi Send dialog and enter the amount.
    2. Paste the cold-Wasabi address.

    Send bitcoins from cold Wasabi

    Finally

    You can at any time spend the bitcoin from the cold-Wasabi.

    1. Connect your hardware wallet to the computer.
    2. Load the cold Wasabi wallet.
    3. Go to the Send dialog, enter the amount and the destination address, then sign the transaction with the hardware wallet.

    Success!

    おめでとうございます!

    You are now eating Cold Wasabi!

    WARNING

    The anonymity score is tied to the wallet that you used to coinjoin, if you send a mixed coin to another Wasabi Wallet (in this case your hardware wallet), it will have an anonymity score of 1 (and will be marked as non-private) because this wallet doesn't know that the coin was coinjoined.

    You should use a meaningful label when you generate a receive address in your hardware wallet, e.g. "Myself coinjoin private" (something that reminds you that you got this utxo from your Wasabi Wallet and it was coinjoined).

    ',11);function R(D,G){const i=r("router-link"),n=r("RouteLink"),s=r("ExternalLinkIcon");return d(),h("div",null,[w,t("nav",p,[t("ul",null,[t("li",null,[a(i,{to:"#using-hardware-wallet-step-by-step"},{default:o(()=>[e("Using hardware wallet step-by-step")]),_:1})]),t("li",null,[a(i,{to:"#what-is-cold-storage"},{default:o(()=>[e("What is Cold Storage")]),_:1})]),t("li",null,[a(i,{to:"#hardware-wallet-with-wasabi"},{default:o(()=>[e("Hardware Wallet with Wasabi")]),_:1}),t("ul",null,[t("li",null,[a(i,{to:"#connecting-via-usb"},{default:o(()=>[e("Connecting via USB")]),_:1})]),t("li",null,[a(i,{to:"#connecting-coldcard-via-sd-card"},{default:o(()=>[e("Connecting Coldcard via SD card")]),_:1})])])]),t("li",null,[a(i,{to:"#cold-wasabi-protocol"},{default:o(()=>[e("Cold-Wasabi protocol")]),_:1})]),t("li",null,[a(i,{to:"#gui-tutorial"},{default:o(()=>[e("GUI tutorial")]),_:1}),t("ul",null,[t("li",null,[a(i,{to:"#coinjoin-on-the-hot-wasabi"},{default:o(()=>[e("Coinjoin on the hot Wasabi")]),_:1})]),t("li",null,[a(i,{to:"#set-up-your-cold-wasabi"},{default:o(()=>[e("Set up your cold-Wasabi")]),_:1})]),t("li",null,[a(i,{to:"#send-bitcoins-from-hot-to-cold-wasabi"},{default:o(()=>[e("Send bitcoins from hot to cold Wasabi")]),_:1})]),t("li",null,[a(i,{to:"#send-bitcoins-from-cold-wasabi"},{default:o(()=>[e("Send bitcoins from cold Wasabi")]),_:1})])])])])]),b,t("ol",null,[g,t("li",null,[e("Now you can "),a(n,{to:"/using-wasabi/Receive.html"},{default:o(()=>[e("receive")]),_:1}),e(" bitcoin to addresses controlled by the hardware wallet.")]),t("li",null,[e("You can "),a(n,{to:"/using-wasabi/Send.html"},{default:o(()=>[e("spend")]),_:1}),e(" these coins in the "),m,e(" dialog, though the hardware wallet must be connected via USB to sign the transaction. Alternatively, you can "),a(n,{to:"/using-wasabi/ColdWasabi.html#connecting-coldcard-via-sd-card"},{default:o(()=>[e("build a PSBT")]),_:1}),e(", export this via SD card to your Coldcard wallet for signing, then import the final transaction to Wasabi for broadcasting.")])]),t("div",f,[v,t("p",null,[e("Unfortunately, as of now, you cannot "),a(n,{to:"/using-wasabi/CoinJoin.html"},{default:o(()=>[e("coinjoin")]),_:1}),e(" with just the private keys on your hardware wallet. The keys need to be on the internet-connected computer to be able to coinjoin.")])]),y,t("p",null,[e("You can use Wasabi Wallet with almost any hardware wallet out there because Wasabi utilizes "),t("a",k,[e("Bitcoin Core Hardware Wallet Interface [HWI]"),a(s)]),e(". The setup is thoroughly tested for "),t("a",W,[e("Trezor model T"),a(s)]),e(", "),t("a",_,[e("Ledger Nano S, Nano S Plus and Nano X"),a(s)]),e(", and "),t("a",S,[e("Coldcard"),a(s)]),e(".")]),C,t("p",null,[e("After the first time you loaded a new device, the public keys will be stored locally on the computer, and you can use Wasabi to "),a(n,{to:"/using-wasabi/Receive.html"},{default:o(()=>[e("receive bitcoin")]),_:1}),e(" to the hardware wallet without having it connected.")]),x,T,t("p",null,[e("Only when you want to "),a(n,{to:"/using-wasabi/Send.html"},{default:o(()=>[e("send bitcoin")]),_:1}),e(" you need to connect the device over USB again.")]),B,t("p",null,[e("You can use Wasabi Wallet together with Coldcard without ever connecting it via USB, thus further reducing possible attack vectors. For more details see the "),t("a",j,[e("Coldcard documentation"),a(s)]),e(".")]),I,t("p",null,[e("After the skeleton wallet is imported, you can open the wallet from the wallet list at the "),P,e(", without having to power on the Coldcard. Generate a "),a(n,{to:"/using-wasabi/Receive.html"},{default:o(()=>[e("receive address")]),_:1}),e(" as usual. The private key corresponding to this address is on the hardware wallet.")]),U,t("ol",null,[t("li",null,[a(n,{to:"/using-wasabi/WalletGeneration.html"},{default:o(()=>[e("Generate a new hot-Wasabi Wallet")]),_:1}),e(".")]),t("li",null,[e("Open the "),a(n,{to:"/using-wasabi/Receive.html"},{default:o(()=>[e("Receive")]),_:1}),e(" dialog to get a new address.")]),A,t("li",null,[e("Start the automatic "),a(n,{to:"/using-wasabi/CoinJoin.html"},{default:o(()=>[e("coinjoin")]),_:1}),e(" process and wait for the coinjoin to be done (i.e. privacy progress 100%).")])]),N])}const E=c(u,[["render",R],["__file","ColdWasabi.html.vue"]]),Y=JSON.parse('{"path":"/using-wasabi/ColdWasabi.html","title":"Hardware Wallet","lang":"en-US","frontmatter":{"title":"Hardware Wallet","description":"A step by step guide on how to CoinJoin and send bitcoin to a hardware wallet for cold storage using Wasabi Wallet only. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Using hardware wallet step-by-step","slug":"using-hardware-wallet-step-by-step","link":"#using-hardware-wallet-step-by-step","children":[]},{"level":2,"title":"What is Cold Storage","slug":"what-is-cold-storage","link":"#what-is-cold-storage","children":[]},{"level":2,"title":"Hardware Wallet with Wasabi","slug":"hardware-wallet-with-wasabi","link":"#hardware-wallet-with-wasabi","children":[{"level":3,"title":"Connecting via USB","slug":"connecting-via-usb","link":"#connecting-via-usb","children":[]},{"level":3,"title":"Connecting Coldcard via SD card","slug":"connecting-coldcard-via-sd-card","link":"#connecting-coldcard-via-sd-card","children":[]}]},{"level":2,"title":"Cold-Wasabi protocol","slug":"cold-wasabi-protocol","link":"#cold-wasabi-protocol","children":[]},{"level":2,"title":"GUI tutorial","slug":"gui-tutorial","link":"#gui-tutorial","children":[{"level":3,"title":"Coinjoin on the hot Wasabi","slug":"coinjoin-on-the-hot-wasabi","link":"#coinjoin-on-the-hot-wasabi","children":[]},{"level":3,"title":"Set up your cold-Wasabi","slug":"set-up-your-cold-wasabi","link":"#set-up-your-cold-wasabi","children":[]},{"level":3,"title":"Send bitcoins from hot to cold Wasabi","slug":"send-bitcoins-from-hot-to-cold-wasabi","link":"#send-bitcoins-from-hot-to-cold-wasabi","children":[]},{"level":3,"title":"Send bitcoins from cold Wasabi","slug":"send-bitcoins-from-cold-wasabi","link":"#send-bitcoins-from-cold-wasabi","children":[]}]}],"git":{"updatedTime":1720425186000},"filePathRelative":"using-wasabi/ColdWasabi.md"}');export{E as comp,Y as data}; +import{_ as c,r,o as d,c as h,a as t,d as a,w as o,b as e,e as l}from"./app-CwImt2bI.js";const u={},w=t("h1",{id:"cold-wasabi-hardware-wallet-mode",tabindex:"-1"},[t("a",{class:"header-anchor",href:"#cold-wasabi-hardware-wallet-mode"},[t("span",null,"Cold-Wasabi Hardware Wallet Mode")])],-1),p={class:"table-of-contents"},b=t("h2",{id:"using-hardware-wallet-step-by-step",tabindex:"-1"},[t("a",{class:"header-anchor",href:"#using-hardware-wallet-step-by-step"},[t("span",null,"Using hardware wallet step-by-step")])],-1),g=l("
  • Start your Wasabi Wallet and go to Add Wallet.
  • Click on Connect to hardware wallet and then connect the hardware wallet via cable. Alternatively, you can import a Coldcard skeleton file via SD card by using Import Wallet at the Add Wallet dialog.
  • Confirm that the detected hardware wallet is correct.
  • Click Open, and wait for the wallet to load.
  • ",4),m=t("code",null,"Send",-1),f={class:"custom-container warning"},v=t("p",{class:"custom-container-title"},"No coinjoin",-1),y=l('

    What is Cold Storage

    Cold storage refers to generating and storing private keys completely offline. This is an often-used security precaution, especially dealing with large amounts of bitcoin. Because the private keys are not on a computer that is connected to the internet, many remote attack vectors are nullified.

    Methods of cold storage include keeping private keys on a:

    Use a hardware wallet for cold storage

    There are multiple ways to exercise cold storage, however it is highly reccommended to use a hardware wallet. This is by far the best and most secure way of using bitcoin for almost all users.

    Hardware Wallet with Wasabi

    ',6),k={href:"https://github.com/bitcoin-core/hwi",target:"_blank",rel:"noopener noreferrer"},W={href:"https://trezor.io",target:"_blank",rel:"noopener noreferrer"},_={href:"https://ledger.com",target:"_blank",rel:"noopener noreferrer"},S={href:"https://coldcard.com",target:"_blank",rel:"noopener noreferrer"},C=l('

    Connecting via USB

    Import the wallet

    1. Go to Add wallet.
    2. Click on Connect to hardware wallet.
    3. Give the wallet a name.
    4. Connect the hardware wallet to the PC and enter the pin on the hardware wallet to unlock it.
    5. Confirm that the correct hardware wallet is detected.
    6. Open the wallet.

    This wallet can be used as a watch-only wallet when the hardware wallet device is not connected.

    Wasabi remembers the wallet's information like xpub, wallet fingerprint and addresses etc. But it never knows the private keys, which are on the hardware wallet. So, you can see the balance and all it's transactions in Wasabi and you can generate addresses, but you cannot send without the hardware wallet being connected. Because you need to sign (confirm) the outgoing transactions on the hardware wallet.

    Receiving bitcoin

    ',5),x=t("div",{class:"custom-container tip"},[t("p",{class:"custom-container-title"},"Verify the receive address on the hardware wallet for extra security"),t("p",null,[e("It's always a good practice to verify that the receive address on Wasabi corresponds to the one on the hardware wallet, before receiving (large amounts of) bitcoin. This could prevent malicious firmware which replaces a receive address with a fake one. You can do this by clicking on "),t("code",null,"Show on the hardware wallet"),e(" at a receive address. The address will now be displayed on the hardware wallet, check that the addresses correspond and then confirm this on the hardware wallet.")])],-1),T=t("h4",{id:"sending-bitcoin",tabindex:"-1"},[t("a",{class:"header-anchor",href:"#sending-bitcoin"},[t("span",null,"Sending bitcoin")])],-1),B=l('
    1. Click the Send button.
    2. Enter the amount and destination address.
    3. Enter the label of whom you are sending to.
    4. At the Preview Transaction screen, check that everything is correct.
    5. Click Send Now.
    6. Connect the hardware wallet & unlock it.
    7. Check on the hardware wallet that everything is correct.
    8. Confirm on the hardware wallet.
    9. The transaction is sent!

    The private keys are not on the computer, thus the transaction is signed on the hardware wallet after you confirm with a physical button click. The final transaction is automatically broadcast over Tor with Wasabi Wallet.

    Connecting Coldcard via SD card

    ',3),j={href:"https://coldcard.com/docs/microsd",target:"_blank",rel:"noopener noreferrer"},I=l('

    Import the skeleton wallet

    Power your Coldcard on a power bank or electricity socket, then unlock it with your pin. Put in a MicroSD card and go to Advanced > MicroSD Card > Export Wallet > Wasabi Wallet. This will write the public keys, wallet fingerprint, derivation path and other metadata to a skeleton file new-wallet.json.

    Protect your public keys!

    This file does not include your private keys, so an attacker cannot use it to spend your bitcoin. However, he can use it to derive a full transaction history, thus it is a potential privacy leak.

    Now insert the SD card to your computer, and open Wasabi Wallet. Go to the Add Wallet dialog, and click Import a wallet, browse to the SD card and select the new-wallet.json file. Wasabi will automatically import and modify this skeleton file and store it in your Wallets and WalletBackups folders.

    Receiving bitcoin

    ',5),P=t("code",null,"NavBar",-1),U=l('

    Sending bitcoin

    Sending bitcoin airgapped works as follows:

    1. Enable PSBT workflow in the Wallet Settings
    2. Click the Send button.
    3. Enter the amount and destination address.
    4. Enter the label of whom you are sending to.
    5. At the Preview Transaction screen, check that everything is correct.
    6. Click Save PSBT file, and save the file on the MicroSD card.
    7. Remove the MicroSD card from the computer and put it into your Coldcard.
    8. On the Coldcard, click Ready to Sign.
    9. Verify the transaction details shown on the Coldcard, and approve to sign the transaction.
    10. Remove the MicroSD card from Coldcard and insert it into the computer.
    11. In Wasabi, click on Broadcaster (in the search bar).
    12. Select Import Transaction.
    13. Select the final signed transaction, which looks like this xxx-final.txn.
    14. Broadcast the transaction.

    Enable PSBT workflow in the settings

    You need to have PSBT workflow enabled in the wallet settings in order to have Save PSBT file show up at the Preview Transaction screen. After it is enabled, a Broadcast button will appear next to the Send button for an easier workflow.

    Cold-Wasabi protocol

    This is how you can safely eat cold Wasabi, or store your coins on a hardware wallet after coinjoining with Wasabi Wallet. Because you cannot do coinjoin with the private keys on the hardware wallet, you will need to generate and load two different wallets in Wasabi. A 'hot' (coinjoin) and a 'cold' (storage) wallet will both be running in parallel, label them accordingly so you don't mix them up.

    GUI tutorial

    Coinjoin on the hot Wasabi

    First

    You should make your existing coins private. It is useful to generate a complete new hot wallet for this, so as to keep the coinjoin transaction history separate from other wallets.

    ',9),A=t("li",null,"Send bitcoin into this Hot-Wasabi Wallet.",-1),N=l('

    Set up your cold-Wasabi

    Second

    In order to separate these new private coins, you should generate a fresh wallet on your hardware device.

    1. Generate a new set of keys on your hardware wallet and make a backup.
    2. Load your hardware wallet device to Wasabi, either via USB or SD card.
    3. Label and generate a receive address for the hardware wallet. For the first setup, you need to connect the hardware wallet to the computer that runs Wasabi, afterwards, you can generate receive addresses without the device being connected.
    4. Copy the receiving address from the cold-Wasabi.

    Send bitcoins from hot to cold Wasabi

    Third

    When your coins are private, it is a good practice to send them out in multiple batches in order to not consolidate all your coins. Wait some time in-between sending them, so that timing analysis becomes more difficult.

    1. Go to the hot-Wasabi Send dialog and enter the amount.
    2. Paste the cold-Wasabi address.

    Send bitcoins from cold Wasabi

    Finally

    You can at any time spend the bitcoin from the cold-Wasabi.

    1. Connect your hardware wallet to the computer.
    2. Load the cold Wasabi wallet.
    3. Go to the Send dialog, enter the amount and the destination address, then sign the transaction with the hardware wallet.

    Success!

    おめでとうございます!

    You are now eating Cold Wasabi!

    WARNING

    The anonymity score is tied to the wallet that you used to coinjoin, if you send a mixed coin to another Wasabi Wallet (in this case your hardware wallet), it will have an anonymity score of 1 (and will be marked as non-private) because this wallet doesn't know that the coin was coinjoined.

    You should use a meaningful label when you generate a receive address in your hardware wallet, e.g. "Myself coinjoin private" (something that reminds you that you got this utxo from your Wasabi Wallet and it was coinjoined).

    ',11);function R(D,G){const i=r("router-link"),n=r("RouteLink"),s=r("ExternalLinkIcon");return d(),h("div",null,[w,t("nav",p,[t("ul",null,[t("li",null,[a(i,{to:"#using-hardware-wallet-step-by-step"},{default:o(()=>[e("Using hardware wallet step-by-step")]),_:1})]),t("li",null,[a(i,{to:"#what-is-cold-storage"},{default:o(()=>[e("What is Cold Storage")]),_:1})]),t("li",null,[a(i,{to:"#hardware-wallet-with-wasabi"},{default:o(()=>[e("Hardware Wallet with Wasabi")]),_:1}),t("ul",null,[t("li",null,[a(i,{to:"#connecting-via-usb"},{default:o(()=>[e("Connecting via USB")]),_:1})]),t("li",null,[a(i,{to:"#connecting-coldcard-via-sd-card"},{default:o(()=>[e("Connecting Coldcard via SD card")]),_:1})])])]),t("li",null,[a(i,{to:"#cold-wasabi-protocol"},{default:o(()=>[e("Cold-Wasabi protocol")]),_:1})]),t("li",null,[a(i,{to:"#gui-tutorial"},{default:o(()=>[e("GUI tutorial")]),_:1}),t("ul",null,[t("li",null,[a(i,{to:"#coinjoin-on-the-hot-wasabi"},{default:o(()=>[e("Coinjoin on the hot Wasabi")]),_:1})]),t("li",null,[a(i,{to:"#set-up-your-cold-wasabi"},{default:o(()=>[e("Set up your cold-Wasabi")]),_:1})]),t("li",null,[a(i,{to:"#send-bitcoins-from-hot-to-cold-wasabi"},{default:o(()=>[e("Send bitcoins from hot to cold Wasabi")]),_:1})]),t("li",null,[a(i,{to:"#send-bitcoins-from-cold-wasabi"},{default:o(()=>[e("Send bitcoins from cold Wasabi")]),_:1})])])])])]),b,t("ol",null,[g,t("li",null,[e("Now you can "),a(n,{to:"/using-wasabi/Receive.html"},{default:o(()=>[e("receive")]),_:1}),e(" bitcoin to addresses controlled by the hardware wallet.")]),t("li",null,[e("You can "),a(n,{to:"/using-wasabi/Send.html"},{default:o(()=>[e("spend")]),_:1}),e(" these coins in the "),m,e(" dialog, though the hardware wallet must be connected via USB to sign the transaction. Alternatively, you can "),a(n,{to:"/using-wasabi/ColdWasabi.html#connecting-coldcard-via-sd-card"},{default:o(()=>[e("build a PSBT")]),_:1}),e(", export this via SD card to your Coldcard wallet for signing, then import the final transaction to Wasabi for broadcasting.")])]),t("div",f,[v,t("p",null,[e("Unfortunately, as of now, you cannot "),a(n,{to:"/using-wasabi/CoinJoin.html"},{default:o(()=>[e("coinjoin")]),_:1}),e(" with just the private keys on your hardware wallet. The keys need to be on the internet-connected computer to be able to coinjoin.")])]),y,t("p",null,[e("You can use Wasabi Wallet with almost any hardware wallet out there because Wasabi utilizes "),t("a",k,[e("Bitcoin Core Hardware Wallet Interface [HWI]"),a(s)]),e(". The setup is thoroughly tested for "),t("a",W,[e("Trezor model T"),a(s)]),e(", "),t("a",_,[e("Ledger Nano S, Nano S Plus and Nano X"),a(s)]),e(", and "),t("a",S,[e("Coldcard"),a(s)]),e(".")]),C,t("p",null,[e("After the first time you loaded a new device, the public keys will be stored locally on the computer, and you can use Wasabi to "),a(n,{to:"/using-wasabi/Receive.html"},{default:o(()=>[e("receive bitcoin")]),_:1}),e(" to the hardware wallet without having it connected.")]),x,T,t("p",null,[e("Only when you want to "),a(n,{to:"/using-wasabi/Send.html"},{default:o(()=>[e("send bitcoin")]),_:1}),e(" you need to connect the device over USB again.")]),B,t("p",null,[e("You can use Wasabi Wallet together with Coldcard without ever connecting it via USB, thus further reducing possible attack vectors. For more details see the "),t("a",j,[e("Coldcard documentation"),a(s)]),e(".")]),I,t("p",null,[e("After the skeleton wallet is imported, you can open the wallet from the wallet list at the "),P,e(", without having to power on the Coldcard. Generate a "),a(n,{to:"/using-wasabi/Receive.html"},{default:o(()=>[e("receive address")]),_:1}),e(" as usual. The private key corresponding to this address is on the hardware wallet.")]),U,t("ol",null,[t("li",null,[a(n,{to:"/using-wasabi/WalletGeneration.html"},{default:o(()=>[e("Generate a new hot-Wasabi Wallet")]),_:1}),e(".")]),t("li",null,[e("Open the "),a(n,{to:"/using-wasabi/Receive.html"},{default:o(()=>[e("Receive")]),_:1}),e(" dialog to get a new address.")]),A,t("li",null,[e("Start the automatic "),a(n,{to:"/using-wasabi/CoinJoin.html"},{default:o(()=>[e("coinjoin")]),_:1}),e(" process and wait for the coinjoin to be done (i.e. privacy progress 100%).")])]),N])}const E=c(u,[["render",R],["__file","ColdWasabi.html.vue"]]),Y=JSON.parse('{"path":"/using-wasabi/ColdWasabi.html","title":"Hardware Wallet","lang":"en-US","frontmatter":{"title":"Hardware Wallet","description":"A step by step guide on how to CoinJoin and send bitcoin to a hardware wallet for cold storage using Wasabi Wallet only. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Using hardware wallet step-by-step","slug":"using-hardware-wallet-step-by-step","link":"#using-hardware-wallet-step-by-step","children":[]},{"level":2,"title":"What is Cold Storage","slug":"what-is-cold-storage","link":"#what-is-cold-storage","children":[]},{"level":2,"title":"Hardware Wallet with Wasabi","slug":"hardware-wallet-with-wasabi","link":"#hardware-wallet-with-wasabi","children":[{"level":3,"title":"Connecting via USB","slug":"connecting-via-usb","link":"#connecting-via-usb","children":[]},{"level":3,"title":"Connecting Coldcard via SD card","slug":"connecting-coldcard-via-sd-card","link":"#connecting-coldcard-via-sd-card","children":[]}]},{"level":2,"title":"Cold-Wasabi protocol","slug":"cold-wasabi-protocol","link":"#cold-wasabi-protocol","children":[]},{"level":2,"title":"GUI tutorial","slug":"gui-tutorial","link":"#gui-tutorial","children":[{"level":3,"title":"Coinjoin on the hot Wasabi","slug":"coinjoin-on-the-hot-wasabi","link":"#coinjoin-on-the-hot-wasabi","children":[]},{"level":3,"title":"Set up your cold-Wasabi","slug":"set-up-your-cold-wasabi","link":"#set-up-your-cold-wasabi","children":[]},{"level":3,"title":"Send bitcoins from hot to cold Wasabi","slug":"send-bitcoins-from-hot-to-cold-wasabi","link":"#send-bitcoins-from-hot-to-cold-wasabi","children":[]},{"level":3,"title":"Send bitcoins from cold Wasabi","slug":"send-bitcoins-from-cold-wasabi","link":"#send-bitcoins-from-cold-wasabi","children":[]}]}],"git":{"updatedTime":1720425980000},"filePathRelative":"using-wasabi/ColdWasabi.md"}');export{E as comp,Y as data}; diff --git a/assets/ContributionChecklist.html-Drz65i8W.js b/assets/ContributionChecklist.html-PJh7KuO7.js similarity index 98% rename from assets/ContributionChecklist.html-Drz65i8W.js rename to assets/ContributionChecklist.html-PJh7KuO7.js index a1c2493a8..12c6686e0 100644 --- a/assets/ContributionChecklist.html-Drz65i8W.js +++ b/assets/ContributionChecklist.html-PJh7KuO7.js @@ -1 +1 @@ -import{_ as u,r,o as h,c,a as e,d as o,w as a,b as t,e as s}from"./app-3S7gIoGc.js";const d={},b=e("h1",{id:"contribution-checklist",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#contribution-checklist"},[e("span",null,"Contribution Checklist")])],-1),w=e("p",null,"So you're interested in contributing to Wasabi - welcome!",-1),p=e("div",{class:"custom-container tip"},[e("p",{class:"custom-container-title"},"Embrace the open-source crypto-anarchy!"),e("p",null,"No one is here to tell you what to do, and it is not required to work on an existing issue to contribute to Wasabi. Contributors are free to work on their own forked versions on whatever they want, however they wish and without any permission from anyone. With that being said, in order to maximize the usefulness/impact of your work, it's a good idea to consult with other Wasabikas via Slack, GitHub, or other communication channels before setting out on any serious contribution effort.")],-1),g=e("p",null,"This checklist will get you plugged in and productive as quickly as possible.",-1),f={class:"table-of-contents"},k=s('

    Who is a contributor?

    A contributor is any individual who works to improve and add value to Wasabi and its users.

    You can become a Wasabika!

    Wasabi Wallet is free and open-source software, but contributing is not just about writing code. This means anything from fixing typos in documentation, answering questions of fellow Wasabikas, creating videos, podcasts and memes, implementing new Wasabi features and everything in-between. All such contributions are very welcomed and greatly appreciated.

    Say hello and get started

    ',4),m={href:"https://join.slack.com/t/tumblebit/shared_invite/enQtNjQ1MTQ2NzQ1ODI0LWIzOTg5YTM3YmNkOTg1NjZmZTQ3NmM1OTAzYmQyYzk1M2M0MTdlZDk2OTQwNzFiNTg1ZmExNzM0NjgzY2M0Yzg",target:"_blank",rel:"noopener noreferrer"},y={href:"https://github.com/WalletWasabi/WalletWasabi",target:"_blank",rel:"noopener noreferrer"},_=e("li",null,"Introduce yourself, say a bit about your skills and interests. This will help others point you in the right direction.",-1),v=e("li",null,"Explore the communication channels and find out what the peers are tinkering on, learn about the project and who is contributing in what way. This will help you to find the interesting challenges you can work on.",-1),W=e("h2",{id:"learn-how-wasabikas-work",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#learn-how-wasabikas-work"},[e("span",null,"Learn how Wasabikas work")])],-1),C={href:"https://eprint.iacr.org/2021/206",target:"_blank",rel:"noopener noreferrer"},x={href:"https://rfc.zeromq.org/spec/42/",target:"_blank",rel:"noopener noreferrer"},T=e("p",null,"It’s a simple set of collaboration rules based on GitHub’s fork and pull request model, and a foundational part of how we work together.",-1),N=e("h2",{id:"what-to-work-on",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-to-work-on"},[e("span",null,"What to work on")])],-1),z=e("p",null,"Education and development are vitally important aspects of Bitcoin privacy and Wasabi Wallet specifically.",-1),q={href:"https://www.freehaven.net/anonbib/cache/usability:weis2006.pdf",target:"_blank",rel:"noopener noreferrer"},E={href:"https://en.wikipedia.org/wiki/Network_effect",target:"_blank",rel:"noopener noreferrer"},S=s('

    Education Contributor

    1. Videos, podcasts, memes and articles are great ways of sharing information to your peers. You can create wallet tutorials, record insightful discussions, write articles or make memes about Wasabi and privacy.
    2. Organizing events and doing presentations about Wasabi Wallet and Bitcoin privacy. Connecting like-minded individuals, who want to take control of their own financial privacy and teaching them about the awesome tools that are available, can be life changing.
    3. Helping and teaching new users, once you are familiar with the software, is something that can't be underestimated. You can do this in any social media like Twitter, Telegram, Reddit etc or in your own neighborhood.

    GitHub Contributor

    ',3),A=e("strong",null,"Find a problem somewhere in Wasabi-land",-1),M={href:"https://github.com/WalletWasabi/walletwasabi/issues",target:"_blank",rel:"noopener noreferrer"},H=e("strong",null,"Do work to fix that problem.",-1),Y={href:"https://github.com/WalletWasabi/WalletWasabi/pulls?q=is%3Apr+is%3Aopen+sort%3Aupdated-desc",target:"_blank",rel:"noopener noreferrer"},B={href:"https://github.com/WalletWasabi/WasabiDoc/pulls",target:"_blank",rel:"noopener noreferrer"},I={href:"https://github.com/WalletWasabi/walletwasabi/issues?q=is%3Aissue+is%3Aopen+sort%3Aupdated-desc",target:"_blank",rel:"noopener noreferrer"},L=e("li",null,[e("strong",null,"Request that others review your work."),t(" The best way to do this is by writing good commit comments and pull request/issue descriptions that clearly explain the problem your work is intended to solve, why it’s important, and why you fixed it the way you did. Make it as easy as possible for others to review your work. Make it a "),e("em",null,"pleasure"),t(" for others to review your work.")],-1),R=e("li",null,[e("strong",null,"Incorporate review feedback"),t(" you get until your fix gets merged or is otherwise accepted.")],-1),j=e("li",null,"Repeat steps 1–4.",-1),G=e("p",null,[t("Remember: "),e("em",null,"every contributor"),t(" is free to work on what they want, including maintainers who may or may not want to review and merge your pull request if they don't have any prior context for it, or reason to believe it's worth spending their time on.")],-1),O=e("div",{class:"custom-container tip"},[e("p",{class:"custom-container-title"},"Reviews are for everybody!"),e("p",null,"If you want to be really popular around here, don’t just submit your own work, but also spend time reviewing the work of others.")],-1);function Q(V,D){const i=r("router-link"),n=r("ExternalLinkIcon"),l=r("RouteLink");return h(),c("div",null,[b,w,p,g,e("nav",f,[e("ul",null,[e("li",null,[o(i,{to:"#who-is-a-contributor"},{default:a(()=>[t("Who is a contributor?")]),_:1})]),e("li",null,[o(i,{to:"#say-hello-and-get-started"},{default:a(()=>[t("Say hello and get started")]),_:1})]),e("li",null,[o(i,{to:"#learn-how-wasabikas-work"},{default:a(()=>[t("Learn how Wasabikas work")]),_:1})]),e("li",null,[o(i,{to:"#what-to-work-on"},{default:a(()=>[t("What to work on")]),_:1}),e("ul",null,[e("li",null,[o(i,{to:"#education-contributor"},{default:a(()=>[t("Education Contributor")]),_:1})]),e("li",null,[o(i,{to:"#github-contributor"},{default:a(()=>[t("GitHub Contributor")]),_:1})])])])])]),k,e("ul",null,[e("li",null,[t("Join our "),e("a",m,[t("Slack"),o(n)]),t(" and especially check out our "),e("a",y,[t("GitHub repository"),o(n)]),t(".")]),_,v]),W,e("ul",null,[e("li",null,[t("Educate yourself about the software by reading through "),o(l,{to:"/using-wasabi/"},{default:a(()=>[t("Using Wasabi")]),_:1}),t(".")]),e("li",null,[t("To understand how Wasabi CoinJoins work, read "),e("a",C,[t("WabiSabi Framework"),o(n)]),t(".")]),e("li",null,[t("Familiarize yourself with "),e("a",x,[t("C4: The Collective Code Construction Contract"),o(n)]),t(".")])]),T,N,z,e("p",null,[t("The more Wasabi users there are, the better their privacy, because "),e("a",q,[t("anonymity loves company"),o(n)]),t(".")]),e("p",null,[t("The better UX and privacy Wasabi provides, the more there will be users, because of "),e("a",E,[t("network effect"),o(n)]),t(".")]),S,e("ol",null,[e("li",null,[A,t(" that (a) needs fixing or improvement and (b) is a match for your skills and interests. Browse "),e("a",M,[t("open issues"),o(n)]),t(" and ask around about what other contributors think needs fixing. Because while you don’t need anybody’s permission and you can work on whatever you want, you’ll want to know up front whether anybody else is going to care about the work you do.")]),e("li",null,[H,t(" Submit your fix for review with a pull request (for "),e("a",Y,[t("code"),o(n)]),t(" and "),e("a",B,[t("documentation"),o(n)]),t(" changes) or with a GitHub "),e("a",I,[t("issue"),o(n)]),t(" (for everything else).")]),L,R,j]),G,O])}const Z=u(d,[["render",Q],["__file","ContributionChecklist.html.vue"]]),J=JSON.parse('{"path":"/building-wasabi/ContributionChecklist.html","title":"Contribution Checklist","lang":"en-US","frontmatter":{"title":"Contribution Checklist","description":"A collection of tips for new Wasabikas who are interested in supporting Wasabi Wallet. Here you find all the details to enable a swift start to your contribution. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Who is a contributor?","slug":"who-is-a-contributor","link":"#who-is-a-contributor","children":[]},{"level":2,"title":"Say hello and get started","slug":"say-hello-and-get-started","link":"#say-hello-and-get-started","children":[]},{"level":2,"title":"Learn how Wasabikas work","slug":"learn-how-wasabikas-work","link":"#learn-how-wasabikas-work","children":[]},{"level":2,"title":"What to work on","slug":"what-to-work-on","link":"#what-to-work-on","children":[{"level":3,"title":"Education Contributor","slug":"education-contributor","link":"#education-contributor","children":[]},{"level":3,"title":"GitHub Contributor","slug":"github-contributor","link":"#github-contributor","children":[]}]}],"git":{"updatedTime":1720425186000},"filePathRelative":"building-wasabi/ContributionChecklist.md"}');export{Z as comp,J as data}; +import{_ as u,r,o as h,c,a as e,d as o,w as a,b as t,e as s}from"./app-CwImt2bI.js";const d={},b=e("h1",{id:"contribution-checklist",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#contribution-checklist"},[e("span",null,"Contribution Checklist")])],-1),w=e("p",null,"So you're interested in contributing to Wasabi - welcome!",-1),p=e("div",{class:"custom-container tip"},[e("p",{class:"custom-container-title"},"Embrace the open-source crypto-anarchy!"),e("p",null,"No one is here to tell you what to do, and it is not required to work on an existing issue to contribute to Wasabi. Contributors are free to work on their own forked versions on whatever they want, however they wish and without any permission from anyone. With that being said, in order to maximize the usefulness/impact of your work, it's a good idea to consult with other Wasabikas via Slack, GitHub, or other communication channels before setting out on any serious contribution effort.")],-1),g=e("p",null,"This checklist will get you plugged in and productive as quickly as possible.",-1),f={class:"table-of-contents"},k=s('

    Who is a contributor?

    A contributor is any individual who works to improve and add value to Wasabi and its users.

    You can become a Wasabika!

    Wasabi Wallet is free and open-source software, but contributing is not just about writing code. This means anything from fixing typos in documentation, answering questions of fellow Wasabikas, creating videos, podcasts and memes, implementing new Wasabi features and everything in-between. All such contributions are very welcomed and greatly appreciated.

    Say hello and get started

    ',4),m={href:"https://join.slack.com/t/tumblebit/shared_invite/enQtNjQ1MTQ2NzQ1ODI0LWIzOTg5YTM3YmNkOTg1NjZmZTQ3NmM1OTAzYmQyYzk1M2M0MTdlZDk2OTQwNzFiNTg1ZmExNzM0NjgzY2M0Yzg",target:"_blank",rel:"noopener noreferrer"},y={href:"https://github.com/WalletWasabi/WalletWasabi",target:"_blank",rel:"noopener noreferrer"},_=e("li",null,"Introduce yourself, say a bit about your skills and interests. This will help others point you in the right direction.",-1),v=e("li",null,"Explore the communication channels and find out what the peers are tinkering on, learn about the project and who is contributing in what way. This will help you to find the interesting challenges you can work on.",-1),W=e("h2",{id:"learn-how-wasabikas-work",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#learn-how-wasabikas-work"},[e("span",null,"Learn how Wasabikas work")])],-1),C={href:"https://eprint.iacr.org/2021/206",target:"_blank",rel:"noopener noreferrer"},x={href:"https://rfc.zeromq.org/spec/42/",target:"_blank",rel:"noopener noreferrer"},T=e("p",null,"It’s a simple set of collaboration rules based on GitHub’s fork and pull request model, and a foundational part of how we work together.",-1),N=e("h2",{id:"what-to-work-on",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-to-work-on"},[e("span",null,"What to work on")])],-1),z=e("p",null,"Education and development are vitally important aspects of Bitcoin privacy and Wasabi Wallet specifically.",-1),q={href:"https://www.freehaven.net/anonbib/cache/usability:weis2006.pdf",target:"_blank",rel:"noopener noreferrer"},E={href:"https://en.wikipedia.org/wiki/Network_effect",target:"_blank",rel:"noopener noreferrer"},S=s('

    Education Contributor

    1. Videos, podcasts, memes and articles are great ways of sharing information to your peers. You can create wallet tutorials, record insightful discussions, write articles or make memes about Wasabi and privacy.
    2. Organizing events and doing presentations about Wasabi Wallet and Bitcoin privacy. Connecting like-minded individuals, who want to take control of their own financial privacy and teaching them about the awesome tools that are available, can be life changing.
    3. Helping and teaching new users, once you are familiar with the software, is something that can't be underestimated. You can do this in any social media like Twitter, Telegram, Reddit etc or in your own neighborhood.

    GitHub Contributor

    ',3),A=e("strong",null,"Find a problem somewhere in Wasabi-land",-1),M={href:"https://github.com/WalletWasabi/walletwasabi/issues",target:"_blank",rel:"noopener noreferrer"},H=e("strong",null,"Do work to fix that problem.",-1),Y={href:"https://github.com/WalletWasabi/WalletWasabi/pulls?q=is%3Apr+is%3Aopen+sort%3Aupdated-desc",target:"_blank",rel:"noopener noreferrer"},B={href:"https://github.com/WalletWasabi/WasabiDoc/pulls",target:"_blank",rel:"noopener noreferrer"},I={href:"https://github.com/WalletWasabi/walletwasabi/issues?q=is%3Aissue+is%3Aopen+sort%3Aupdated-desc",target:"_blank",rel:"noopener noreferrer"},L=e("li",null,[e("strong",null,"Request that others review your work."),t(" The best way to do this is by writing good commit comments and pull request/issue descriptions that clearly explain the problem your work is intended to solve, why it’s important, and why you fixed it the way you did. Make it as easy as possible for others to review your work. Make it a "),e("em",null,"pleasure"),t(" for others to review your work.")],-1),R=e("li",null,[e("strong",null,"Incorporate review feedback"),t(" you get until your fix gets merged or is otherwise accepted.")],-1),j=e("li",null,"Repeat steps 1–4.",-1),G=e("p",null,[t("Remember: "),e("em",null,"every contributor"),t(" is free to work on what they want, including maintainers who may or may not want to review and merge your pull request if they don't have any prior context for it, or reason to believe it's worth spending their time on.")],-1),O=e("div",{class:"custom-container tip"},[e("p",{class:"custom-container-title"},"Reviews are for everybody!"),e("p",null,"If you want to be really popular around here, don’t just submit your own work, but also spend time reviewing the work of others.")],-1);function Q(V,D){const i=r("router-link"),n=r("ExternalLinkIcon"),l=r("RouteLink");return h(),c("div",null,[b,w,p,g,e("nav",f,[e("ul",null,[e("li",null,[o(i,{to:"#who-is-a-contributor"},{default:a(()=>[t("Who is a contributor?")]),_:1})]),e("li",null,[o(i,{to:"#say-hello-and-get-started"},{default:a(()=>[t("Say hello and get started")]),_:1})]),e("li",null,[o(i,{to:"#learn-how-wasabikas-work"},{default:a(()=>[t("Learn how Wasabikas work")]),_:1})]),e("li",null,[o(i,{to:"#what-to-work-on"},{default:a(()=>[t("What to work on")]),_:1}),e("ul",null,[e("li",null,[o(i,{to:"#education-contributor"},{default:a(()=>[t("Education Contributor")]),_:1})]),e("li",null,[o(i,{to:"#github-contributor"},{default:a(()=>[t("GitHub Contributor")]),_:1})])])])])]),k,e("ul",null,[e("li",null,[t("Join our "),e("a",m,[t("Slack"),o(n)]),t(" and especially check out our "),e("a",y,[t("GitHub repository"),o(n)]),t(".")]),_,v]),W,e("ul",null,[e("li",null,[t("Educate yourself about the software by reading through "),o(l,{to:"/using-wasabi/"},{default:a(()=>[t("Using Wasabi")]),_:1}),t(".")]),e("li",null,[t("To understand how Wasabi CoinJoins work, read "),e("a",C,[t("WabiSabi Framework"),o(n)]),t(".")]),e("li",null,[t("Familiarize yourself with "),e("a",x,[t("C4: The Collective Code Construction Contract"),o(n)]),t(".")])]),T,N,z,e("p",null,[t("The more Wasabi users there are, the better their privacy, because "),e("a",q,[t("anonymity loves company"),o(n)]),t(".")]),e("p",null,[t("The better UX and privacy Wasabi provides, the more there will be users, because of "),e("a",E,[t("network effect"),o(n)]),t(".")]),S,e("ol",null,[e("li",null,[A,t(" that (a) needs fixing or improvement and (b) is a match for your skills and interests. Browse "),e("a",M,[t("open issues"),o(n)]),t(" and ask around about what other contributors think needs fixing. Because while you don’t need anybody’s permission and you can work on whatever you want, you’ll want to know up front whether anybody else is going to care about the work you do.")]),e("li",null,[H,t(" Submit your fix for review with a pull request (for "),e("a",Y,[t("code"),o(n)]),t(" and "),e("a",B,[t("documentation"),o(n)]),t(" changes) or with a GitHub "),e("a",I,[t("issue"),o(n)]),t(" (for everything else).")]),L,R,j]),G,O])}const Z=u(d,[["render",Q],["__file","ContributionChecklist.html.vue"]]),J=JSON.parse('{"path":"/building-wasabi/ContributionChecklist.html","title":"Contribution Checklist","lang":"en-US","frontmatter":{"title":"Contribution Checklist","description":"A collection of tips for new Wasabikas who are interested in supporting Wasabi Wallet. Here you find all the details to enable a swift start to your contribution. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Who is a contributor?","slug":"who-is-a-contributor","link":"#who-is-a-contributor","children":[]},{"level":2,"title":"Say hello and get started","slug":"say-hello-and-get-started","link":"#say-hello-and-get-started","children":[]},{"level":2,"title":"Learn how Wasabikas work","slug":"learn-how-wasabikas-work","link":"#learn-how-wasabikas-work","children":[]},{"level":2,"title":"What to work on","slug":"what-to-work-on","link":"#what-to-work-on","children":[{"level":3,"title":"Education Contributor","slug":"education-contributor","link":"#education-contributor","children":[]},{"level":3,"title":"GitHub Contributor","slug":"github-contributor","link":"#github-contributor","children":[]}]}],"git":{"updatedTime":1720425980000},"filePathRelative":"building-wasabi/ContributionChecklist.md"}');export{Z as comp,J as data}; diff --git a/assets/Daemon.html-C329pe91.js b/assets/Daemon.html-I1RPJ_3x.js similarity index 98% rename from assets/Daemon.html-C329pe91.js rename to assets/Daemon.html-I1RPJ_3x.js index 7547649a7..e372ecdeb 100644 --- a/assets/Daemon.html-C329pe91.js +++ b/assets/Daemon.html-I1RPJ_3x.js @@ -1,4 +1,4 @@ -import{_ as r,r as i,o as d,c,a as e,d as n,w as s,b as a,e as p}from"./app-3S7gIoGc.js";const u={},h=e("h1",{id:"headless-wasabi-daemon",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#headless-wasabi-daemon"},[e("span",null,"Headless Wasabi Daemon")])],-1),m={class:"table-of-contents"},b=e("h2",{id:"introduction",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#introduction"},[e("span",null,"Introduction")])],-1),g={href:"https://github.com/WalletWasabi/WalletWasabi/releases/tag/v2.0.4",target:"_blank",rel:"noopener noreferrer"},v=e("p",null,"The desktop app (GUI) is built on top of the daemon. Meaning that command line arguments/variables can also be used to configure the desktop app.",-1),f=p(`

    How to run

    If the package is installed

    Depending on your operating system, open the command line and execute:

    Linux

    wassabeed
    +import{_ as r,r as i,o as d,c,a as e,d as n,w as s,b as a,e as p}from"./app-CwImt2bI.js";const u={},h=e("h1",{id:"headless-wasabi-daemon",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#headless-wasabi-daemon"},[e("span",null,"Headless Wasabi Daemon")])],-1),m={class:"table-of-contents"},b=e("h2",{id:"introduction",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#introduction"},[e("span",null,"Introduction")])],-1),g={href:"https://github.com/WalletWasabi/WalletWasabi/releases/tag/v2.0.4",target:"_blank",rel:"noopener noreferrer"},v=e("p",null,"The desktop app (GUI) is built on top of the daemon. Meaning that command line arguments/variables can also be used to configure the desktop app.",-1),f=p(`

    How to run

    If the package is installed

    Depending on your operating system, open the command line and execute:

    Linux

    wassabeed
     

    macOS

    cd /Applications/Wasabi\\ Wallet.app/Contents/MacOs
     ./wassabeed
     

    Windows

    cd C:\\Program Files\\WasabiWallet
    @@ -9,4 +9,4 @@ wassabeed
     

    Run Wasabi and open two wallets: AliceWallet and BobWallet

    $ wassabeed --wallet=AliceWallet --wallet=BobWallet
     

    Check the Wasabi Daemon version

    $ wassabeed --version
     Wasabi Daemon 2.0.8.1
    -
    `,21);function k(w,_){const t=i("router-link"),l=i("RouteLink"),o=i("ExternalLinkIcon");return d(),c("div",null,[h,e("nav",m,[e("ul",null,[e("li",null,[n(t,{to:"#introduction"},{default:s(()=>[a("Introduction")]),_:1})]),e("li",null,[n(t,{to:"#how-to-run"},{default:s(()=>[a("How to run")]),_:1}),e("ul",null,[e("li",null,[n(t,{to:"#if-the-package-is-installed"},{default:s(()=>[a("If the package is installed")]),_:1})]),e("li",null,[n(t,{to:"#if-building-from-source-code"},{default:s(()=>[a("If building from source code")]),_:1})])])]),e("li",null,[n(t,{to:"#examples"},{default:s(()=>[a("Examples")]),_:1})])])]),b,e("p",null,[a("The default of how to interact with your Wasabi wallet is the graphical user interface (GUI). There is also a headless daemon where you do not run a resource-intensive GUI, but only the command line interface. Running the daemon minimizes the usage of resources (CPU, GPU, Memory, Bandwidth) with the goal of making it more suitable for running all the time in the background. The "),n(l,{to:"/using-wasabi/RPC.html"},{default:s(()=>[a("RPC interface")]),_:1}),a(" can be used to interact with the Daemon.")]),e("p",null,[a("The daemon is included in the package starting from Wasabi version "),e("a",g,[a("2.0.4"),n(o)]),a(" and can be launched using the command line.")]),v,e("p",null,[a("The available startup parameters can be found at the "),n(l,{to:"/using-wasabi/StartupParameters.html"},{default:s(()=>[a("Starting Wasabi with parameters")]),_:1}),a(" pillar.")]),f])}const W=r(u,[["render",k],["__file","Daemon.html.vue"]]),I=JSON.parse('{"path":"/using-wasabi/Daemon.html","title":"Headless Wasabi Daemon","lang":"en-US","frontmatter":{"title":"Headless Wasabi Daemon","description":"A guide on how to use the light weight headless Wasabi daemon. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Introduction","slug":"introduction","link":"#introduction","children":[]},{"level":2,"title":"How to run","slug":"how-to-run","link":"#how-to-run","children":[{"level":3,"title":"If the package is installed","slug":"if-the-package-is-installed","link":"#if-the-package-is-installed","children":[]},{"level":3,"title":"If building from source code","slug":"if-building-from-source-code","link":"#if-building-from-source-code","children":[]}]},{"level":2,"title":"Examples","slug":"examples","link":"#examples","children":[]}],"git":{"updatedTime":1720425186000},"filePathRelative":"using-wasabi/Daemon.md"}');export{W as comp,I as data}; +
    `,21);function k(w,_){const t=i("router-link"),l=i("RouteLink"),o=i("ExternalLinkIcon");return d(),c("div",null,[h,e("nav",m,[e("ul",null,[e("li",null,[n(t,{to:"#introduction"},{default:s(()=>[a("Introduction")]),_:1})]),e("li",null,[n(t,{to:"#how-to-run"},{default:s(()=>[a("How to run")]),_:1}),e("ul",null,[e("li",null,[n(t,{to:"#if-the-package-is-installed"},{default:s(()=>[a("If the package is installed")]),_:1})]),e("li",null,[n(t,{to:"#if-building-from-source-code"},{default:s(()=>[a("If building from source code")]),_:1})])])]),e("li",null,[n(t,{to:"#examples"},{default:s(()=>[a("Examples")]),_:1})])])]),b,e("p",null,[a("The default of how to interact with your Wasabi wallet is the graphical user interface (GUI). There is also a headless daemon where you do not run a resource-intensive GUI, but only the command line interface. Running the daemon minimizes the usage of resources (CPU, GPU, Memory, Bandwidth) with the goal of making it more suitable for running all the time in the background. The "),n(l,{to:"/using-wasabi/RPC.html"},{default:s(()=>[a("RPC interface")]),_:1}),a(" can be used to interact with the Daemon.")]),e("p",null,[a("The daemon is included in the package starting from Wasabi version "),e("a",g,[a("2.0.4"),n(o)]),a(" and can be launched using the command line.")]),v,e("p",null,[a("The available startup parameters can be found at the "),n(l,{to:"/using-wasabi/StartupParameters.html"},{default:s(()=>[a("Starting Wasabi with parameters")]),_:1}),a(" pillar.")]),f])}const W=r(u,[["render",k],["__file","Daemon.html.vue"]]),I=JSON.parse('{"path":"/using-wasabi/Daemon.html","title":"Headless Wasabi Daemon","lang":"en-US","frontmatter":{"title":"Headless Wasabi Daemon","description":"A guide on how to use the light weight headless Wasabi daemon. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Introduction","slug":"introduction","link":"#introduction","children":[]},{"level":2,"title":"How to run","slug":"how-to-run","link":"#how-to-run","children":[{"level":3,"title":"If the package is installed","slug":"if-the-package-is-installed","link":"#if-the-package-is-installed","children":[]},{"level":3,"title":"If building from source code","slug":"if-building-from-source-code","link":"#if-building-from-source-code","children":[]}]},{"level":2,"title":"Examples","slug":"examples","link":"#examples","children":[]}],"git":{"updatedTime":1720425980000},"filePathRelative":"using-wasabi/Daemon.md"}');export{W as comp,I as data}; diff --git a/assets/DeterministicBuild.html-jKw4SlJ8.js b/assets/DeterministicBuild.html-RoLg3UQY.js similarity index 89% rename from assets/DeterministicBuild.html-jKw4SlJ8.js rename to assets/DeterministicBuild.html-RoLg3UQY.js index 430abb397..377944d38 100644 --- a/assets/DeterministicBuild.html-jKw4SlJ8.js +++ b/assets/DeterministicBuild.html-RoLg3UQY.js @@ -1 +1 @@ -import{_ as a,r as n,o as s,c as o,a as e,b as t,d as r}from"./app-3S7gIoGc.js";const c={},l=e("h1",{id:"deterministic-build",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#deterministic-build"},[e("span",null,"Deterministic Build")])],-1),d={href:"https://github.com/WalletWasabi/WalletWasabi/blob/master/WalletWasabi.Documentation/Guides/DeterministicBuildGuide.md",target:"_blank",rel:"noopener noreferrer"};function u(m,h){const i=n("ExternalLinkIcon");return s(),o("div",null,[l,e("p",null,[t("The guide for the deterministic builds can be found in the "),e("a",d,[t("WalletWasabi repository"),r(i)]),t(".")])])}const b=a(c,[["render",u],["__file","DeterministicBuild.html.vue"]]),_=JSON.parse('{"path":"/using-wasabi/DeterministicBuild.html","title":"Deterministic Build","lang":"en-US","frontmatter":{"title":"Deterministic Build","description":"A step by step guide on how to reproduce the deterministic builds of Wasabi. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[],"git":{"updatedTime":1720425186000},"filePathRelative":"using-wasabi/DeterministicBuild.md"}');export{b as comp,_ as data}; +import{_ as a,r as n,o as s,c as o,a as e,b as t,d as r}from"./app-CwImt2bI.js";const c={},l=e("h1",{id:"deterministic-build",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#deterministic-build"},[e("span",null,"Deterministic Build")])],-1),d={href:"https://github.com/WalletWasabi/WalletWasabi/blob/master/WalletWasabi.Documentation/Guides/DeterministicBuildGuide.md",target:"_blank",rel:"noopener noreferrer"};function u(m,h){const i=n("ExternalLinkIcon");return s(),o("div",null,[l,e("p",null,[t("The guide for the deterministic builds can be found in the "),e("a",d,[t("WalletWasabi repository"),r(i)]),t(".")])])}const b=a(c,[["render",u],["__file","DeterministicBuild.html.vue"]]),_=JSON.parse('{"path":"/using-wasabi/DeterministicBuild.html","title":"Deterministic Build","lang":"en-US","frontmatter":{"title":"Deterministic Build","description":"A step by step guide on how to reproduce the deterministic builds of Wasabi. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[],"git":{"updatedTime":1720425980000},"filePathRelative":"using-wasabi/DeterministicBuild.md"}');export{b as comp,_ as data}; diff --git a/assets/DiscreetMode.html-FvOse1pm.js b/assets/DiscreetMode.html-tr5KQw1O.js similarity index 96% rename from assets/DiscreetMode.html-FvOse1pm.js rename to assets/DiscreetMode.html-tr5KQw1O.js index c7f7c8ffa..ee52ba926 100644 --- a/assets/DiscreetMode.html-FvOse1pm.js +++ b/assets/DiscreetMode.html-tr5KQw1O.js @@ -1 +1 @@ -import{_ as r}from"./DiscreetModeActivate-Cg4X--AC.js";import{_ as c,r as a,o as l,c as d,a as e,d as o,w as s,b as t,e as h}from"./app-3S7gIoGc.js";const m="/WalletDiscreetModeActive.png",u="/DiscreetModeDeactivate.png",_={},f=e("h1",{id:"discreet-mode",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#discreet-mode"},[e("span",null,"Discreet Mode")])],-1),p=e("p",null,"Discreet Mode is a Wasabi Wallet feature that hides sensitive and critical information from physical observers and allows you to post screenshots without worrying about your privacy.",-1),v=e("p",null,[e("img",{src:m,alt:"Wasabi Wallet Discreet Mode",title:"Wasabi Wallet Discreet Mode"})],-1),b={class:"table-of-contents"},w=h('

    How to activate/deactivate Discreet Mode

    You can activate or deactivate by clicking the Discreet Mode icon in the bottom left corner of the main view.

    Enable Discreet Mode in Wasabi Wallet

    Disable Discreet Mode in Wasabi Wallet

    More information on Discreet Mode

    ',6),D=e("li",null,"In Discreet Mode the wallet is still usable, meaning that you can send and receive payments, as well as coinjoin.",-1),M=e("li",null,"Discreet Mode only masks the surface. This means that when you click to see more Details, some information (which wasn't visible at first) will be shown.",-1),g=e("li",null,"When hovering over the ### chars with the cursor, the content will be visible for a short amount of time.",-1),W={href:"https://github.com/WalletWasabi/WalletWasabi/issues/2234",target:"_blank",rel:"noopener noreferrer"};function k(y,x){const i=a("router-link"),n=a("ExternalLinkIcon");return l(),d("div",null,[f,p,v,e("nav",b,[e("ul",null,[e("li",null,[o(i,{to:"#how-to-activate-deactivate-discreet-mode"},{default:s(()=>[t("How to activate/deactivate Discreet Mode")]),_:1})]),e("li",null,[o(i,{to:"#more-information-on-discreet-mode"},{default:s(()=>[t("More information on Discreet Mode")]),_:1})])])]),w,e("ul",null,[D,M,g,e("li",null,[t("Some justification of design decisions can be seen "),e("a",W,[t("here"),o(n)]),t(".")])])])}const B=c(_,[["render",k],["__file","DiscreetMode.html.vue"]]),S=JSON.parse('{"path":"/using-wasabi/DiscreetMode.html","title":"Discreet Mode","lang":"en-US","frontmatter":{"title":"Discreet Mode","description":"A feature that hides sensitive and critical information from physical observers. Designed to allow the user to post screenshots without having to worry about leaking private details of their wallet. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"How to activate/deactivate Discreet Mode","slug":"how-to-activate-deactivate-discreet-mode","link":"#how-to-activate-deactivate-discreet-mode","children":[]},{"level":2,"title":"More information on Discreet Mode","slug":"more-information-on-discreet-mode","link":"#more-information-on-discreet-mode","children":[]}],"git":{"updatedTime":1720425186000},"filePathRelative":"using-wasabi/DiscreetMode.md"}');export{B as comp,S as data}; +import{_ as r}from"./DiscreetModeActivate-Cg4X--AC.js";import{_ as c,r as a,o as l,c as d,a as e,d as o,w as s,b as t,e as h}from"./app-CwImt2bI.js";const m="/WalletDiscreetModeActive.png",u="/DiscreetModeDeactivate.png",_={},f=e("h1",{id:"discreet-mode",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#discreet-mode"},[e("span",null,"Discreet Mode")])],-1),p=e("p",null,"Discreet Mode is a Wasabi Wallet feature that hides sensitive and critical information from physical observers and allows you to post screenshots without worrying about your privacy.",-1),v=e("p",null,[e("img",{src:m,alt:"Wasabi Wallet Discreet Mode",title:"Wasabi Wallet Discreet Mode"})],-1),b={class:"table-of-contents"},w=h('

    How to activate/deactivate Discreet Mode

    You can activate or deactivate by clicking the Discreet Mode icon in the bottom left corner of the main view.

    Enable Discreet Mode in Wasabi Wallet

    Disable Discreet Mode in Wasabi Wallet

    More information on Discreet Mode

    ',6),D=e("li",null,"In Discreet Mode the wallet is still usable, meaning that you can send and receive payments, as well as coinjoin.",-1),M=e("li",null,"Discreet Mode only masks the surface. This means that when you click to see more Details, some information (which wasn't visible at first) will be shown.",-1),g=e("li",null,"When hovering over the ### chars with the cursor, the content will be visible for a short amount of time.",-1),W={href:"https://github.com/WalletWasabi/WalletWasabi/issues/2234",target:"_blank",rel:"noopener noreferrer"};function k(y,x){const i=a("router-link"),n=a("ExternalLinkIcon");return l(),d("div",null,[f,p,v,e("nav",b,[e("ul",null,[e("li",null,[o(i,{to:"#how-to-activate-deactivate-discreet-mode"},{default:s(()=>[t("How to activate/deactivate Discreet Mode")]),_:1})]),e("li",null,[o(i,{to:"#more-information-on-discreet-mode"},{default:s(()=>[t("More information on Discreet Mode")]),_:1})])])]),w,e("ul",null,[D,M,g,e("li",null,[t("Some justification of design decisions can be seen "),e("a",W,[t("here"),o(n)]),t(".")])])])}const B=c(_,[["render",k],["__file","DiscreetMode.html.vue"]]),S=JSON.parse('{"path":"/using-wasabi/DiscreetMode.html","title":"Discreet Mode","lang":"en-US","frontmatter":{"title":"Discreet Mode","description":"A feature that hides sensitive and critical information from physical observers. Designed to allow the user to post screenshots without having to worry about leaking private details of their wallet. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"How to activate/deactivate Discreet Mode","slug":"how-to-activate-deactivate-discreet-mode","link":"#how-to-activate-deactivate-discreet-mode","children":[]},{"level":2,"title":"More information on Discreet Mode","slug":"more-information-on-discreet-mode","link":"#more-information-on-discreet-mode","children":[]}],"git":{"updatedTime":1720425980000},"filePathRelative":"using-wasabi/DiscreetMode.md"}');export{B as comp,S as data}; diff --git a/assets/ELI5.html-DfDF-Qvi.js b/assets/ELI5.html-DR7wgsW5.js similarity index 98% rename from assets/ELI5.html-DfDF-Qvi.js rename to assets/ELI5.html-DR7wgsW5.js index c275e254d..4d58ab08f 100644 --- a/assets/ELI5.html-DfDF-Qvi.js +++ b/assets/ELI5.html-DR7wgsW5.js @@ -1 +1 @@ -import{_ as r,r as s,o as c,c as h,a as e,d as i,w as o,b as t,e as u}from"./app-3S7gIoGc.js";const d={},p=e("h1",{id:"explain-wasabi-like-i-m-5",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#explain-wasabi-like-i-m-5"},[e("span",null,"Explain Wasabi like I'm 5")])],-1),w={class:"table-of-contents"},b=e("h2",{id:"introduction",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#introduction"},[e("span",null,"Introduction")])],-1),y=e("p",null,"Wasabi Wallet is an open-source, non-custodial, privacy-focused Bitcoin wallet with built-in coinjoins. It is a piece of software that runs on your computer and helps you to manage your bitcoins. Although Wasabi has some very advanced magic under the hood, it is rather easy to use. You can generate a new set of seed words, or import already existing ones. With Wasabi you can receive bitcoins into your full control, and you can send them to someone else without needing permission from any other person or entity. There is also a powerful auto-coinjoin feature to help obfuscate your transaction history. You can use Wasabi to manage your hardware wallet, and it even connects to your own full node. Of course, Wasabi is libre and open-source, which means you have full control over the software you manage your money with.",-1),g=e("h2",{id:"installing-wasabi",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#installing-wasabi"},[e("span",null,"Installing Wasabi")])],-1),f={href:"https://wasabiwallet.io",target:"_blank",rel:"noopener noreferrer"},m=e("h2",{id:"generating-a-wallet",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#generating-a-wallet"},[e("span",null,"Generating a Wallet")])],-1),v=e("p",null,"When you start Wasabi for the first time, the dialog to generate a new wallet will be open. You can set a unique name for the wallet so that you remember what it is for. In the next step, Wasabi will show your 12 recovery words. These must be carefully backed up, in the correct order, as they are needed to recover your wallet (together with the passphrase) on another computer or in another wallet software. Next, choose a very secure passphrase, as this encrypts the secrets, and should not be guessed by others. You will always need this passphrase in order to spend your bitcoins, so take great care to back it up properly. Make sure you store the backup of your recovery words in a different location than the backup of your passphrase.",-1),_=e("div",{class:"custom-container warning"},[e("p",{class:"custom-container-title"},"Backup both!"),e("p",null,"If you ever need to restore your wallet in Wasabi, or any other wallet, you will need both: your passphrase AND your 12 recovery words.")],-1),k=e("h2",{id:"receiving-bitcoin",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#receiving-bitcoin"},[e("span",null,"Receiving bitcoin")])],-1),W=e("p",null,[t("In order to receive bitcoin, you need to generate an address in the "),e("code",null,"Receive"),t(" dialog. But first, you must label it with the names of any observers who know that this address is yours. For example, if Alice pays you back for last nights pizza, then the label is "),e("code",null,"Alice"),t(". This is an important feature for you and the wallet to know which coin is from whom, and it will help with your privacy in the future. Once this newly generated address receives some coins, Wasabi Wallet will automatically hide this used address, so you don't reuse it by accident.")],-1),x=u('

    Sending bitcoin

    Sending process is different depending on the privacy of coins you have. Assuming you have enough private coins the sending process is the following:

    1. Click the Send button (top right corner) at the main view.
    2. Insert the address of the receiver and type in the amount the receiver should get, then click Continue.
    3. Enter the name of the person or company receiving the payment and click Continue.
    4. Make sure everything is filled in correctly in Preview Transaction window and click Confirm.
    5. Type in your passphrase and click Continue.

    You will now see a pop-up window telling you that the transaction is broadcasted to the Bitcoin network.

    ',4),I=e("h2",{id:"coinjoin-with-wasabi",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#coinjoin-with-wasabi"},[e("span",null,"Coinjoin with Wasabi")])],-1),j=e("p",null,[t("If you don't like that your employer knows where you spend your money, or that a merchant can find out how much money you have, then you should coinjoin your bitcoin, as this breaks link to its transaction history. Although the coinjoin protocol is a bit complex, it is very easy to use in Wasabi. The wallet automatically coinjoins all your funds, so that your money becomes private. This process might take some time (hours/days). You can still use your wallet in the mean time, however it is a best practice to only use private funds, which the wallet does automatically when possible. At the wallet's homescreen the percentage indicates the progress to making your wallet fully private. The exact available private amount of bitcoin is listed as "),e("code",null,"PRIVATE"),t(".")],-1);function S(E,T){const n=s("router-link"),l=s("ExternalLinkIcon"),a=s("RouteLink");return c(),h("div",null,[p,e("nav",w,[e("ul",null,[e("li",null,[i(n,{to:"#introduction"},{default:o(()=>[t("Introduction")]),_:1})]),e("li",null,[i(n,{to:"#installing-wasabi"},{default:o(()=>[t("Installing Wasabi")]),_:1})]),e("li",null,[i(n,{to:"#generating-a-wallet"},{default:o(()=>[t("Generating a Wallet")]),_:1})]),e("li",null,[i(n,{to:"#receiving-bitcoin"},{default:o(()=>[t("Receiving bitcoin")]),_:1})]),e("li",null,[i(n,{to:"#sending-bitcoin"},{default:o(()=>[t("Sending bitcoin")]),_:1})]),e("li",null,[i(n,{to:"#coinjoin-with-wasabi"},{default:o(()=>[t("Coinjoin with Wasabi")]),_:1})])])]),b,y,g,e("p",null,[t("Installing Wasabi is super-easy. Go to the official website "),e("a",f,[t("wasabiwallet.io"),i(l)]),t(" and download the version for your operating system. You can then install Wasabi as you would do any other software on your computer.")]),e("p",null,[t("See "),i(a,{to:"/using-wasabi/InstallPackage.html"},{default:o(()=>[t("this chapter")]),_:1}),t(" for a detailed step-by-step tutorial for all operating systems, and also how to verify the PGP signature.")]),m,v,_,e("p",null,[t("See "),i(a,{to:"/using-wasabi/WalletGeneration.html"},{default:o(()=>[t("this chapter")]),_:1}),t(" for more information on how to securely generate your wallet.")]),k,W,e("p",null,[t("See "),i(a,{to:"/using-wasabi/Receive.html"},{default:o(()=>[t("this chapter")]),_:1}),t(" for a tutorial on how to properly label your addresses and receive bitcoin.")]),x,e("p",null,[t("See "),i(a,{to:"/using-wasabi/Send.html"},{default:o(()=>[t("this chapter")]),_:1}),t(" for more details about sending bitcoin and the privacy nuances of it.")]),I,j,e("p",null,[t("See "),i(a,{to:"/using-wasabi/CoinJoin.html"},{default:o(()=>[t("this chapter")]),_:1}),t(" for a thorough analysis of coinjoin, details on the Wasabi implementation and best practices on how to use it properly.")])])}const A=r(d,[["render",S],["__file","ELI5.html.vue"]]),R=JSON.parse(`{"path":"/using-wasabi/ELI5.html","title":"Explain Wasabi like I'm 5","lang":"en-US","frontmatter":{"title":"Explain Wasabi like I'm 5","description":"A very simple explanation of how to install and start Wasabi Wallet, as well as receiving, sending, and coinjoining. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Introduction","slug":"introduction","link":"#introduction","children":[]},{"level":2,"title":"Installing Wasabi","slug":"installing-wasabi","link":"#installing-wasabi","children":[]},{"level":2,"title":"Generating a Wallet","slug":"generating-a-wallet","link":"#generating-a-wallet","children":[]},{"level":2,"title":"Receiving bitcoin","slug":"receiving-bitcoin","link":"#receiving-bitcoin","children":[]},{"level":2,"title":"Sending bitcoin","slug":"sending-bitcoin","link":"#sending-bitcoin","children":[]},{"level":2,"title":"Coinjoin with Wasabi","slug":"coinjoin-with-wasabi","link":"#coinjoin-with-wasabi","children":[]}],"git":{"updatedTime":1720425186000},"filePathRelative":"using-wasabi/ELI5.md"}`);export{A as comp,R as data}; +import{_ as r,r as s,o as c,c as h,a as e,d as i,w as o,b as t,e as u}from"./app-CwImt2bI.js";const d={},p=e("h1",{id:"explain-wasabi-like-i-m-5",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#explain-wasabi-like-i-m-5"},[e("span",null,"Explain Wasabi like I'm 5")])],-1),w={class:"table-of-contents"},b=e("h2",{id:"introduction",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#introduction"},[e("span",null,"Introduction")])],-1),y=e("p",null,"Wasabi Wallet is an open-source, non-custodial, privacy-focused Bitcoin wallet with built-in coinjoins. It is a piece of software that runs on your computer and helps you to manage your bitcoins. Although Wasabi has some very advanced magic under the hood, it is rather easy to use. You can generate a new set of seed words, or import already existing ones. With Wasabi you can receive bitcoins into your full control, and you can send them to someone else without needing permission from any other person or entity. There is also a powerful auto-coinjoin feature to help obfuscate your transaction history. You can use Wasabi to manage your hardware wallet, and it even connects to your own full node. Of course, Wasabi is libre and open-source, which means you have full control over the software you manage your money with.",-1),g=e("h2",{id:"installing-wasabi",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#installing-wasabi"},[e("span",null,"Installing Wasabi")])],-1),f={href:"https://wasabiwallet.io",target:"_blank",rel:"noopener noreferrer"},m=e("h2",{id:"generating-a-wallet",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#generating-a-wallet"},[e("span",null,"Generating a Wallet")])],-1),v=e("p",null,"When you start Wasabi for the first time, the dialog to generate a new wallet will be open. You can set a unique name for the wallet so that you remember what it is for. In the next step, Wasabi will show your 12 recovery words. These must be carefully backed up, in the correct order, as they are needed to recover your wallet (together with the passphrase) on another computer or in another wallet software. Next, choose a very secure passphrase, as this encrypts the secrets, and should not be guessed by others. You will always need this passphrase in order to spend your bitcoins, so take great care to back it up properly. Make sure you store the backup of your recovery words in a different location than the backup of your passphrase.",-1),_=e("div",{class:"custom-container warning"},[e("p",{class:"custom-container-title"},"Backup both!"),e("p",null,"If you ever need to restore your wallet in Wasabi, or any other wallet, you will need both: your passphrase AND your 12 recovery words.")],-1),k=e("h2",{id:"receiving-bitcoin",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#receiving-bitcoin"},[e("span",null,"Receiving bitcoin")])],-1),W=e("p",null,[t("In order to receive bitcoin, you need to generate an address in the "),e("code",null,"Receive"),t(" dialog. But first, you must label it with the names of any observers who know that this address is yours. For example, if Alice pays you back for last nights pizza, then the label is "),e("code",null,"Alice"),t(". This is an important feature for you and the wallet to know which coin is from whom, and it will help with your privacy in the future. Once this newly generated address receives some coins, Wasabi Wallet will automatically hide this used address, so you don't reuse it by accident.")],-1),x=u('

    Sending bitcoin

    Sending process is different depending on the privacy of coins you have. Assuming you have enough private coins the sending process is the following:

    1. Click the Send button (top right corner) at the main view.
    2. Insert the address of the receiver and type in the amount the receiver should get, then click Continue.
    3. Enter the name of the person or company receiving the payment and click Continue.
    4. Make sure everything is filled in correctly in Preview Transaction window and click Confirm.
    5. Type in your passphrase and click Continue.

    You will now see a pop-up window telling you that the transaction is broadcasted to the Bitcoin network.

    ',4),I=e("h2",{id:"coinjoin-with-wasabi",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#coinjoin-with-wasabi"},[e("span",null,"Coinjoin with Wasabi")])],-1),j=e("p",null,[t("If you don't like that your employer knows where you spend your money, or that a merchant can find out how much money you have, then you should coinjoin your bitcoin, as this breaks link to its transaction history. Although the coinjoin protocol is a bit complex, it is very easy to use in Wasabi. The wallet automatically coinjoins all your funds, so that your money becomes private. This process might take some time (hours/days). You can still use your wallet in the mean time, however it is a best practice to only use private funds, which the wallet does automatically when possible. At the wallet's homescreen the percentage indicates the progress to making your wallet fully private. The exact available private amount of bitcoin is listed as "),e("code",null,"PRIVATE"),t(".")],-1);function S(E,T){const n=s("router-link"),l=s("ExternalLinkIcon"),a=s("RouteLink");return c(),h("div",null,[p,e("nav",w,[e("ul",null,[e("li",null,[i(n,{to:"#introduction"},{default:o(()=>[t("Introduction")]),_:1})]),e("li",null,[i(n,{to:"#installing-wasabi"},{default:o(()=>[t("Installing Wasabi")]),_:1})]),e("li",null,[i(n,{to:"#generating-a-wallet"},{default:o(()=>[t("Generating a Wallet")]),_:1})]),e("li",null,[i(n,{to:"#receiving-bitcoin"},{default:o(()=>[t("Receiving bitcoin")]),_:1})]),e("li",null,[i(n,{to:"#sending-bitcoin"},{default:o(()=>[t("Sending bitcoin")]),_:1})]),e("li",null,[i(n,{to:"#coinjoin-with-wasabi"},{default:o(()=>[t("Coinjoin with Wasabi")]),_:1})])])]),b,y,g,e("p",null,[t("Installing Wasabi is super-easy. Go to the official website "),e("a",f,[t("wasabiwallet.io"),i(l)]),t(" and download the version for your operating system. You can then install Wasabi as you would do any other software on your computer.")]),e("p",null,[t("See "),i(a,{to:"/using-wasabi/InstallPackage.html"},{default:o(()=>[t("this chapter")]),_:1}),t(" for a detailed step-by-step tutorial for all operating systems, and also how to verify the PGP signature.")]),m,v,_,e("p",null,[t("See "),i(a,{to:"/using-wasabi/WalletGeneration.html"},{default:o(()=>[t("this chapter")]),_:1}),t(" for more information on how to securely generate your wallet.")]),k,W,e("p",null,[t("See "),i(a,{to:"/using-wasabi/Receive.html"},{default:o(()=>[t("this chapter")]),_:1}),t(" for a tutorial on how to properly label your addresses and receive bitcoin.")]),x,e("p",null,[t("See "),i(a,{to:"/using-wasabi/Send.html"},{default:o(()=>[t("this chapter")]),_:1}),t(" for more details about sending bitcoin and the privacy nuances of it.")]),I,j,e("p",null,[t("See "),i(a,{to:"/using-wasabi/CoinJoin.html"},{default:o(()=>[t("this chapter")]),_:1}),t(" for a thorough analysis of coinjoin, details on the Wasabi implementation and best practices on how to use it properly.")])])}const A=r(d,[["render",S],["__file","ELI5.html.vue"]]),R=JSON.parse(`{"path":"/using-wasabi/ELI5.html","title":"Explain Wasabi like I'm 5","lang":"en-US","frontmatter":{"title":"Explain Wasabi like I'm 5","description":"A very simple explanation of how to install and start Wasabi Wallet, as well as receiving, sending, and coinjoining. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Introduction","slug":"introduction","link":"#introduction","children":[]},{"level":2,"title":"Installing Wasabi","slug":"installing-wasabi","link":"#installing-wasabi","children":[]},{"level":2,"title":"Generating a Wallet","slug":"generating-a-wallet","link":"#generating-a-wallet","children":[]},{"level":2,"title":"Receiving bitcoin","slug":"receiving-bitcoin","link":"#receiving-bitcoin","children":[]},{"level":2,"title":"Sending bitcoin","slug":"sending-bitcoin","link":"#sending-bitcoin","children":[]},{"level":2,"title":"Coinjoin with Wasabi","slug":"coinjoin-with-wasabi","link":"#coinjoin-with-wasabi","children":[]}],"git":{"updatedTime":1720425980000},"filePathRelative":"using-wasabi/ELI5.md"}`);export{A as comp,R as data}; diff --git a/assets/ExternalRestore.html-CRS-Huqd.js b/assets/ExternalRestore.html-DfRPUUKG.js similarity index 96% rename from assets/ExternalRestore.html-CRS-Huqd.js rename to assets/ExternalRestore.html-DfRPUUKG.js index eae29b146..7160b2707 100644 --- a/assets/ExternalRestore.html-CRS-Huqd.js +++ b/assets/ExternalRestore.html-DfRPUUKG.js @@ -1 +1 @@ -import{_ as l,r as o,o as n,c,a as e,b as t,d as s,w as i,e as p}from"./app-3S7gIoGc.js";const d={},h=e("h1",{id:"restoring-wasabi-wallet-in-other-wallets",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#restoring-wasabi-wallet-in-other-wallets"},[e("span",null,"Restoring Wasabi Wallet in Other Wallets")])],-1),u={class:"custom-container danger"},b=e("p",{class:"custom-container-title"},"Potential privacy leak!",-1),m=e("p",null,"If you do not run your own node or your own Electrum server, you will leak all your addresses to random third-party servers, losing anonymity against those entities, so you must make a judgement call by being aware of this.",-1),g={href:"https://github.com/chris-belcher/electrum-personal-server",target:"_blank",rel:"noopener noreferrer"},f={href:"https://github.com/kyuupichan/electrumx",target:"_blank",rel:"noopener noreferrer"},_={href:"https://github.com/romanz/electrs",target:"_blank",rel:"noopener noreferrer"},w={class:"table-of-contents"},y=p('

    Compatibility List for Segwit Addresses (bc1)

    Wasabi uses script type Native SegWit (P2WPKH) and derivation path m/84'/0'/0' to generate Segwit addresses.

    Wallets generated with Wasabi also require a passphrase.

    Here are major wallets you can use to recover a Wasabi Wallet for Segwit addresses:

    For a complete list of compatible wallets, see here: https://walletsrecovery.org

    Compatibility List for Taproot Addresses (bc1p)

    Wasabi uses script type Taproot (P2TR) and derivation path m/86'/0'/0' to generate Taproot addresses.

    Wallets generated with Wasabi also require a passphrase.

    Here is a wallet you can use to recover a Wasabi Wallet for Taproot addresses:

    ',11);function W(v,k){const a=o("ExternalLinkIcon"),r=o("router-link");return n(),c("div",null,[h,e("div",u,[b,m,e("p",null,[t("You should set up Tor on Network preferences, connect to your own node or install your own Electrum server (if the wallet supports it) via "),e("a",g,[t("Electrum Personal Server"),s(a)]),t(", "),e("a",f,[t("ElectrumX"),s(a)]),t(" or "),e("a",_,[t("Electrs"),s(a)]),t(".")])]),e("nav",w,[e("ul",null,[e("li",null,[s(r,{to:"#compatibility-list-for-segwit-addresses-bc1"},{default:i(()=>[t("Compatibility List for Segwit Addresses (bc1)")]),_:1})]),e("li",null,[s(r,{to:"#compatibility-list-for-taproot-addresses-bc1p"},{default:i(()=>[t("Compatibility List for Taproot Addresses (bc1p)")]),_:1})])])]),y])}const S=l(d,[["render",W],["__file","ExternalRestore.html.vue"]]),E=JSON.parse('{"path":"/using-wasabi/ExternalRestore.html","title":"Restoring Wasabi Wallet in Other Wallets","lang":"en-US","frontmatter":{"title":"Restoring Wasabi Wallet in Other Wallets","description":"A detailed compatibility list to restore Wasabi Wallet in other wallets. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Compatibility List for Segwit Addresses (bc1)","slug":"compatibility-list-for-segwit-addresses-bc1","link":"#compatibility-list-for-segwit-addresses-bc1","children":[]},{"level":2,"title":"Compatibility List for Taproot Addresses (bc1p)","slug":"compatibility-list-for-taproot-addresses-bc1p","link":"#compatibility-list-for-taproot-addresses-bc1p","children":[]}],"git":{"updatedTime":1720425186000},"filePathRelative":"using-wasabi/ExternalRestore.md"}');export{S as comp,E as data}; +import{_ as l,r as o,o as n,c,a as e,b as t,d as s,w as i,e as p}from"./app-CwImt2bI.js";const d={},h=e("h1",{id:"restoring-wasabi-wallet-in-other-wallets",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#restoring-wasabi-wallet-in-other-wallets"},[e("span",null,"Restoring Wasabi Wallet in Other Wallets")])],-1),u={class:"custom-container danger"},b=e("p",{class:"custom-container-title"},"Potential privacy leak!",-1),m=e("p",null,"If you do not run your own node or your own Electrum server, you will leak all your addresses to random third-party servers, losing anonymity against those entities, so you must make a judgement call by being aware of this.",-1),g={href:"https://github.com/chris-belcher/electrum-personal-server",target:"_blank",rel:"noopener noreferrer"},f={href:"https://github.com/kyuupichan/electrumx",target:"_blank",rel:"noopener noreferrer"},_={href:"https://github.com/romanz/electrs",target:"_blank",rel:"noopener noreferrer"},w={class:"table-of-contents"},y=p('

    Compatibility List for Segwit Addresses (bc1)

    Wasabi uses script type Native SegWit (P2WPKH) and derivation path m/84'/0'/0' to generate Segwit addresses.

    Wallets generated with Wasabi also require a passphrase.

    Here are major wallets you can use to recover a Wasabi Wallet for Segwit addresses:

    For a complete list of compatible wallets, see here: https://walletsrecovery.org

    Compatibility List for Taproot Addresses (bc1p)

    Wasabi uses script type Taproot (P2TR) and derivation path m/86'/0'/0' to generate Taproot addresses.

    Wallets generated with Wasabi also require a passphrase.

    Here is a wallet you can use to recover a Wasabi Wallet for Taproot addresses:

    ',11);function W(v,k){const a=o("ExternalLinkIcon"),r=o("router-link");return n(),c("div",null,[h,e("div",u,[b,m,e("p",null,[t("You should set up Tor on Network preferences, connect to your own node or install your own Electrum server (if the wallet supports it) via "),e("a",g,[t("Electrum Personal Server"),s(a)]),t(", "),e("a",f,[t("ElectrumX"),s(a)]),t(" or "),e("a",_,[t("Electrs"),s(a)]),t(".")])]),e("nav",w,[e("ul",null,[e("li",null,[s(r,{to:"#compatibility-list-for-segwit-addresses-bc1"},{default:i(()=>[t("Compatibility List for Segwit Addresses (bc1)")]),_:1})]),e("li",null,[s(r,{to:"#compatibility-list-for-taproot-addresses-bc1p"},{default:i(()=>[t("Compatibility List for Taproot Addresses (bc1p)")]),_:1})])])]),y])}const S=l(d,[["render",W],["__file","ExternalRestore.html.vue"]]),E=JSON.parse('{"path":"/using-wasabi/ExternalRestore.html","title":"Restoring Wasabi Wallet in Other Wallets","lang":"en-US","frontmatter":{"title":"Restoring Wasabi Wallet in Other Wallets","description":"A detailed compatibility list to restore Wasabi Wallet in other wallets. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Compatibility List for Segwit Addresses (bc1)","slug":"compatibility-list-for-segwit-addresses-bc1","link":"#compatibility-list-for-segwit-addresses-bc1","children":[]},{"level":2,"title":"Compatibility List for Taproot Addresses (bc1p)","slug":"compatibility-list-for-taproot-addresses-bc1p","link":"#compatibility-list-for-taproot-addresses-bc1p","children":[]}],"git":{"updatedTime":1720425980000},"filePathRelative":"using-wasabi/ExternalRestore.md"}');export{S as comp,E as data}; diff --git a/assets/FAQ-Contribution.html-CJS80rgG.js b/assets/FAQ-Contribution.html-BuaDVOGH.js similarity index 98% rename from assets/FAQ-Contribution.html-CJS80rgG.js rename to assets/FAQ-Contribution.html-BuaDVOGH.js index 90c293d14..f284f07b5 100644 --- a/assets/FAQ-Contribution.html-CJS80rgG.js +++ b/assets/FAQ-Contribution.html-BuaDVOGH.js @@ -1 +1 @@ -import{_ as i,r as s,o as r,c as l,a as e,b as t,d as a,w as h,e as u}from"./app-3S7gIoGc.js";const c={},d=u('

    Contributions to Wasabi

    How to donate to Wasabi Wallet?

    Donations can be made to individual contributors and are highly appreciated.

    You can become a Wasabika

    How should I start contributing to Wasabi?

    ',5),p={href:"https://join.slack.com/t/tumblebit/shared_invite/enQtNjQ1MTQ2NzQ1ODI0LWIzOTg5YTM3YmNkOTg1NjZmZTQ3NmM1OTAzYmQyYzk1M2M0MTdlZDk2OTQwNzFiNTg1ZmExNzM0NjgzY2M0Yzg",target:"_blank",rel:"noopener noreferrer"},b={href:"https://github.com/WalletWasabi/WalletWasabi",target:"_blank",rel:"noopener noreferrer"},f=e("h3",{id:"is-there-a-bounty-program",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#is-there-a-bounty-program"},[e("span",null,"Is there a bounty program?")])],-1),w={href:"https://zksnacks.com",target:"_blank",rel:"noopener noreferrer"},g=e("h3",{id:"how-can-i-report-a-bug",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-can-i-report-a-bug"},[e("span",null,"How can I report a bug?")])],-1),m=e("p",null,"Code is speech, and can never be perfect. Thus it is expected that there are many known and unknown bugs, quirks and issues in Wasabi. Such a complex software requires constant and rigorous review by the developers and the users, this is everyone's responsibility working with Wasabi.",-1),y={href:"https://github.com/WalletWasabi/WalletWasabi/issues/",target:"_blank",rel:"noopener noreferrer"},_={href:"https://github.com/WalletWasabi/WalletWasabi/pulls",target:"_blank",rel:"noopener noreferrer"},k={href:"https://github.com/WalletWasabi/WalletWasabi/issues/new?template=bug-report.md",target:"_blank",rel:"noopener noreferrer"},W={class:"custom-container danger"},v=e("p",{class:"custom-container-title"},"DANGER",-1),I=e("a",{href:"mailto:adam.ficsor73@gmail.com"},"adam.ficsor73@gmail.com",-1),x={href:"https://github.com/WalletWasabi/WalletWasabi/blob/master/SECURITY.md",target:"_blank",rel:"noopener noreferrer"},T=e("h3",{id:"how-can-i-request-a-feature",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-can-i-request-a-feature"},[e("span",null,"How can I request a feature?")])],-1),q=e("p",null,"Wasabi is a quite beautiful piece of software already. Yet there are also 1001 things that could be just a little better, or even quite substantially superior. The beauty and bane of libre and open-source software is that it is never complete, there is always more work to be done.",-1),C={href:"https://github.com/WalletWasabi/WalletWasabi/issues/",target:"_blank",rel:"noopener noreferrer"},j={href:"https://github.com/WalletWasabi/WalletWasabi/pulls",target:"_blank",rel:"noopener noreferrer"},N={href:"https://github.com/WalletWasabi/WalletWasabi/issues/new?template=feature-request.md",target:"_blank",rel:"noopener noreferrer"},Y=e("h3",{id:"how-can-i-get-help-and-support",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-can-i-get-help-and-support"},[e("span",null,"How can I get help and support?")])],-1),Q={href:"https://docs.wasabiwallet.io",target:"_blank",rel:"noopener noreferrer"},A={href:"https://github.com/WalletWasabi/WalletWasabi/discussions/5185",target:"_blank",rel:"noopener noreferrer"},H={href:"https://github.com/WalletWasabi/WalletWasabi/issues/",target:"_blank",rel:"noopener noreferrer"},z=e("h3",{id:"what-does-the-wasabi-project-need-help-with",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-does-the-wasabi-project-need-help-with"},[e("span",null,"What does the Wasabi project need help with?")])],-1),F=e("p",null,"Wasabi is libre and open-source software, thus it relies on the support of several contributors on all fronts. Of course, this includes coding new features, bug fixes and stability improvements. Yet just equally important is the review of the commits of all other Wasabikas. It's not just the contributions to the code, but also to the documentation and the effort to educate peers using Wasabi. This includes education in meatspace tribe gatherings, but also in cyberspace peer support. So basically, we need help with building and shilling Wasabi!",-1);function E(S,B){const n=s("RouteLink"),o=s("ExternalLinkIcon");return r(),l("div",null,[d,e("p",null,[t("Thank you for considering to support this beautiful libre and open-source project! It is the responsibility of everyone using the software to contribute to its growth. Your help is deeply appreciated, and very much needed! First please read the "),a(n,{to:"/building-wasabi/ContributionChecklist.html"},{default:h(()=>[t("contribution checklist")]),_:1}),t(" to get introduced to the project and to start out in the right direction. Join our "),e("a",p,[t("Slack"),a(o)]),t(" and check out our "),e("a",b,[t("GitHub repository"),a(o)]),t(", so that you can stay up-to-date with the latest contributions.")]),f,e("p",null,[t("Yes! The beauty of Wasabi is that it's not just a very awesome wallet by default, but it has the additional opt-in CoinJoin service. This is provided by "),e("a",w,[t("zkSNACKs Ltd."),a(o)]),t(", and in exchange for this service, the user pays a coordination fee. In return, zkSNACKs is supporting several developers to dedicate their full time to contribute to this open-source project. There are also contribution games where a bounty is paid out to any contributor worthy the prize.")]),g,m,e("p",null,[t("When you stumble upon an issue that needs fixing, please first check the open "),e("a",y,[t("issues"),a(o)]),t(" and "),e("a",_,[t("pull requests"),a(o)]),t(" if there is already someone working on it. If yes, then you can comment your situation and bug report under the open issue. If no, then please consider to "),e("a",k,[t("open a new issue"),a(o)]),t(" and give a detailed report on the problem. It is especially helpful when you provide a step-by-step guide on how to reproduce what you have found. There is constantly a lot of work done to the code base, thus it's good to know which version of Wasabi, and what operating system you are using. In some cases it might be useful to see your logs, though please consider your privacy and encrypt this data properly in direct communication with the developers.")]),e("div",W,[v,e("p",null,[t("If you find a bug that puts users' privacy or security at serious risk, please take great care with responsible disclosure! Send an email to "),I,t(", preferably using PGP encryption "),e("a",x,[t("21D7 CA45 565D BCCE BE45 115D B4B7 2266 C47E 075E"),a(o)]),t(".")])]),T,q,e("p",null,[t("Regardless if you are a new user of Wasabi, or a veteran black belt Wasabika, any suggestions on how to improve are very welcome. Please first check the existing "),e("a",C,[t("issues"),a(o)]),t(" and "),e("a",j,[t("pull requests"),a(o)]),t(" if someone has the same feature request as you. If yes, then you can comment your desired improvement under the open issue. If no, then please consider to "),e("a",N,[t("open a new issue"),a(o)]),t(" and give a detailed request. It makes sense to first explain the problem you have in the incumbent version of Wasabi, this is the place to express your frustrations and annoyances. Then describe the solution that you have envisioned, with all the nuances and details of how this would fix your problem. To flesh our your argument, please consider alternatives and different approaches to this feature request.")]),Y,e("p",null,[t("You are already on the right track by first checking "),e("a",Q,[t("this documentation"),a(o)]),t(" for the knowledge you are seeking. It's likely that you are not the first person who has an issue or a question, and hopefully someone has curated the answer in here already. You can use the search function in the top navbar to look for a specific topic, and the sidebar menu as a table of content. You can also use our "),e("a",A,[t("GitHub Discussions"),a(o)]),t(" to find solutions to different issues and to ask questions if necessary. If your trouble is specific to the code, then it might also be suitable to check the existing "),e("a",H,[t("GitHub issues"),a(o)]),t(" and open a new one.")]),z,F])}const M=i(c,[["render",E],["__file","FAQ-Contribution.html.vue"]]),O=JSON.parse('{"path":"/FAQ/FAQ-Contribution.html","title":"Contribution FAQ","lang":"en-US","frontmatter":{"title":"Contribution FAQ","description":"Frequently asked questions about how Wasabikas can support the project. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":3,"title":"How to donate to Wasabi Wallet?","slug":"how-to-donate-to-wasabi-wallet","link":"#how-to-donate-to-wasabi-wallet","children":[]},{"level":2,"title":"You can become a Wasabika","slug":"you-can-become-a-wasabika","link":"#you-can-become-a-wasabika","children":[{"level":3,"title":"How should I start contributing to Wasabi?","slug":"how-should-i-start-contributing-to-wasabi","link":"#how-should-i-start-contributing-to-wasabi","children":[]},{"level":3,"title":"Is there a bounty program?","slug":"is-there-a-bounty-program","link":"#is-there-a-bounty-program","children":[]},{"level":3,"title":"How can I report a bug?","slug":"how-can-i-report-a-bug","link":"#how-can-i-report-a-bug","children":[]},{"level":3,"title":"How can I request a feature?","slug":"how-can-i-request-a-feature","link":"#how-can-i-request-a-feature","children":[]},{"level":3,"title":"How can I get help and support?","slug":"how-can-i-get-help-and-support","link":"#how-can-i-get-help-and-support","children":[]},{"level":3,"title":"What does the Wasabi project need help with?","slug":"what-does-the-wasabi-project-need-help-with","link":"#what-does-the-wasabi-project-need-help-with","children":[]}]}],"git":{"updatedTime":1720425186000},"filePathRelative":"FAQ/FAQ-Contribution.md"}');export{M as comp,O as data}; +import{_ as i,r as s,o as r,c as l,a as e,b as t,d as a,w as h,e as u}from"./app-CwImt2bI.js";const c={},d=u('

    Contributions to Wasabi

    How to donate to Wasabi Wallet?

    Donations can be made to individual contributors and are highly appreciated.

    You can become a Wasabika

    How should I start contributing to Wasabi?

    ',5),p={href:"https://join.slack.com/t/tumblebit/shared_invite/enQtNjQ1MTQ2NzQ1ODI0LWIzOTg5YTM3YmNkOTg1NjZmZTQ3NmM1OTAzYmQyYzk1M2M0MTdlZDk2OTQwNzFiNTg1ZmExNzM0NjgzY2M0Yzg",target:"_blank",rel:"noopener noreferrer"},b={href:"https://github.com/WalletWasabi/WalletWasabi",target:"_blank",rel:"noopener noreferrer"},f=e("h3",{id:"is-there-a-bounty-program",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#is-there-a-bounty-program"},[e("span",null,"Is there a bounty program?")])],-1),w={href:"https://zksnacks.com",target:"_blank",rel:"noopener noreferrer"},g=e("h3",{id:"how-can-i-report-a-bug",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-can-i-report-a-bug"},[e("span",null,"How can I report a bug?")])],-1),m=e("p",null,"Code is speech, and can never be perfect. Thus it is expected that there are many known and unknown bugs, quirks and issues in Wasabi. Such a complex software requires constant and rigorous review by the developers and the users, this is everyone's responsibility working with Wasabi.",-1),y={href:"https://github.com/WalletWasabi/WalletWasabi/issues/",target:"_blank",rel:"noopener noreferrer"},_={href:"https://github.com/WalletWasabi/WalletWasabi/pulls",target:"_blank",rel:"noopener noreferrer"},k={href:"https://github.com/WalletWasabi/WalletWasabi/issues/new?template=bug-report.md",target:"_blank",rel:"noopener noreferrer"},W={class:"custom-container danger"},v=e("p",{class:"custom-container-title"},"DANGER",-1),I=e("a",{href:"mailto:adam.ficsor73@gmail.com"},"adam.ficsor73@gmail.com",-1),x={href:"https://github.com/WalletWasabi/WalletWasabi/blob/master/SECURITY.md",target:"_blank",rel:"noopener noreferrer"},T=e("h3",{id:"how-can-i-request-a-feature",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-can-i-request-a-feature"},[e("span",null,"How can I request a feature?")])],-1),q=e("p",null,"Wasabi is a quite beautiful piece of software already. Yet there are also 1001 things that could be just a little better, or even quite substantially superior. The beauty and bane of libre and open-source software is that it is never complete, there is always more work to be done.",-1),C={href:"https://github.com/WalletWasabi/WalletWasabi/issues/",target:"_blank",rel:"noopener noreferrer"},j={href:"https://github.com/WalletWasabi/WalletWasabi/pulls",target:"_blank",rel:"noopener noreferrer"},N={href:"https://github.com/WalletWasabi/WalletWasabi/issues/new?template=feature-request.md",target:"_blank",rel:"noopener noreferrer"},Y=e("h3",{id:"how-can-i-get-help-and-support",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-can-i-get-help-and-support"},[e("span",null,"How can I get help and support?")])],-1),Q={href:"https://docs.wasabiwallet.io",target:"_blank",rel:"noopener noreferrer"},A={href:"https://github.com/WalletWasabi/WalletWasabi/discussions/5185",target:"_blank",rel:"noopener noreferrer"},H={href:"https://github.com/WalletWasabi/WalletWasabi/issues/",target:"_blank",rel:"noopener noreferrer"},z=e("h3",{id:"what-does-the-wasabi-project-need-help-with",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-does-the-wasabi-project-need-help-with"},[e("span",null,"What does the Wasabi project need help with?")])],-1),F=e("p",null,"Wasabi is libre and open-source software, thus it relies on the support of several contributors on all fronts. Of course, this includes coding new features, bug fixes and stability improvements. Yet just equally important is the review of the commits of all other Wasabikas. It's not just the contributions to the code, but also to the documentation and the effort to educate peers using Wasabi. This includes education in meatspace tribe gatherings, but also in cyberspace peer support. So basically, we need help with building and shilling Wasabi!",-1);function E(S,B){const n=s("RouteLink"),o=s("ExternalLinkIcon");return r(),l("div",null,[d,e("p",null,[t("Thank you for considering to support this beautiful libre and open-source project! It is the responsibility of everyone using the software to contribute to its growth. Your help is deeply appreciated, and very much needed! First please read the "),a(n,{to:"/building-wasabi/ContributionChecklist.html"},{default:h(()=>[t("contribution checklist")]),_:1}),t(" to get introduced to the project and to start out in the right direction. Join our "),e("a",p,[t("Slack"),a(o)]),t(" and check out our "),e("a",b,[t("GitHub repository"),a(o)]),t(", so that you can stay up-to-date with the latest contributions.")]),f,e("p",null,[t("Yes! The beauty of Wasabi is that it's not just a very awesome wallet by default, but it has the additional opt-in CoinJoin service. This is provided by "),e("a",w,[t("zkSNACKs Ltd."),a(o)]),t(", and in exchange for this service, the user pays a coordination fee. In return, zkSNACKs is supporting several developers to dedicate their full time to contribute to this open-source project. There are also contribution games where a bounty is paid out to any contributor worthy the prize.")]),g,m,e("p",null,[t("When you stumble upon an issue that needs fixing, please first check the open "),e("a",y,[t("issues"),a(o)]),t(" and "),e("a",_,[t("pull requests"),a(o)]),t(" if there is already someone working on it. If yes, then you can comment your situation and bug report under the open issue. If no, then please consider to "),e("a",k,[t("open a new issue"),a(o)]),t(" and give a detailed report on the problem. It is especially helpful when you provide a step-by-step guide on how to reproduce what you have found. There is constantly a lot of work done to the code base, thus it's good to know which version of Wasabi, and what operating system you are using. In some cases it might be useful to see your logs, though please consider your privacy and encrypt this data properly in direct communication with the developers.")]),e("div",W,[v,e("p",null,[t("If you find a bug that puts users' privacy or security at serious risk, please take great care with responsible disclosure! Send an email to "),I,t(", preferably using PGP encryption "),e("a",x,[t("21D7 CA45 565D BCCE BE45 115D B4B7 2266 C47E 075E"),a(o)]),t(".")])]),T,q,e("p",null,[t("Regardless if you are a new user of Wasabi, or a veteran black belt Wasabika, any suggestions on how to improve are very welcome. Please first check the existing "),e("a",C,[t("issues"),a(o)]),t(" and "),e("a",j,[t("pull requests"),a(o)]),t(" if someone has the same feature request as you. If yes, then you can comment your desired improvement under the open issue. If no, then please consider to "),e("a",N,[t("open a new issue"),a(o)]),t(" and give a detailed request. It makes sense to first explain the problem you have in the incumbent version of Wasabi, this is the place to express your frustrations and annoyances. Then describe the solution that you have envisioned, with all the nuances and details of how this would fix your problem. To flesh our your argument, please consider alternatives and different approaches to this feature request.")]),Y,e("p",null,[t("You are already on the right track by first checking "),e("a",Q,[t("this documentation"),a(o)]),t(" for the knowledge you are seeking. It's likely that you are not the first person who has an issue or a question, and hopefully someone has curated the answer in here already. You can use the search function in the top navbar to look for a specific topic, and the sidebar menu as a table of content. You can also use our "),e("a",A,[t("GitHub Discussions"),a(o)]),t(" to find solutions to different issues and to ask questions if necessary. If your trouble is specific to the code, then it might also be suitable to check the existing "),e("a",H,[t("GitHub issues"),a(o)]),t(" and open a new one.")]),z,F])}const M=i(c,[["render",E],["__file","FAQ-Contribution.html.vue"]]),O=JSON.parse('{"path":"/FAQ/FAQ-Contribution.html","title":"Contribution FAQ","lang":"en-US","frontmatter":{"title":"Contribution FAQ","description":"Frequently asked questions about how Wasabikas can support the project. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":3,"title":"How to donate to Wasabi Wallet?","slug":"how-to-donate-to-wasabi-wallet","link":"#how-to-donate-to-wasabi-wallet","children":[]},{"level":2,"title":"You can become a Wasabika","slug":"you-can-become-a-wasabika","link":"#you-can-become-a-wasabika","children":[{"level":3,"title":"How should I start contributing to Wasabi?","slug":"how-should-i-start-contributing-to-wasabi","link":"#how-should-i-start-contributing-to-wasabi","children":[]},{"level":3,"title":"Is there a bounty program?","slug":"is-there-a-bounty-program","link":"#is-there-a-bounty-program","children":[]},{"level":3,"title":"How can I report a bug?","slug":"how-can-i-report-a-bug","link":"#how-can-i-report-a-bug","children":[]},{"level":3,"title":"How can I request a feature?","slug":"how-can-i-request-a-feature","link":"#how-can-i-request-a-feature","children":[]},{"level":3,"title":"How can I get help and support?","slug":"how-can-i-get-help-and-support","link":"#how-can-i-get-help-and-support","children":[]},{"level":3,"title":"What does the Wasabi project need help with?","slug":"what-does-the-wasabi-project-need-help-with","link":"#what-does-the-wasabi-project-need-help-with","children":[]}]}],"git":{"updatedTime":1720425980000},"filePathRelative":"FAQ/FAQ-Contribution.md"}');export{M as comp,O as data}; diff --git a/assets/FAQ-GeneralBitcoinPrivacy.html-AkZkt5So.js b/assets/FAQ-GeneralBitcoinPrivacy.html-H_B_tf1u.js similarity index 99% rename from assets/FAQ-GeneralBitcoinPrivacy.html-AkZkt5So.js rename to assets/FAQ-GeneralBitcoinPrivacy.html-H_B_tf1u.js index b4662af8f..f189fc4a2 100644 --- a/assets/FAQ-GeneralBitcoinPrivacy.html-AkZkt5So.js +++ b/assets/FAQ-GeneralBitcoinPrivacy.html-H_B_tf1u.js @@ -1,2 +1,2 @@ -import{_ as l,r as s,o as c,c as h,a as e,b as o,d as t,w as r,e as n}from"./app-3S7gIoGc.js";const d={},u=n('

    General Bitcoin Privacy

    Why Privacy matters

    I have nothing to hide, do I still need financial privacy?

    What did you say to your spouse in bed last night? How much money did you earn last month? What websites have you visited yesterday?

    TIP

    It's not that I have nothing to hide, it's that I have nothing to share.

    There are many tasks in everyday life that are simply none of your business. Knowledge you choose not to share with others, things you only tell one individual, actions that you do while nobody is watching. How much money you earn, and where you spend it, is only your business, and of no concern to most other individuals.

    How is financial privacy an essential element to fungibility in Bitcoin?

    Fungibility is the possibility for an individual receiving bitcoin to safely ignore any connection between this bitcoin and any particular individual or use case it interacted with in the past. If you can meaningfully distinguish one coin from another, then their fungibility is weak. If Bitcoin fungibility is too weak in practice, then it cannot be decentralized: if someone important announces a list of stolen coins they won't accept coins derived from, you must carefully check coins you receive against that list and return the ones that fail. Everyone gets stuck checking blacklists issued by various authorities because in that world we'd all not like to get stuck with bad coins. This adds friction and transactional costs and makes Bitcoin less valuable as money.

    How is financial privacy essential for entrepreneurs?

    If you run a business, you cannot effectively set prices if your suppliers and customers can see all your transactions against your will. You cannot compete effectively if your competition is tracking your sales. Individually your informational leverage is lost in your private dealings if you don't have privacy over your accounts: if you pay your landlord in Bitcoin without enough privacy in place, your landlord will see when you've received a pay raise and can hit you up for more rent.

    How is financial privacy essential for personal safety?

    If thieves can see your income, holdings, and spending, they can use this information to target and exploit you. Without privacy, malicious parties have more ability to steal your identity, snatch your large purchases off your doorstep, or impersonate businesses you transact with towards you. They can tell exactly how much to try to scam you for. If thieves don't know how much bitcoin you have, then they don't know if you are worth the effort to attack.

    How is financial privacy essential for human dignity?

    No one wants the snotty barista at the coffee shop or their nosy neighbors commenting on their income or spending habits. No one wants their baby-crazy in-laws asking why they're buying contraception (or sex toys). Your employer has no business knowing what church you donate to. Only in a perfectly enlightened discrimination-free world where no one has undue authority over anyone else could we retain our dignity and make our lawful transactions freely without self-censorship if we don't have privacy.

    Most importantly, financial privacy isn't incompatible with things like law enforcement or transparency. You can always keep records, be ordered (or volunteer) to provide them to whomever, have judges hold against your interest when you can't produce records (as is the case today). None of this requires globally visible public records.

    The Privacy of Bitcoin

    How is Bitcoin good in terms of privacy?

    Privacy in traditional banking is guaranteed by the institutions that make up the system, such as banks, credit card companies, and governments. They (try to) ensure that your bank balance stays a secret. This puts them in a powerful position, where only they have complete oversight as to what is going on.

    Instead, in Bitcoin pseudonyms protect your identity. In the Bitcoin ecosystem, everyone can see the history of every account balance, but they cannot see who controls an account. All addresses and transactions are recorded in Bitcoin’s publicly distributed database, the blockchain. The addresses do not have names or IP addresses attached to them, so it is not always possible to know which transaction belongs to which individual.

    How is Bitcoin bad in terms of privacy?

    Bitcoin is by default a transparent system, in which every piece of information is available to the public. As such, every Bitcoin user requires some level of protection. Anyone with substantial wealth in Bitcoin would not want to advertise their funds to every person they transact with, for obvious reasons. But every time you spend just a tiny portion of your bitcoin, you might reveal your wealth to the other party. Doing that on the internet is like flashing large stacks of cash in a dark back alley, so obviously it’s not advisable! A criminal might see how much you have and decide to come after it. Distributing your wealth between several wallets and using a different address for each transaction is a common practice that prevents others from knowing how much bitcoin you have.

    Each Bitcoin transaction contains at least one input (where the Bitcoin are from) and at least one output (where the Bitcoin are being sent). This means that once a single address is known, there is a trail to follow the Bitcoin.

    Another characteristic of Bitcoin transactions is that the value of the input always needs to match the value of the previous transaction output. If you previously received 1 bitcoin, and you want to spend 0.4 bitcoin, the transaction needs to spend the whole 1 bitcoin. 0.4 bitcoin will go as payment, then 0.6 bitcoin will return to you as change. Your Bitcoin wallet will handle this process automatically, but it is important to understand the principle in order to use it anonymously.

    The owner of the original bitcoin doesn't know whom you paid the money or what you did with it, but they can see the amounts and addresses involved. They can see two outputs of the transaction: one worth 0.4 bitcoin and one worth 0.6 bitcoin. They might not know for certain which is the purchase and which is the change, but they can apply heuristics to estimate it.

    Similarly, if you receive 0.5 bitcoin but want to spend 1 bitcoin, you need to own additional coins with a combined value of at least 0.5 bitcoin in them. When spending two coins within one transaction, it is often assumed that both of these coins belong to the same entity, this is the common input ownership heuristic.

    Why is it important to run a full node?

    TIP

    Not your node ~ not your rules

    ',27),p={href:"https://github.com/bitcoin/bitcoin",target:"_blank",rel:"noopener noreferrer"},y=e("h3",{id:"how-does-a-full-node-protect-my-privacy",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-does-a-full-node-protect-my-privacy"},[e("span",null,"How does a full node protect my privacy?")])],-1),f={href:"https://github.com/bitcoin/bips/blob/master/bip-0158.mediawiki",target:"_blank",rel:"noopener noreferrer"},b=e("h3",{id:"how-can-i-set-up-a-full-node",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-can-i-set-up-a-full-node"},[e("span",null,"How can I set up a full node?")])],-1),w={href:"https://bitcoinknots.org/",target:"_blank",rel:"noopener noreferrer"},m={href:"https://bitcoincore.org/",target:"_blank",rel:"noopener noreferrer"},g={href:"https://github.com/libbitcoin/libbitcoin-node",target:"_blank",rel:"noopener noreferrer"},v=e("p",null,"Instead, if you prefer to use some dedicated hardware solutions, these are some of the most reliable projects:",-1),k={href:"https://github.com/rootzoll/raspiblitz",target:"_blank",rel:"noopener noreferrer"},_={href:"https://raspibolt.org/",target:"_blank",rel:"noopener noreferrer"},T={href:"https://nixbitcoin.org/",target:"_blank",rel:"noopener noreferrer"},B={href:"https://www.nodl.eu/",target:"_blank",rel:"noopener noreferrer"},x={href:"https://mynodebtc.com/",target:"_blank",rel:"noopener noreferrer"},I={href:"https://start9.com/",target:"_blank",rel:"noopener noreferrer"},W=e("h3",{id:"why-is-it-important-to-use-a-new-address-for-every-payment",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#why-is-it-important-to-use-a-new-address-for-every-payment"},[e("span",null,"Why is it important to use a new address for every payment?")])],-1),P=e("p",null,"Addresses being used more than once is very damaging to privacy because that links together more blockchain transactions with proof that they were created by the same entity. The most private and secure way to use bitcoin is to send a brand new address to each person who pays you. After an address has received a coin, it should never be used again. Also, a brand new bitcoin address should be demanded from the recipient when sending bitcoin. Wasabi has a user interface which discourages address reuse by removing from the GUI addresses which have received a coin.",-1),S=e("p",null,'It has been argued that the phrase "bitcoin address" was a bad name for this object because it implies it can be reused like an email address. A better name would be something like "bitcoin invoice".',-1),H=e("p",null,"Bitcoin isn't anonymous but pseudonymous, and the pseudonyms are bitcoin addresses. Avoiding address reuse is like throwing away a pseudonym after it has been used.",-1),A=e("h3",{id:"what-is-a-coinjoin-sudoku",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-is-a-coinjoin-sudoku"},[e("span",null,"What is a coinjoin Sudoku?")])],-1),j={href:"https://www.coinjoinsudoku.com/advisory/",target:"_blank",rel:"noopener noreferrer"},F=n('

    The Privacy of Tor

    How does Tor protect my network-level privacy?

    When you make a Bitcoin transaction, you are essentially creating a message on your phone or computer and sending it to the Bitcoin network. Someone operating a large number of nodes on the Bitcoin network might be able to match some of your transactions to your IP address, then deanonymize your stack of bitcoin.

    It is relatively easy to avoid this on a computer by relaying all transactions through the Tor network. Wasabi routes all traffic via Tor’s SOCKS5 proxy, by default.

    To maintain your anonymity, use the Tor Browser or the Tails operating system, if possible. Route everything through Tor by default.

    It is also good practice to route your chats through the Tor network. You can also configure many cloud storage providers in this way.

    Why does Tor process keep running after closing Wasabi Wallet?

    There are two main reasons: user experience and privacy.

    If a user closes Wasabi and then starts it again, he's already connected to Tor and he does not need to build a new Tor circuit. This means that Wasabi's startup will be much faster, because the Tor circuit is already established.

    Regarding the privacy, this is done to avoid time correlation attacks when using Wasabi Wallet. In fact, if a user creates a new Tor circuit every time he opens Wasabi Wallet, he would send a series of information to the Bitcoin network, which could allow a correlation and deanonymization of the user himself.

    My country/ISP is blocking/censoring Tor, how can I use Wasabi with Tor bridges?

    ',11),D={href:"https://support.torproject.org/censorship/censorship-7/",target:"_blank",rel:"noopener noreferrer"},q=e("p",null,[e("strong",null,"Steps with Tor Browser:")],-1),E={href:"https://www.torproject.org/",target:"_blank",rel:"noopener noreferrer"},N={href:"https://support.torproject.org/censorship/gettor-1/",target:"_blank",rel:"noopener noreferrer"},R=e("li",null,[e("p",null,"You'll need to specify the Tor folder, as Wasabi's bundled Tor doesn't come with the PluggableTransports folder, so you'll need to specify a folder where the fully-featured Tor is located. See the next step.")],-1),Y=e("em",null,"TorFolder",-1),C=e("em",null,"PluggableTransports",-1),M=e("em",null,"TorBridges",-1),Q=e("p",null,[e("code",null,'--torfolder="$HOME/tor-browser_en-US/Browser/TorBrowser/Tor --torbridges=""')],-1),O=e("p",null,"To use multiple Tor bridges:",-1),U=e("p",null,[e("code",null,'--torbridges=";;"')],-1),z=n(`

    When using obfs4 or webtunnel, at least two bridges should be specified for Tor's Conflux feature to work properly and for better performance.

    Default folders where Tor Browser's Tor is located:

    • Windows: C:\\Users<USER>\\Desktop\\Tor Browser\\Browser\\TorBrowser\\Tor
    • macOS: /Applications/Tor Browser.app/Contents/MacOS/Tor
    • linux: $HOME/tor-browser_en-US/Browser/TorBrowser/Tor

    Currently only the obfs4, Snowflake and webtunnel pluggable transports can be used, others are not supported.

    For example, to specify a single obfs4 Tor bridge, one can use:

    $ --torfolder="$HOME/tor-browser_en-US/Browser/TorBrowser/Tor" --torbridges="obfs4 95.216.9.24:14288 2F26D43258285FEB39E4320888DFAFA8A0D20E11 cert=RJHxHEYW2JnFMTZdf2mdwpEhm7B8RQMCK6ttBL/fPhfdrF20ooAuaITK5MqZooVpXsSVVQ iat-mode=0"
    -
    `,6);function V(G,K){const i=s("ExternalLinkIcon"),a=s("RouteLink");return c(),h("div",null,[u,e("p",null,[o("When you download and install "),e("a",p,[o("bitcoind"),t(i)]),o(", you define the precise rules of your monetary system. Then you call out to other nodes and only connect to the peers who have agreed to play by the same rules. All those who break your own rules, you simply disconnect and ignore. Your full node defines, verifies and enforces the sound money you use to store your value.")]),y,e("p",null,[o("When you run your own full node, then on your local computer you can verify exactly if the bitcoin you receive are actually valid. When you do not verify this for yourself, then you need to ask another trusted third party how much money you have. Regardless how you ask this other server, there is now more metadata available to potentially link your coins to your identity. There are bad ways to communicate, like querying a block explorer over clearnet, and good ways to communicate, like using "),e("a",f,[o("BIP 158"),t(i)]),o(" block filters over Tor. But regardless, running your own full node means that you don't need to communicate with anyone about your specific coins and this is strictly better.")]),b,e("p",null,[o("Wasabi comes "),t(a,{to:"/using-wasabi/BitcoinFullNode.html"},{default:r(()=>[o("pre-installed with bitcoind")]),_:1}),o(" from "),e("a",w,[o("Bitcoin Knots"),t(i)]),o(" and it can be started on the same desktop or laptop computer with just one click. This is likely the most convenient solution for Wasabikas.")]),e("p",null,[o("There are also other node implementations different from Bitcoin Knots, such as "),e("a",m,[o("Bitcoin Core"),t(i)]),o(" or "),e("a",g,[o("Libbitcoin"),t(i)]),o(", that could be used as well.")]),v,e("ul",null,[e("li",null,[e("a",k,[o("RaspiBlitz"),t(i)]),o(", a DIY project based on the Raspberry platform")]),e("li",null,[e("a",_,[o("RaspiBolt"),t(i)]),o(", another Raspberry DIY node")]),e("li",null,[e("a",T,[o("nix-bitcoin"),t(i)]),o(", a collection of Nix packages and NixOS modules")]),e("li",null,[e("a",B,[o("Nodl"),t(i)]),o(", works out of the box and runs on a powerful Rockchip CPU")]),e("li",null,[e("a",x,[o("myNode"),t(i)]),o(", a DIY project with optional paid versions")]),e("li",null,[e("a",I,[o("Start9"),t(i)]),o(", a project making it easy to run your own server(s)")])]),W,P,S,H,A,e("p",null,[o("Coinjoin Sudoku is a type of intra-transaction analysis attack on coinjoin transactions that aims to link inputs and outputs together based on their combinatorial sums. You can read more about coinjoin Sudoku "),e("a",j,[o("here"),t(i)]),o(".")]),F,e("p",null,[o("Tor bridges, also called Tor bridge relays, are alternative entry points to the Tor network that are not listed in the public Tor directory. If you suspect that your access to the Tor network is being blocked, you may want to use bridges. You can read more on "),e("a",D,[o("The Tor Project's dedicated page about bridges"),t(i)]),o(".")]),q,e("ol",null,[e("li",null,[e("p",null,[o("Download and install the "),e("a",E,[o("Tor Browser"),t(i)]),o(". See "),e("a",N,[o("here"),t(i)]),o(" on how to do that when Tor website is blocked.")])]),R,e("li",null,[e("p",null,[o("Start Wasabi with "),Y,o(" (to specify where Tor Browser's Tor binary is located, along with the "),C,o(" folder) and "),M,o(" (to specify which bridge(s) to use) "),t(a,{to:"/using-wasabi/StartupParameters.html"},{default:r(()=>[o("startup parameters")]),_:1}),o(":")]),Q,O,U])]),z])}const $=l(d,[["render",V],["__file","FAQ-GeneralBitcoinPrivacy.html.vue"]]),J=JSON.parse('{"path":"/FAQ/FAQ-GeneralBitcoinPrivacy.html","title":"Bitcoin Privacy FAQ","lang":"en-US","frontmatter":{"title":"Bitcoin Privacy FAQ","description":"Frequently asked questions about the nuances of privacy in Bitcoin in general. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Why Privacy matters","slug":"why-privacy-matters","link":"#why-privacy-matters","children":[{"level":3,"title":"I have nothing to hide, do I still need financial privacy?","slug":"i-have-nothing-to-hide-do-i-still-need-financial-privacy","link":"#i-have-nothing-to-hide-do-i-still-need-financial-privacy","children":[]},{"level":3,"title":"How is financial privacy an essential element to fungibility in Bitcoin?","slug":"how-is-financial-privacy-an-essential-element-to-fungibility-in-bitcoin","link":"#how-is-financial-privacy-an-essential-element-to-fungibility-in-bitcoin","children":[]},{"level":3,"title":"How is financial privacy essential for entrepreneurs?","slug":"how-is-financial-privacy-essential-for-entrepreneurs","link":"#how-is-financial-privacy-essential-for-entrepreneurs","children":[]},{"level":3,"title":"How is financial privacy essential for personal safety?","slug":"how-is-financial-privacy-essential-for-personal-safety","link":"#how-is-financial-privacy-essential-for-personal-safety","children":[]},{"level":3,"title":"How is financial privacy essential for human dignity?","slug":"how-is-financial-privacy-essential-for-human-dignity","link":"#how-is-financial-privacy-essential-for-human-dignity","children":[]}]},{"level":2,"title":"The Privacy of Bitcoin","slug":"the-privacy-of-bitcoin","link":"#the-privacy-of-bitcoin","children":[{"level":3,"title":"How is Bitcoin good in terms of privacy?","slug":"how-is-bitcoin-good-in-terms-of-privacy","link":"#how-is-bitcoin-good-in-terms-of-privacy","children":[]},{"level":3,"title":"How is Bitcoin bad in terms of privacy?","slug":"how-is-bitcoin-bad-in-terms-of-privacy","link":"#how-is-bitcoin-bad-in-terms-of-privacy","children":[]},{"level":3,"title":"Why is it important to run a full node?","slug":"why-is-it-important-to-run-a-full-node","link":"#why-is-it-important-to-run-a-full-node","children":[]},{"level":3,"title":"How does a full node protect my privacy?","slug":"how-does-a-full-node-protect-my-privacy","link":"#how-does-a-full-node-protect-my-privacy","children":[]},{"level":3,"title":"How can I set up a full node?","slug":"how-can-i-set-up-a-full-node","link":"#how-can-i-set-up-a-full-node","children":[]},{"level":3,"title":"Why is it important to use a new address for every payment?","slug":"why-is-it-important-to-use-a-new-address-for-every-payment","link":"#why-is-it-important-to-use-a-new-address-for-every-payment","children":[]},{"level":3,"title":"What is a coinjoin Sudoku?","slug":"what-is-a-coinjoin-sudoku","link":"#what-is-a-coinjoin-sudoku","children":[]}]},{"level":2,"title":"The Privacy of Tor","slug":"the-privacy-of-tor","link":"#the-privacy-of-tor","children":[{"level":3,"title":"How does Tor protect my network-level privacy?","slug":"how-does-tor-protect-my-network-level-privacy","link":"#how-does-tor-protect-my-network-level-privacy","children":[]},{"level":3,"title":"Why does Tor process keep running after closing Wasabi Wallet?","slug":"why-does-tor-process-keep-running-after-closing-wasabi-wallet","link":"#why-does-tor-process-keep-running-after-closing-wasabi-wallet","children":[]},{"level":3,"title":"My country/ISP is blocking/censoring Tor, how can I use Wasabi with Tor bridges?","slug":"my-country-isp-is-blocking-censoring-tor-how-can-i-use-wasabi-with-tor-bridges","link":"#my-country-isp-is-blocking-censoring-tor-how-can-i-use-wasabi-with-tor-bridges","children":[]}]}],"git":{"updatedTime":1720425186000},"filePathRelative":"FAQ/FAQ-GeneralBitcoinPrivacy.md"}');export{$ as comp,J as data}; +import{_ as l,r as s,o as c,c as h,a as e,b as o,d as t,w as r,e as n}from"./app-CwImt2bI.js";const d={},u=n('

    General Bitcoin Privacy

    Why Privacy matters

    I have nothing to hide, do I still need financial privacy?

    What did you say to your spouse in bed last night? How much money did you earn last month? What websites have you visited yesterday?

    TIP

    It's not that I have nothing to hide, it's that I have nothing to share.

    There are many tasks in everyday life that are simply none of your business. Knowledge you choose not to share with others, things you only tell one individual, actions that you do while nobody is watching. How much money you earn, and where you spend it, is only your business, and of no concern to most other individuals.

    How is financial privacy an essential element to fungibility in Bitcoin?

    Fungibility is the possibility for an individual receiving bitcoin to safely ignore any connection between this bitcoin and any particular individual or use case it interacted with in the past. If you can meaningfully distinguish one coin from another, then their fungibility is weak. If Bitcoin fungibility is too weak in practice, then it cannot be decentralized: if someone important announces a list of stolen coins they won't accept coins derived from, you must carefully check coins you receive against that list and return the ones that fail. Everyone gets stuck checking blacklists issued by various authorities because in that world we'd all not like to get stuck with bad coins. This adds friction and transactional costs and makes Bitcoin less valuable as money.

    How is financial privacy essential for entrepreneurs?

    If you run a business, you cannot effectively set prices if your suppliers and customers can see all your transactions against your will. You cannot compete effectively if your competition is tracking your sales. Individually your informational leverage is lost in your private dealings if you don't have privacy over your accounts: if you pay your landlord in Bitcoin without enough privacy in place, your landlord will see when you've received a pay raise and can hit you up for more rent.

    How is financial privacy essential for personal safety?

    If thieves can see your income, holdings, and spending, they can use this information to target and exploit you. Without privacy, malicious parties have more ability to steal your identity, snatch your large purchases off your doorstep, or impersonate businesses you transact with towards you. They can tell exactly how much to try to scam you for. If thieves don't know how much bitcoin you have, then they don't know if you are worth the effort to attack.

    How is financial privacy essential for human dignity?

    No one wants the snotty barista at the coffee shop or their nosy neighbors commenting on their income or spending habits. No one wants their baby-crazy in-laws asking why they're buying contraception (or sex toys). Your employer has no business knowing what church you donate to. Only in a perfectly enlightened discrimination-free world where no one has undue authority over anyone else could we retain our dignity and make our lawful transactions freely without self-censorship if we don't have privacy.

    Most importantly, financial privacy isn't incompatible with things like law enforcement or transparency. You can always keep records, be ordered (or volunteer) to provide them to whomever, have judges hold against your interest when you can't produce records (as is the case today). None of this requires globally visible public records.

    The Privacy of Bitcoin

    How is Bitcoin good in terms of privacy?

    Privacy in traditional banking is guaranteed by the institutions that make up the system, such as banks, credit card companies, and governments. They (try to) ensure that your bank balance stays a secret. This puts them in a powerful position, where only they have complete oversight as to what is going on.

    Instead, in Bitcoin pseudonyms protect your identity. In the Bitcoin ecosystem, everyone can see the history of every account balance, but they cannot see who controls an account. All addresses and transactions are recorded in Bitcoin’s publicly distributed database, the blockchain. The addresses do not have names or IP addresses attached to them, so it is not always possible to know which transaction belongs to which individual.

    How is Bitcoin bad in terms of privacy?

    Bitcoin is by default a transparent system, in which every piece of information is available to the public. As such, every Bitcoin user requires some level of protection. Anyone with substantial wealth in Bitcoin would not want to advertise their funds to every person they transact with, for obvious reasons. But every time you spend just a tiny portion of your bitcoin, you might reveal your wealth to the other party. Doing that on the internet is like flashing large stacks of cash in a dark back alley, so obviously it’s not advisable! A criminal might see how much you have and decide to come after it. Distributing your wealth between several wallets and using a different address for each transaction is a common practice that prevents others from knowing how much bitcoin you have.

    Each Bitcoin transaction contains at least one input (where the Bitcoin are from) and at least one output (where the Bitcoin are being sent). This means that once a single address is known, there is a trail to follow the Bitcoin.

    Another characteristic of Bitcoin transactions is that the value of the input always needs to match the value of the previous transaction output. If you previously received 1 bitcoin, and you want to spend 0.4 bitcoin, the transaction needs to spend the whole 1 bitcoin. 0.4 bitcoin will go as payment, then 0.6 bitcoin will return to you as change. Your Bitcoin wallet will handle this process automatically, but it is important to understand the principle in order to use it anonymously.

    The owner of the original bitcoin doesn't know whom you paid the money or what you did with it, but they can see the amounts and addresses involved. They can see two outputs of the transaction: one worth 0.4 bitcoin and one worth 0.6 bitcoin. They might not know for certain which is the purchase and which is the change, but they can apply heuristics to estimate it.

    Similarly, if you receive 0.5 bitcoin but want to spend 1 bitcoin, you need to own additional coins with a combined value of at least 0.5 bitcoin in them. When spending two coins within one transaction, it is often assumed that both of these coins belong to the same entity, this is the common input ownership heuristic.

    Why is it important to run a full node?

    TIP

    Not your node ~ not your rules

    ',27),p={href:"https://github.com/bitcoin/bitcoin",target:"_blank",rel:"noopener noreferrer"},y=e("h3",{id:"how-does-a-full-node-protect-my-privacy",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-does-a-full-node-protect-my-privacy"},[e("span",null,"How does a full node protect my privacy?")])],-1),f={href:"https://github.com/bitcoin/bips/blob/master/bip-0158.mediawiki",target:"_blank",rel:"noopener noreferrer"},b=e("h3",{id:"how-can-i-set-up-a-full-node",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-can-i-set-up-a-full-node"},[e("span",null,"How can I set up a full node?")])],-1),w={href:"https://bitcoinknots.org/",target:"_blank",rel:"noopener noreferrer"},m={href:"https://bitcoincore.org/",target:"_blank",rel:"noopener noreferrer"},g={href:"https://github.com/libbitcoin/libbitcoin-node",target:"_blank",rel:"noopener noreferrer"},v=e("p",null,"Instead, if you prefer to use some dedicated hardware solutions, these are some of the most reliable projects:",-1),k={href:"https://github.com/rootzoll/raspiblitz",target:"_blank",rel:"noopener noreferrer"},_={href:"https://raspibolt.org/",target:"_blank",rel:"noopener noreferrer"},T={href:"https://nixbitcoin.org/",target:"_blank",rel:"noopener noreferrer"},B={href:"https://www.nodl.eu/",target:"_blank",rel:"noopener noreferrer"},x={href:"https://mynodebtc.com/",target:"_blank",rel:"noopener noreferrer"},I={href:"https://start9.com/",target:"_blank",rel:"noopener noreferrer"},W=e("h3",{id:"why-is-it-important-to-use-a-new-address-for-every-payment",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#why-is-it-important-to-use-a-new-address-for-every-payment"},[e("span",null,"Why is it important to use a new address for every payment?")])],-1),P=e("p",null,"Addresses being used more than once is very damaging to privacy because that links together more blockchain transactions with proof that they were created by the same entity. The most private and secure way to use bitcoin is to send a brand new address to each person who pays you. After an address has received a coin, it should never be used again. Also, a brand new bitcoin address should be demanded from the recipient when sending bitcoin. Wasabi has a user interface which discourages address reuse by removing from the GUI addresses which have received a coin.",-1),S=e("p",null,'It has been argued that the phrase "bitcoin address" was a bad name for this object because it implies it can be reused like an email address. A better name would be something like "bitcoin invoice".',-1),H=e("p",null,"Bitcoin isn't anonymous but pseudonymous, and the pseudonyms are bitcoin addresses. Avoiding address reuse is like throwing away a pseudonym after it has been used.",-1),A=e("h3",{id:"what-is-a-coinjoin-sudoku",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-is-a-coinjoin-sudoku"},[e("span",null,"What is a coinjoin Sudoku?")])],-1),j={href:"https://www.coinjoinsudoku.com/advisory/",target:"_blank",rel:"noopener noreferrer"},F=n('

    The Privacy of Tor

    How does Tor protect my network-level privacy?

    When you make a Bitcoin transaction, you are essentially creating a message on your phone or computer and sending it to the Bitcoin network. Someone operating a large number of nodes on the Bitcoin network might be able to match some of your transactions to your IP address, then deanonymize your stack of bitcoin.

    It is relatively easy to avoid this on a computer by relaying all transactions through the Tor network. Wasabi routes all traffic via Tor’s SOCKS5 proxy, by default.

    To maintain your anonymity, use the Tor Browser or the Tails operating system, if possible. Route everything through Tor by default.

    It is also good practice to route your chats through the Tor network. You can also configure many cloud storage providers in this way.

    Why does Tor process keep running after closing Wasabi Wallet?

    There are two main reasons: user experience and privacy.

    If a user closes Wasabi and then starts it again, he's already connected to Tor and he does not need to build a new Tor circuit. This means that Wasabi's startup will be much faster, because the Tor circuit is already established.

    Regarding the privacy, this is done to avoid time correlation attacks when using Wasabi Wallet. In fact, if a user creates a new Tor circuit every time he opens Wasabi Wallet, he would send a series of information to the Bitcoin network, which could allow a correlation and deanonymization of the user himself.

    My country/ISP is blocking/censoring Tor, how can I use Wasabi with Tor bridges?

    ',11),D={href:"https://support.torproject.org/censorship/censorship-7/",target:"_blank",rel:"noopener noreferrer"},q=e("p",null,[e("strong",null,"Steps with Tor Browser:")],-1),E={href:"https://www.torproject.org/",target:"_blank",rel:"noopener noreferrer"},N={href:"https://support.torproject.org/censorship/gettor-1/",target:"_blank",rel:"noopener noreferrer"},R=e("li",null,[e("p",null,"You'll need to specify the Tor folder, as Wasabi's bundled Tor doesn't come with the PluggableTransports folder, so you'll need to specify a folder where the fully-featured Tor is located. See the next step.")],-1),Y=e("em",null,"TorFolder",-1),C=e("em",null,"PluggableTransports",-1),M=e("em",null,"TorBridges",-1),Q=e("p",null,[e("code",null,'--torfolder="$HOME/tor-browser_en-US/Browser/TorBrowser/Tor --torbridges=""')],-1),O=e("p",null,"To use multiple Tor bridges:",-1),U=e("p",null,[e("code",null,'--torbridges=";;"')],-1),z=n(`

    When using obfs4 or webtunnel, at least two bridges should be specified for Tor's Conflux feature to work properly and for better performance.

    Default folders where Tor Browser's Tor is located:

    • Windows: C:\\Users<USER>\\Desktop\\Tor Browser\\Browser\\TorBrowser\\Tor
    • macOS: /Applications/Tor Browser.app/Contents/MacOS/Tor
    • linux: $HOME/tor-browser_en-US/Browser/TorBrowser/Tor

    Currently only the obfs4, Snowflake and webtunnel pluggable transports can be used, others are not supported.

    For example, to specify a single obfs4 Tor bridge, one can use:

    $ --torfolder="$HOME/tor-browser_en-US/Browser/TorBrowser/Tor" --torbridges="obfs4 95.216.9.24:14288 2F26D43258285FEB39E4320888DFAFA8A0D20E11 cert=RJHxHEYW2JnFMTZdf2mdwpEhm7B8RQMCK6ttBL/fPhfdrF20ooAuaITK5MqZooVpXsSVVQ iat-mode=0"
    +
    `,6);function V(G,K){const i=s("ExternalLinkIcon"),a=s("RouteLink");return c(),h("div",null,[u,e("p",null,[o("When you download and install "),e("a",p,[o("bitcoind"),t(i)]),o(", you define the precise rules of your monetary system. Then you call out to other nodes and only connect to the peers who have agreed to play by the same rules. All those who break your own rules, you simply disconnect and ignore. Your full node defines, verifies and enforces the sound money you use to store your value.")]),y,e("p",null,[o("When you run your own full node, then on your local computer you can verify exactly if the bitcoin you receive are actually valid. When you do not verify this for yourself, then you need to ask another trusted third party how much money you have. Regardless how you ask this other server, there is now more metadata available to potentially link your coins to your identity. There are bad ways to communicate, like querying a block explorer over clearnet, and good ways to communicate, like using "),e("a",f,[o("BIP 158"),t(i)]),o(" block filters over Tor. But regardless, running your own full node means that you don't need to communicate with anyone about your specific coins and this is strictly better.")]),b,e("p",null,[o("Wasabi comes "),t(a,{to:"/using-wasabi/BitcoinFullNode.html"},{default:r(()=>[o("pre-installed with bitcoind")]),_:1}),o(" from "),e("a",w,[o("Bitcoin Knots"),t(i)]),o(" and it can be started on the same desktop or laptop computer with just one click. This is likely the most convenient solution for Wasabikas.")]),e("p",null,[o("There are also other node implementations different from Bitcoin Knots, such as "),e("a",m,[o("Bitcoin Core"),t(i)]),o(" or "),e("a",g,[o("Libbitcoin"),t(i)]),o(", that could be used as well.")]),v,e("ul",null,[e("li",null,[e("a",k,[o("RaspiBlitz"),t(i)]),o(", a DIY project based on the Raspberry platform")]),e("li",null,[e("a",_,[o("RaspiBolt"),t(i)]),o(", another Raspberry DIY node")]),e("li",null,[e("a",T,[o("nix-bitcoin"),t(i)]),o(", a collection of Nix packages and NixOS modules")]),e("li",null,[e("a",B,[o("Nodl"),t(i)]),o(", works out of the box and runs on a powerful Rockchip CPU")]),e("li",null,[e("a",x,[o("myNode"),t(i)]),o(", a DIY project with optional paid versions")]),e("li",null,[e("a",I,[o("Start9"),t(i)]),o(", a project making it easy to run your own server(s)")])]),W,P,S,H,A,e("p",null,[o("Coinjoin Sudoku is a type of intra-transaction analysis attack on coinjoin transactions that aims to link inputs and outputs together based on their combinatorial sums. You can read more about coinjoin Sudoku "),e("a",j,[o("here"),t(i)]),o(".")]),F,e("p",null,[o("Tor bridges, also called Tor bridge relays, are alternative entry points to the Tor network that are not listed in the public Tor directory. If you suspect that your access to the Tor network is being blocked, you may want to use bridges. You can read more on "),e("a",D,[o("The Tor Project's dedicated page about bridges"),t(i)]),o(".")]),q,e("ol",null,[e("li",null,[e("p",null,[o("Download and install the "),e("a",E,[o("Tor Browser"),t(i)]),o(". See "),e("a",N,[o("here"),t(i)]),o(" on how to do that when Tor website is blocked.")])]),R,e("li",null,[e("p",null,[o("Start Wasabi with "),Y,o(" (to specify where Tor Browser's Tor binary is located, along with the "),C,o(" folder) and "),M,o(" (to specify which bridge(s) to use) "),t(a,{to:"/using-wasabi/StartupParameters.html"},{default:r(()=>[o("startup parameters")]),_:1}),o(":")]),Q,O,U])]),z])}const $=l(d,[["render",V],["__file","FAQ-GeneralBitcoinPrivacy.html.vue"]]),J=JSON.parse('{"path":"/FAQ/FAQ-GeneralBitcoinPrivacy.html","title":"Bitcoin Privacy FAQ","lang":"en-US","frontmatter":{"title":"Bitcoin Privacy FAQ","description":"Frequently asked questions about the nuances of privacy in Bitcoin in general. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Why Privacy matters","slug":"why-privacy-matters","link":"#why-privacy-matters","children":[{"level":3,"title":"I have nothing to hide, do I still need financial privacy?","slug":"i-have-nothing-to-hide-do-i-still-need-financial-privacy","link":"#i-have-nothing-to-hide-do-i-still-need-financial-privacy","children":[]},{"level":3,"title":"How is financial privacy an essential element to fungibility in Bitcoin?","slug":"how-is-financial-privacy-an-essential-element-to-fungibility-in-bitcoin","link":"#how-is-financial-privacy-an-essential-element-to-fungibility-in-bitcoin","children":[]},{"level":3,"title":"How is financial privacy essential for entrepreneurs?","slug":"how-is-financial-privacy-essential-for-entrepreneurs","link":"#how-is-financial-privacy-essential-for-entrepreneurs","children":[]},{"level":3,"title":"How is financial privacy essential for personal safety?","slug":"how-is-financial-privacy-essential-for-personal-safety","link":"#how-is-financial-privacy-essential-for-personal-safety","children":[]},{"level":3,"title":"How is financial privacy essential for human dignity?","slug":"how-is-financial-privacy-essential-for-human-dignity","link":"#how-is-financial-privacy-essential-for-human-dignity","children":[]}]},{"level":2,"title":"The Privacy of Bitcoin","slug":"the-privacy-of-bitcoin","link":"#the-privacy-of-bitcoin","children":[{"level":3,"title":"How is Bitcoin good in terms of privacy?","slug":"how-is-bitcoin-good-in-terms-of-privacy","link":"#how-is-bitcoin-good-in-terms-of-privacy","children":[]},{"level":3,"title":"How is Bitcoin bad in terms of privacy?","slug":"how-is-bitcoin-bad-in-terms-of-privacy","link":"#how-is-bitcoin-bad-in-terms-of-privacy","children":[]},{"level":3,"title":"Why is it important to run a full node?","slug":"why-is-it-important-to-run-a-full-node","link":"#why-is-it-important-to-run-a-full-node","children":[]},{"level":3,"title":"How does a full node protect my privacy?","slug":"how-does-a-full-node-protect-my-privacy","link":"#how-does-a-full-node-protect-my-privacy","children":[]},{"level":3,"title":"How can I set up a full node?","slug":"how-can-i-set-up-a-full-node","link":"#how-can-i-set-up-a-full-node","children":[]},{"level":3,"title":"Why is it important to use a new address for every payment?","slug":"why-is-it-important-to-use-a-new-address-for-every-payment","link":"#why-is-it-important-to-use-a-new-address-for-every-payment","children":[]},{"level":3,"title":"What is a coinjoin Sudoku?","slug":"what-is-a-coinjoin-sudoku","link":"#what-is-a-coinjoin-sudoku","children":[]}]},{"level":2,"title":"The Privacy of Tor","slug":"the-privacy-of-tor","link":"#the-privacy-of-tor","children":[{"level":3,"title":"How does Tor protect my network-level privacy?","slug":"how-does-tor-protect-my-network-level-privacy","link":"#how-does-tor-protect-my-network-level-privacy","children":[]},{"level":3,"title":"Why does Tor process keep running after closing Wasabi Wallet?","slug":"why-does-tor-process-keep-running-after-closing-wasabi-wallet","link":"#why-does-tor-process-keep-running-after-closing-wasabi-wallet","children":[]},{"level":3,"title":"My country/ISP is blocking/censoring Tor, how can I use Wasabi with Tor bridges?","slug":"my-country-isp-is-blocking-censoring-tor-how-can-i-use-wasabi-with-tor-bridges","link":"#my-country-isp-is-blocking-censoring-tor-how-can-i-use-wasabi-with-tor-bridges","children":[]}]}],"git":{"updatedTime":1720425980000},"filePathRelative":"FAQ/FAQ-GeneralBitcoinPrivacy.md"}');export{$ as comp,J as data}; diff --git a/assets/FAQ-Installation.html-LTT39ng4.js b/assets/FAQ-Installation.html-a94aUrlk.js similarity index 99% rename from assets/FAQ-Installation.html-LTT39ng4.js rename to assets/FAQ-Installation.html-a94aUrlk.js index 6c7ebd90f..2a667d3c6 100644 --- a/assets/FAQ-Installation.html-LTT39ng4.js +++ b/assets/FAQ-Installation.html-a94aUrlk.js @@ -1 +1 @@ -import{_ as s}from"./Logo_without_text_with_bg_dark_with_yt-D8lqXhN0.js";import{_ as h,a as d,b as c,c as u,d as b}from"./DownloadMac-DUSPDgNE.js";import{_ as w,r,o as p,c as f,a as e,b as a,d as t,w as i,e as l}from"./app-3S7gIoGc.js";const g="/UpdateAvailable.png",_={},m=l('

    Installation of Wasabi

    Installing the Package

    Where can I download Wasabi?

    ',3),y={href:"https://wasabiwallet.io",target:"_blank",rel:"noopener noreferrer"},v={href:"http://wasabiukrxmkdgve5kynjztuovbg43uxcbcxn6y2okcrsg7gb6jdmbad.onion",target:"_blank",rel:"noopener noreferrer"},k={href:"https://github.com/WalletWasabi/walletwasabi/releases",target:"_blank",rel:"noopener noreferrer"},W={href:"https://github.com/WalletWasabi/walletwasabi",target:"_blank",rel:"noopener noreferrer"},x={href:"https://github.com/WalletWasabi/WalletWasabi/blob/master/PGP.txt",target:"_blank",rel:"noopener noreferrer"},I=e("h3",{id:"why-is-it-important-to-verify-pgp-signatures",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#why-is-it-important-to-verify-pgp-signatures"},[e("span",null,"Why is it important to verify PGP signatures?")])],-1),P=e("div",{class:"custom-container danger"},[e("p",{class:"custom-container-title"},"DANGER"),e("p",null,[e("strong",null,"Don't trust ~ verify.")])],-1),A=e("p",null,[a("These are not just empty words. Self sovereignty is at the core of Bitcoin in general, and Wasabi specifically. You have powerful tools at your disposal, yet they only work when used as they are designed. Wasabi is tailor made so that you do "),e("strong",null,"not"),a(" have to trust anyone, but you have the power to verify everything.")],-1),T={href:"https://zksnacks.com/",target:"_blank",rel:"noopener noreferrer"},F={href:"https://github.com/WalletWasabi/WalletWasabi/blob/master/PGP.txt",target:"_blank",rel:"noopener noreferrer"},S={href:"https://pgp.key-server.io/search/zksnacks",target:"_blank",rel:"noopener noreferrer"},D={href:"https://en.wikipedia.org/wiki/Web_of_trust",target:"_blank",rel:"noopener noreferrer"},G={href:"https://youtu.be/psl35MisYxo?list=PLPj3KCksGbSZkVpgAZjAFfFp4D0SHLnFw",target:"_blank",rel:"noopener noreferrer"},H=e("img",{src:s,alt:"Watch the video"},null,-1),z=e("h3",{id:"how-can-i-verify-pgp-signatures",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-can-i-verify-pgp-signatures"},[e("span",null,"How can I verify PGP signatures?")])],-1),B={href:"https://wasabiwallet.io",target:"_blank",rel:"noopener noreferrer"},C=e("code",null,".asc",-1),O=e("code",null,"gpg --verify",-1),N=e("p",null,[a("Everything is valid if it returns "),e("code",null,"Good signature from zkSNACKs"),a(" and that it was signed with the "),e("code",null,"Primary key fingerprint: 6FB3 872B 5D42 292F 5992 0797 8563 4832 8949 861E"),a(".")],-1),j={href:"https://youtu.be/mTrClVA_o5A",target:"_blank",rel:"noopener noreferrer"},U=e("img",{src:s,alt:"Watch the video"},null,-1),E=e("h3",{id:"how-do-i-install-wasabi-on-debian-and-ubuntu",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-do-i-install-wasabi-on-debian-and-ubuntu"},[e("span",null,"How do I install Wasabi on Debian and Ubuntu?")])],-1),L=e("code",null,".deb",-1),Q=e("code",null,".deb.asc",-1),K={href:"https://wasabiwallet.io",target:"_blank",rel:"noopener noreferrer"},V={href:"http://wasabiukrxmkdgve5kynjztuovbg43uxcbcxn6y2okcrsg7gb6jdmbad.onion",target:"_blank",rel:"noopener noreferrer"},R=e("p",null,[e("img",{src:h,alt:"Download Wasabi Wallet for Debian",title:"Download Wasabi Wallet for Debian"})],-1),X=e("code",null,"gpg --verify Wasabi-2.0.8.1.deb.asc Wasabi-2.0.8.1.deb",-1),Y={href:"https://github.com/WalletWasabi/WalletWasabi/blob/master/PGP.txt",target:"_blank",rel:"noopener noreferrer"},q=e("code",null,"sudo apt install ./Wasabi-2.0.8.1.deb",-1),M=e("code",null,"wassabee",-1),Z={href:"https://youtu.be/mTrClVA_o5A?t=122",target:"_blank",rel:"noopener noreferrer"},J=e("img",{src:s,alt:"Watch the video"},null,-1),$=e("h3",{id:"how-do-i-install-wasabi-on-other-linux",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-do-i-install-wasabi-on-other-linux"},[e("span",null,"How do I install Wasabi on other Linux?")])],-1),ee=e("code",null,".tar.gz",-1),ae=e("code",null,".tar.gz.asc",-1),te={href:"https://wasabiwallet.io",target:"_blank",rel:"noopener noreferrer"},oe={href:"http://wasabiukrxmkdgve5kynjztuovbg43uxcbcxn6y2okcrsg7gb6jdmbad.onion",target:"_blank",rel:"noopener noreferrer"},ne=e("p",null,[e("img",{src:d,alt:"Download Wasabi Wallet for Linux",title:"Download Wasabi Wallet for Linux"})],-1),ie=e("code",null,"gpg --verify Wasabi-2.0.8.1.tar.gz.asc Wasabi-2.0.8.1.tar.gz",-1),se={href:"https://github.com/WalletWasabi/WalletWasabi/blob/master/PGP.txt",target:"_blank",rel:"noopener noreferrer"},le=e("code",null,"sudo tar -pxzf Wasabi-2.0.8.1.tar.gz",-1),re=e("code",null,"./wassabee",-1),he=e("h3",{id:"how-do-i-install-wasabi-on-windows",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-do-i-install-wasabi-on-windows"},[e("span",null,"How do I install Wasabi on Windows?")])],-1),de=e("code",null,".msi",-1),ce=e("code",null,".msi.asc",-1),ue={href:"https://wasabiwallet.io",target:"_blank",rel:"noopener noreferrer"},be={href:"http://wasabiukrxmkdgve5kynjztuovbg43uxcbcxn6y2okcrsg7gb6jdmbad.onion",target:"_blank",rel:"noopener noreferrer"},we=e("p",null,[e("img",{src:c,alt:"Download Wasabi Wallet for Windows",title:"Download Wasabi Wallet for Windows"})],-1),pe=e("p",null,"The Wasabi package is signed and automatically verified on Windows upon installation.",-1),fe=e("p",null,[e("img",{src:u,alt:"Wasabi Wallet Windows signature verification",title:"Wasabi Wallet Windows signature verification"})],-1),ge=e("code",null,"right-clicking on the signature file > More GpgEX options > Verify",-1),_e={href:"https://github.com/WalletWasabi/WalletWasabi/blob/master/PGP.txt",target:"_blank",rel:"noopener noreferrer"},me=e("code",null,".msi",-1),ye=e("h3",{id:"how-do-i-install-wasabi-on-macos",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-do-i-install-wasabi-on-macos"},[e("span",null,"How do I install Wasabi on macOS?")])],-1),ve=e("code",null,".dmg",-1),ke=e("code",null,".dmg.asc",-1),We={href:"https://wasabiwallet.io",target:"_blank",rel:"noopener noreferrer"},xe={href:"http://wasabiukrxmkdgve5kynjztuovbg43uxcbcxn6y2okcrsg7gb6jdmbad.onion",target:"_blank",rel:"noopener noreferrer"},Ie=e("p",null,[e("img",{src:b,alt:"Download Wasabi Wallet for macOS",title:"Download Wasabi Wallet for macOS"})],-1),Pe=e("p",null,"The Wasabi package is signed and automatically verified on macOS upon installation.",-1),Ae=e("code",null,"sudo gpg2 --verify Wasabi-2.0.8.1.dmg.asc",-1),Te={href:"https://github.com/WalletWasabi/WalletWasabi/blob/master/PGP.txt",target:"_blank",rel:"noopener noreferrer"},Fe=e("code",null,".dmg",-1),Se={href:"https://youtu.be/_Zmc54XYzBA",target:"_blank",rel:"noopener noreferrer"},De=e("img",{src:s,alt:"Watch the video"},null,-1),Ge=l('

    Why are there two different packages for macOS (intel and Apple Silicon)?

    Intel and Apple Silicon are two different processors types that Apple uses for their computers. These processors work a bit differently from each other. With the architecture that Wasabi uses, these two different processors need their own specific code binary in order to make it work.

    What happens when I install the wrong package for macOS?

    Wasabi will crash on startup or run significantly slower than it should. This will not harm your computer.

    Do I need to install Tor separately?

    No, because Wasabi has Tor built into the software. All Wasabi network traffic goes via Tor by default - no need to set up Tor yourself.

    You can turn off Tor in the Settings. Be careful, as this will compromise your privacy. When you coinjoin over clearnet, the coordinator would know the links between your inputs and outputs based on your IP address. When you broadcast a transaction over clearnet, the connected full node will know the link between your transaction and your IP address.

    Can I use Wasabi on Tails?

    ',8),He={href:"https://github.com/WalletWasabi/WalletWasabi/releases/tag/v2.0.8",target:"_blank",rel:"noopener noreferrer"},ze=e("code",null,"--UseTor=EnabledOnlyRunning",-1),Be=e("code",null,'"UseTor": "EnabledOnlyRunning"',-1),Ce=e("h3",{id:"can-i-use-wasabi-on-whonix",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#can-i-use-wasabi-on-whonix"},[e("span",null,"Can I use Wasabi on Whonix?")])],-1),Oe={href:"https://github.com/WalletWasabi/WalletWasabi/releases/tag/v2.0.8",target:"_blank",rel:"noopener noreferrer"},Ne=e("code",null,"--UseTor=EnabledOnlyRunning",-1),je=e("code",null,'"UseTor": "EnabledOnlyRunning"',-1),Ue=l('

    What are the differences between the Debian/Ubuntu version and the "Other Linux" version?

    Debian/Ubuntu version contains .deb package. Other Linux version contains .tar.gz package.

    The advantages of the .deb format is solely packaging related. It installs Wasabi in your computer, so you're able to access it from start menu, remove it through apt, and so on.

    The "Other Linux" option is just a generic install method not targeted to Debian/Ubuntu specifically but that works on it anyway because it is still linux.

    There's no difference in the code, the same binaries are being delivered in different formats.

    Update Wasabi

    Why should I update Wasabi?

    Wasabi is cutting edge software and is being worked on by the developers on a daily basis. Once in a while (+- every month) all the changes/improvements are being released in a new Wasabi version. The changes can contain (critical) bug fixes, small improvements, new features etc. It's always a good idea to run (one of) the latest Wasabi versions.

    How do I check the current version of Wasabi?

    In the GUI, go to the SearchBar at the top of the screen and click on About Wasabi. Here the current version of your Wasabi is displayed.

    You can also verify the version using the command line by executing wassabeed --version.

    Wasabi is cutting edge software, so it is well-advised to stay up-to-date.

    How do I know about a new version of Wasabi?

    When a new major version [v2.X.X] has been released, you'll see an orange update icon in the bottom right, upon hovering over it you can see Version 2.X.X is now available.

    Wasabi Update Available

    ',15),Ee=e("code",null,"Update",-1),Le={href:"https://wasabiwallet.io",target:"_blank",rel:"noopener noreferrer"},Qe={href:"https://twitter.com/wasabiwallet",target:"_blank",rel:"noopener noreferrer"},Ke={href:"https://reddit.com/r/WasabiWallet/",target:"_blank",rel:"noopener noreferrer"},Ve=e("h3",{id:"how-do-i-securely-upgrade-wasabi",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-do-i-securely-upgrade-wasabi"},[e("span",null,"How do I securely upgrade Wasabi?")])],-1),Re=e("p",null,"To upgrade Wasabi, you need to download the new version. Downloading and installing the newer Wasabi package will overwrite the previous one, while preserving your files like your wallets etc. So to upgrade Wasabi, simply download and install the new version like at first install.",-1),Xe={href:"https://wasabiwallet.io",target:"_blank",rel:"noopener noreferrer"},Ye={href:"http://wasabiukrxmkdgve5kynjztuovbg43uxcbcxn6y2okcrsg7gb6jdmbad.onion",target:"_blank",rel:"noopener noreferrer"},qe={href:"https://github.com/WalletWasabi/WalletWasabi/blob/master/PGP.txt",target:"_blank",rel:"noopener noreferrer"},Me={href:"https://youtu.be/DUc9A76rwX4",target:"_blank",rel:"noopener noreferrer"},Ze=e("img",{src:s,alt:"Watch the video"},null,-1),Je=l('

    What does Auto download new version in the settings mean?

    If enabled, the software will automatically download the new version's installer upon a new release. If disabled, the software will only signal, but not automatically download, that there is a new version available.

    Auto download new version is currently only available for Windows and macOS

    For Linux, this setting does not work. A new version will have to be installed manually.

    How does the Auto download new version work?

    ',4),$e={href:"https://github.com/WalletWasabi/WalletWasabi/",target:"_blank",rel:"noopener noreferrer"},ea=e("h2",{id:"advanced-installation",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#advanced-installation"},[e("span",null,"Advanced Installation")])],-1),aa=e("h3",{id:"how-do-i-compile-wasabi-from-source",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-do-i-compile-wasabi-from-source"},[e("span",null,"How do I compile Wasabi from source?")])],-1),ta={href:"https://git-scm.com/downloads",target:"_blank",rel:"noopener noreferrer"},oa={href:"https://dotnet.microsoft.com/download",target:"_blank",rel:"noopener noreferrer"},na=e("code",null,"git clone https://github.com/WalletWasabi/WalletWasabi.git",-1),ia=e("code",null,"WalletWasabi",-1),sa=e("code",null,"cd WalletWasabi/WalletWasabi.Fluent.Desktop",-1),la=e("code",null,"dotnet run",-1),ra=e("code",null,"WalletWasabi.Fluent.Desktop",-1),ha=e("code",null,"git pull",-1),da=e("h3",{id:"how-can-i-verify-the-deterministic-build",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-can-i-verify-the-deterministic-build"},[e("span",null,"How can I verify the deterministic build?")])],-1),ca={href:"https://github.com/WalletWasabi/WalletWasabi/blob/master/WalletWasabi.Documentation/Guides/DeterministicBuildGuide.md",target:"_blank",rel:"noopener noreferrer"},ua=e("h3",{id:"my-antivirus-marks-wasabi-wallet-as-a-virus-am-i-downloading-the-right-software",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#my-antivirus-marks-wasabi-wallet-as-a-virus-am-i-downloading-the-right-software"},[e("span",null,"My antivirus marks Wasabi Wallet as a virus. Am I downloading the right software?")])],-1),ba={href:"https://wasabiwallet.io",target:"_blank",rel:"noopener noreferrer"},wa={href:"https://github.com/WalletWasabi/WalletWasabi/releases",target:"_blank",rel:"noopener noreferrer"},pa=e("p",null,"If you have downloaded and verified digital signatures and your antivirus continues to report Wasabi as positive, you don't have to worry about anything; it is a false positive.",-1),fa={href:"https://www.virustotal.com/",target:"_blank",rel:"noopener noreferrer"},ga=l('

    TIP

    Remember to report Wasabi as a safe software/false positive to your antivirus. In doing so you will help users who use the same antivirus.

    Why is the executable called wassabee?

    The most obvious thing would be to call the executable Wasabi Wallet.exe on Windows and Wasabi Wallet on Linux and Mac.

    However launching Wasabi Wallet from certain terminals/command lines is problematic, so we should remove the spacing: WasabiWallet, and the case sensitivity differences between the operating systems can also cause issues, so that must go too: wasabiwallet.

    But it's too long, it needs a faster way to launch: wasabi.

    However this is too generic, it'll certainly cause conflicts, we need to make it unique: wassabee.

    ',6),_a={href:"https://www.youtube.com/watch?v=dLzFKx6ONZQ",target:"_blank",rel:"noopener noreferrer"};function ma(ya,va){const o=r("ExternalLinkIcon"),n=r("RouteLink");return p(),f("div",null,[m,e("p",null,[a("You can find the recent version of the compiled packages for Linux, Windows and Mac available on the official "),e("a",y,[a("wasabiwallet.io"),t(o)]),a(". It's always best to download software directly from the official source acknowledged by the developers. In order to preserve your network level privacy from the very first step on, please consider visiting the Tor onion service "),e("a",v,[a("wasabiukrxmkdgve5kynjztuovbg43uxcbcxn6y2okcrsg7gb6jdmbad.onion"),t(o)]),a(". The old versions of the software can be found in the "),e("a",k,[a("releases"),t(o)]),a(" of the GitHub repository, "),e("a",W,[a("here"),t(o)]),a(" you also find the libre & open source code for when you want to "),t(n,{to:"/using-wasabi/BuildSource.html"},{default:i(()=>[a("build it yourself")]),_:1}),a(". Please take special care to verify the PGP signatures of zkSNACKs' PGP public key "),e("a",x,[a("6FB3 872B 5D42 292F 5992 0797 8563 4832 8949 861E"),t(o)]),a(" over the software packages and code commits.")]),I,P,A,e("p",null,[a("With PGP signatures you can verify that the software package you download is actually the one by the developers. Every release of Wasabi is signed by "),e("a",T,[a("zkSNACKs"),t(o)]),a(", the company behind Wasabi. You can verify that the PGP public key "),e("a",F,[a("6FB3 872B 5D42 292F 5992 0797 8563 4832 8949 861E"),t(o)]),a(" is actually the one of "),e("a",S,[a("zkSNACKs"),t(o)]),a(" by exploring the "),e("a",D,[a("web of trust"),t(o)]),a(". When you have a software package that was signed by this PGP public key, then you can be sure that this is an official release approved by zkSNACKs. This protects you against malicious man in the middle attacks where bad guys give you a fake version of Wasabi with malicious code.")]),e("p",null,[e("a",G,[H,t(o)])]),z,e("p",null,[a("On the "),e("a",B,[a("WasabiWallet.io"),t(o)]),a(" website you can download the packages of the latest release. To verify the signature you also need to download the separate signature "),C,a(" file. In the terminal, change the directory to the one with the downloaded files, and verify the signature with "),O,a(" + the corresponding signature file name, depending on which operating system you are.")]),N,e("p",null,[a("For an in-depth guide for "),t(n,{to:"/using-wasabi/InstallPackage.html#debian-and-ubuntu"},{default:i(()=>[a("Debian and Ubuntu")]),_:1}),a(", "),t(n,{to:"/using-wasabi/InstallPackage.html#other-linux"},{default:i(()=>[a("other Linux")]),_:1}),a(", "),t(n,{to:"/using-wasabi/InstallPackage.html#windows"},{default:i(()=>[a("Windows")]),_:1}),a(", and "),t(n,{to:"/using-wasabi/InstallPackage.html#macOS"},{default:i(()=>[a("macOS")]),_:1}),a(" see the main documentation.")]),e("p",null,[e("a",j,[U,t(o)])]),E,e("p",null,[t(n,{to:"/FAQ/FAQ-Installation.html#where-can-i-download-wasabi"},{default:i(()=>[a("Download")]),_:1}),a(" the most recent "),L,a(" package and the "),Q,a(" signature file from the "),e("a",K,[a("wasabiwallet.io"),t(o)]),a(" or the "),e("a",V,[a("Tor onion service"),t(o)]),a(".")]),R,e("p",null,[a("Verify the signature of the package with "),X,a(" and ensure that the software was signed by zkSNACKs' PGP public key "),e("a",Y,[a("6FB3 872B 5D42 292F 5992 0797 8563 4832 8949 861E"),t(o)]),a(".")]),e("p",null,[a("Now install Wasabi with "),q,a(", and run it with "),M,a(". Check out the main documentation for a "),t(n,{to:"/using-wasabi/InstallPackage.html#debian-and-ubuntu"},{default:i(()=>[a("step-by-step guide")]),_:1}),a(".")]),e("p",null,[e("a",Z,[J,t(o)])]),$,e("p",null,[t(n,{to:"/FAQ/FAQ-Installation.html#where-can-i-download-wasabi"},{default:i(()=>[a("Download")]),_:1}),a(" the most recent "),ee,a(" package and the "),ae,a(" signature file from the "),e("a",te,[a("wasabiwallet.io"),t(o)]),a(" or the "),e("a",oe,[a("Tor onion service"),t(o)]),a(".")]),ne,e("p",null,[a("Verify the signature of the package with "),ie,a(" and ensure that the software was signed by zkSNACKs' PGP public key "),e("a",se,[a("6FB3 872B 5D42 292F 5992 0797 8563 4832 8949 861E"),t(o)]),a(". Now install Wasabi with "),le,a(", and run it with "),re,a(". Check out the main documentation for a "),t(n,{to:"/using-wasabi/InstallPackage.html#other-linux"},{default:i(()=>[a("step-by-step guide")]),_:1}),a(".")]),he,e("p",null,[t(n,{to:"/FAQ/FAQ-Installation.html#where-can-i-download-wasabi"},{default:i(()=>[a("Download")]),_:1}),a(" the most recent "),de,a(" package and the "),ce,a(" signature file from the "),e("a",ue,[a("wasabiwallet.io"),t(o)]),a(" or the "),e("a",be,[a("Tor onion service"),t(o)]),a(".")]),we,pe,fe,e("p",null,[a("Optionally, you can still verify the PGP signature of the package by "),ge,a(" and ensure the software was signed by zkSNACKs' PGP public key "),e("a",_e,[a("6FB3 872B 5D42 292F 5992 0797 8563 4832 8949 861E"),t(o)]),a(". Now install Wasabi by double-clicking the "),me,a(" file. Check out the main documentation for a "),t(n,{to:"/using-wasabi/InstallPackage.html#windows"},{default:i(()=>[a("step-by-step guide")]),_:1}),a(".")]),ye,e("p",null,[t(n,{to:"/FAQ-Installation.html#where-can-i-download-wasabi"},{default:i(()=>[a("Download")]),_:1}),a(" the most recent "),ve,a(" package and the "),ke,a(" signature file from the "),e("a",We,[a("wasabiwallet.io"),t(o)]),a(" or the "),e("a",xe,[a("Tor onion service"),t(o)]),a(".")]),Ie,Pe,e("p",null,[a("Optionally, you can still verify the PGP signature of the package with "),Ae,a(" and ensure that the software has been signed by zkSNACKs' PGP public key "),e("a",Te,[a("6FB3 872B 5D42 292F 5992 0797 8563 4832 8949 861E"),t(o)]),a(". Now install Wasabi by double-clicking the "),Fe,a(" file. Check out the main documentation for a "),t(n,{to:"/using-wasabi/InstallPackage.html#macos"},{default:i(()=>[a("step-by-step guide")]),_:1}),a(".")]),e("p",null,[e("a",Se,[De,t(o)])]),Ge,e("p",null,[a("Since Wasabi version "),e("a",He,[a("2.0.8"),t(o)]),a(" it is possible to run Wasabi on Tails. To make it work, Wasabi should be started with the "),ze,a(" start up parameter or specify "),Be,a(" in the config file. So Wasabi uses the existing Tor process, instead of starting a new one.")]),Ce,e("p",null,[a("Since Wasabi version "),e("a",Oe,[a("2.0.8"),t(o)]),a(" it is possible to run Wasabi on Whonix. To make it work, Wasabi should be started with the "),Ne,a(" start up parameter or specify "),je,a(" in the config file. So Wasabi uses the existing Tor process, instead of starting a new one.")]),Ue,e("p",null,[a("Clicking on "),Ee,a(" uses the default browser to go to the website, where you can download this new version. There are occasional silent releases like [v2.X.X.X] which fix small issues, and these are not announced in the GUI, so you will not see the orange update icon. The "),e("a",Le,[a("website"),t(o)]),a(" always contains the most recent version. All releases (major and minor) are announced on the social media like "),e("a",Qe,[a("Twitter"),t(o)]),a(" and "),e("a",Ke,[a("Reddit"),t(o)]),a(".")]),Ve,Re,e("p",null,[a("You can download the software build for the different operating systems on the main "),e("a",Xe,[a("website"),t(o)]),a(" or better over "),e("a",Ye,[a("Tor"),t(o)]),a(". For extra security, it is reccommended to also download the signatures of the build and verify them with "),e("a",qe,[a("zkSNACKs' PGP public key"),t(o)]),a(". For step-by-step instructions, follow "),t(n,{to:"/using-wasabi/InstallPackage.html"},{default:i(()=>[a("this guide")]),_:1}),a(" or see this video: "),e("a",Me,[Ze,t(o)])]),Je,e("p",null,[a(`The software will automatically download the new version's installer upon a new release. After it is downloaded, the user can press "Update on Close" to run the installer when closing Wasabi. The installer is downloaded from `),e("a",$e,[a("GitHub"),t(o)]),a(".")]),ea,aa,e("p",null,[a("If you cannot wait until the next release, and you want to experience the most cutting-edge version of Wasabi, then you can "),t(n,{to:"/using-wasabi/BuildSource.html"},{default:i(()=>[a("build the source code")]),_:1}),a(".")]),e("p",null,[a("The only two required tools are "),e("a",ta,[a("Git"),t(o)]),a(" and "),e("a",oa,[a(".NET 8.0 SDK"),t(o)]),a(' for "Build apps". You can download every line of the Wasabi code by '),na,a(", this will create a new directory called "),ia,a(". In order to build and run the Wallet software, change directory to "),sa,a(". Wasabi is written in C# with the .NET framework, and it is very easy to run it. Simply execute "),la,a(" from the "),ra,a(" folder. You can update the master branch with "),ha,a(".")]),da,e("p",null,[a("The guide for the deterministic builds can be found in the "),e("a",ca,[a("WalletWasabi repository"),t(o)]),a(".")]),ua,e("p",null,[a("After you have downloaded Wasabi from the "),e("a",ba,[a("official website"),t(o)]),a(" or from the "),e("a",wa,[a("official GitHub repository"),t(o)]),a(", make sure you have "),t(n,{to:"/FAQ/FAQ-Installation.html#how-can-i-verify-pgp-signatures"},{default:i(()=>[a("verified the PGP signatures")]),_:1}),a(".")]),pa,e("p",null,[a("If you are still not sure, before starting Wasabi, you can check that it is safe by uploading and scan it via "),e("a",fa,[a("VirusTotal"),t(o)]),a(".")]),ga,e("p",null,[a("Also, this sounds awesome and is a "),e("a",_a,[a("fun inside joke"),t(o)]),a(".")])])}const Ia=w(_,[["render",ma],["__file","FAQ-Installation.html.vue"]]),Pa=JSON.parse('{"path":"/FAQ/FAQ-Installation.html","title":"Installation FAQ","lang":"en-US","frontmatter":{"title":"Installation FAQ","description":"Frequently asked questions about how to properly install Wasabi Wallet. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Installing the Package","slug":"installing-the-package","link":"#installing-the-package","children":[{"level":3,"title":"Where can I download Wasabi?","slug":"where-can-i-download-wasabi","link":"#where-can-i-download-wasabi","children":[]},{"level":3,"title":"Why is it important to verify PGP signatures?","slug":"why-is-it-important-to-verify-pgp-signatures","link":"#why-is-it-important-to-verify-pgp-signatures","children":[]},{"level":3,"title":"How can I verify PGP signatures?","slug":"how-can-i-verify-pgp-signatures","link":"#how-can-i-verify-pgp-signatures","children":[]},{"level":3,"title":"How do I install Wasabi on Debian and Ubuntu?","slug":"how-do-i-install-wasabi-on-debian-and-ubuntu","link":"#how-do-i-install-wasabi-on-debian-and-ubuntu","children":[]},{"level":3,"title":"How do I install Wasabi on other Linux?","slug":"how-do-i-install-wasabi-on-other-linux","link":"#how-do-i-install-wasabi-on-other-linux","children":[]},{"level":3,"title":"How do I install Wasabi on Windows?","slug":"how-do-i-install-wasabi-on-windows","link":"#how-do-i-install-wasabi-on-windows","children":[]},{"level":3,"title":"How do I install Wasabi on macOS?","slug":"how-do-i-install-wasabi-on-macos","link":"#how-do-i-install-wasabi-on-macos","children":[]},{"level":3,"title":"Why are there two different packages for macOS (intel and Apple Silicon)?","slug":"why-are-there-two-different-packages-for-macos-intel-and-apple-silicon","link":"#why-are-there-two-different-packages-for-macos-intel-and-apple-silicon","children":[]},{"level":3,"title":"What happens when I install the wrong package for macOS?","slug":"what-happens-when-i-install-the-wrong-package-for-macos","link":"#what-happens-when-i-install-the-wrong-package-for-macos","children":[]},{"level":3,"title":"Do I need to install Tor separately?","slug":"do-i-need-to-install-tor-separately","link":"#do-i-need-to-install-tor-separately","children":[]},{"level":3,"title":"Can I use Wasabi on Tails?","slug":"can-i-use-wasabi-on-tails","link":"#can-i-use-wasabi-on-tails","children":[]},{"level":3,"title":"Can I use Wasabi on Whonix?","slug":"can-i-use-wasabi-on-whonix","link":"#can-i-use-wasabi-on-whonix","children":[]},{"level":3,"title":"What are the differences between the Debian/Ubuntu version and the \\"Other Linux\\" version?","slug":"what-are-the-differences-between-the-debian-ubuntu-version-and-the-other-linux-version","link":"#what-are-the-differences-between-the-debian-ubuntu-version-and-the-other-linux-version","children":[]}]},{"level":2,"title":"Update Wasabi","slug":"update-wasabi","link":"#update-wasabi","children":[{"level":3,"title":"Why should I update Wasabi?","slug":"why-should-i-update-wasabi","link":"#why-should-i-update-wasabi","children":[]},{"level":3,"title":"How do I check the current version of Wasabi?","slug":"how-do-i-check-the-current-version-of-wasabi","link":"#how-do-i-check-the-current-version-of-wasabi","children":[]},{"level":3,"title":"How do I know about a new version of Wasabi?","slug":"how-do-i-know-about-a-new-version-of-wasabi","link":"#how-do-i-know-about-a-new-version-of-wasabi","children":[]},{"level":3,"title":"How do I securely upgrade Wasabi?","slug":"how-do-i-securely-upgrade-wasabi","link":"#how-do-i-securely-upgrade-wasabi","children":[]},{"level":3,"title":"What does Auto download new version in the settings mean?","slug":"what-does-auto-download-new-version-in-the-settings-mean","link":"#what-does-auto-download-new-version-in-the-settings-mean","children":[]},{"level":3,"title":"How does the Auto download new version work?","slug":"how-does-the-auto-download-new-version-work","link":"#how-does-the-auto-download-new-version-work","children":[]}]},{"level":2,"title":"Advanced Installation","slug":"advanced-installation","link":"#advanced-installation","children":[{"level":3,"title":"How do I compile Wasabi from source?","slug":"how-do-i-compile-wasabi-from-source","link":"#how-do-i-compile-wasabi-from-source","children":[]},{"level":3,"title":"How can I verify the deterministic build?","slug":"how-can-i-verify-the-deterministic-build","link":"#how-can-i-verify-the-deterministic-build","children":[]},{"level":3,"title":"My antivirus marks Wasabi Wallet as a virus. Am I downloading the right software?","slug":"my-antivirus-marks-wasabi-wallet-as-a-virus-am-i-downloading-the-right-software","link":"#my-antivirus-marks-wasabi-wallet-as-a-virus-am-i-downloading-the-right-software","children":[]},{"level":3,"title":"Why is the executable called wassabee?","slug":"why-is-the-executable-called-wassabee","link":"#why-is-the-executable-called-wassabee","children":[]}]}],"git":{"updatedTime":1720425186000},"filePathRelative":"FAQ/FAQ-Installation.md"}');export{Ia as comp,Pa as data}; +import{_ as s}from"./Logo_without_text_with_bg_dark_with_yt-D8lqXhN0.js";import{_ as h,a as d,b as c,c as u,d as b}from"./DownloadMac-DUSPDgNE.js";import{_ as w,r,o as p,c as f,a as e,b as a,d as t,w as i,e as l}from"./app-CwImt2bI.js";const g="/UpdateAvailable.png",_={},m=l('

    Installation of Wasabi

    Installing the Package

    Where can I download Wasabi?

    ',3),y={href:"https://wasabiwallet.io",target:"_blank",rel:"noopener noreferrer"},v={href:"http://wasabiukrxmkdgve5kynjztuovbg43uxcbcxn6y2okcrsg7gb6jdmbad.onion",target:"_blank",rel:"noopener noreferrer"},k={href:"https://github.com/WalletWasabi/walletwasabi/releases",target:"_blank",rel:"noopener noreferrer"},W={href:"https://github.com/WalletWasabi/walletwasabi",target:"_blank",rel:"noopener noreferrer"},x={href:"https://github.com/WalletWasabi/WalletWasabi/blob/master/PGP.txt",target:"_blank",rel:"noopener noreferrer"},I=e("h3",{id:"why-is-it-important-to-verify-pgp-signatures",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#why-is-it-important-to-verify-pgp-signatures"},[e("span",null,"Why is it important to verify PGP signatures?")])],-1),P=e("div",{class:"custom-container danger"},[e("p",{class:"custom-container-title"},"DANGER"),e("p",null,[e("strong",null,"Don't trust ~ verify.")])],-1),A=e("p",null,[a("These are not just empty words. Self sovereignty is at the core of Bitcoin in general, and Wasabi specifically. You have powerful tools at your disposal, yet they only work when used as they are designed. Wasabi is tailor made so that you do "),e("strong",null,"not"),a(" have to trust anyone, but you have the power to verify everything.")],-1),T={href:"https://zksnacks.com/",target:"_blank",rel:"noopener noreferrer"},F={href:"https://github.com/WalletWasabi/WalletWasabi/blob/master/PGP.txt",target:"_blank",rel:"noopener noreferrer"},S={href:"https://pgp.key-server.io/search/zksnacks",target:"_blank",rel:"noopener noreferrer"},D={href:"https://en.wikipedia.org/wiki/Web_of_trust",target:"_blank",rel:"noopener noreferrer"},G={href:"https://youtu.be/psl35MisYxo?list=PLPj3KCksGbSZkVpgAZjAFfFp4D0SHLnFw",target:"_blank",rel:"noopener noreferrer"},H=e("img",{src:s,alt:"Watch the video"},null,-1),z=e("h3",{id:"how-can-i-verify-pgp-signatures",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-can-i-verify-pgp-signatures"},[e("span",null,"How can I verify PGP signatures?")])],-1),B={href:"https://wasabiwallet.io",target:"_blank",rel:"noopener noreferrer"},C=e("code",null,".asc",-1),O=e("code",null,"gpg --verify",-1),N=e("p",null,[a("Everything is valid if it returns "),e("code",null,"Good signature from zkSNACKs"),a(" and that it was signed with the "),e("code",null,"Primary key fingerprint: 6FB3 872B 5D42 292F 5992 0797 8563 4832 8949 861E"),a(".")],-1),j={href:"https://youtu.be/mTrClVA_o5A",target:"_blank",rel:"noopener noreferrer"},U=e("img",{src:s,alt:"Watch the video"},null,-1),E=e("h3",{id:"how-do-i-install-wasabi-on-debian-and-ubuntu",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-do-i-install-wasabi-on-debian-and-ubuntu"},[e("span",null,"How do I install Wasabi on Debian and Ubuntu?")])],-1),L=e("code",null,".deb",-1),Q=e("code",null,".deb.asc",-1),K={href:"https://wasabiwallet.io",target:"_blank",rel:"noopener noreferrer"},V={href:"http://wasabiukrxmkdgve5kynjztuovbg43uxcbcxn6y2okcrsg7gb6jdmbad.onion",target:"_blank",rel:"noopener noreferrer"},R=e("p",null,[e("img",{src:h,alt:"Download Wasabi Wallet for Debian",title:"Download Wasabi Wallet for Debian"})],-1),X=e("code",null,"gpg --verify Wasabi-2.0.8.1.deb.asc Wasabi-2.0.8.1.deb",-1),Y={href:"https://github.com/WalletWasabi/WalletWasabi/blob/master/PGP.txt",target:"_blank",rel:"noopener noreferrer"},q=e("code",null,"sudo apt install ./Wasabi-2.0.8.1.deb",-1),M=e("code",null,"wassabee",-1),Z={href:"https://youtu.be/mTrClVA_o5A?t=122",target:"_blank",rel:"noopener noreferrer"},J=e("img",{src:s,alt:"Watch the video"},null,-1),$=e("h3",{id:"how-do-i-install-wasabi-on-other-linux",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-do-i-install-wasabi-on-other-linux"},[e("span",null,"How do I install Wasabi on other Linux?")])],-1),ee=e("code",null,".tar.gz",-1),ae=e("code",null,".tar.gz.asc",-1),te={href:"https://wasabiwallet.io",target:"_blank",rel:"noopener noreferrer"},oe={href:"http://wasabiukrxmkdgve5kynjztuovbg43uxcbcxn6y2okcrsg7gb6jdmbad.onion",target:"_blank",rel:"noopener noreferrer"},ne=e("p",null,[e("img",{src:d,alt:"Download Wasabi Wallet for Linux",title:"Download Wasabi Wallet for Linux"})],-1),ie=e("code",null,"gpg --verify Wasabi-2.0.8.1.tar.gz.asc Wasabi-2.0.8.1.tar.gz",-1),se={href:"https://github.com/WalletWasabi/WalletWasabi/blob/master/PGP.txt",target:"_blank",rel:"noopener noreferrer"},le=e("code",null,"sudo tar -pxzf Wasabi-2.0.8.1.tar.gz",-1),re=e("code",null,"./wassabee",-1),he=e("h3",{id:"how-do-i-install-wasabi-on-windows",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-do-i-install-wasabi-on-windows"},[e("span",null,"How do I install Wasabi on Windows?")])],-1),de=e("code",null,".msi",-1),ce=e("code",null,".msi.asc",-1),ue={href:"https://wasabiwallet.io",target:"_blank",rel:"noopener noreferrer"},be={href:"http://wasabiukrxmkdgve5kynjztuovbg43uxcbcxn6y2okcrsg7gb6jdmbad.onion",target:"_blank",rel:"noopener noreferrer"},we=e("p",null,[e("img",{src:c,alt:"Download Wasabi Wallet for Windows",title:"Download Wasabi Wallet for Windows"})],-1),pe=e("p",null,"The Wasabi package is signed and automatically verified on Windows upon installation.",-1),fe=e("p",null,[e("img",{src:u,alt:"Wasabi Wallet Windows signature verification",title:"Wasabi Wallet Windows signature verification"})],-1),ge=e("code",null,"right-clicking on the signature file > More GpgEX options > Verify",-1),_e={href:"https://github.com/WalletWasabi/WalletWasabi/blob/master/PGP.txt",target:"_blank",rel:"noopener noreferrer"},me=e("code",null,".msi",-1),ye=e("h3",{id:"how-do-i-install-wasabi-on-macos",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-do-i-install-wasabi-on-macos"},[e("span",null,"How do I install Wasabi on macOS?")])],-1),ve=e("code",null,".dmg",-1),ke=e("code",null,".dmg.asc",-1),We={href:"https://wasabiwallet.io",target:"_blank",rel:"noopener noreferrer"},xe={href:"http://wasabiukrxmkdgve5kynjztuovbg43uxcbcxn6y2okcrsg7gb6jdmbad.onion",target:"_blank",rel:"noopener noreferrer"},Ie=e("p",null,[e("img",{src:b,alt:"Download Wasabi Wallet for macOS",title:"Download Wasabi Wallet for macOS"})],-1),Pe=e("p",null,"The Wasabi package is signed and automatically verified on macOS upon installation.",-1),Ae=e("code",null,"sudo gpg2 --verify Wasabi-2.0.8.1.dmg.asc",-1),Te={href:"https://github.com/WalletWasabi/WalletWasabi/blob/master/PGP.txt",target:"_blank",rel:"noopener noreferrer"},Fe=e("code",null,".dmg",-1),Se={href:"https://youtu.be/_Zmc54XYzBA",target:"_blank",rel:"noopener noreferrer"},De=e("img",{src:s,alt:"Watch the video"},null,-1),Ge=l('

    Why are there two different packages for macOS (intel and Apple Silicon)?

    Intel and Apple Silicon are two different processors types that Apple uses for their computers. These processors work a bit differently from each other. With the architecture that Wasabi uses, these two different processors need their own specific code binary in order to make it work.

    What happens when I install the wrong package for macOS?

    Wasabi will crash on startup or run significantly slower than it should. This will not harm your computer.

    Do I need to install Tor separately?

    No, because Wasabi has Tor built into the software. All Wasabi network traffic goes via Tor by default - no need to set up Tor yourself.

    You can turn off Tor in the Settings. Be careful, as this will compromise your privacy. When you coinjoin over clearnet, the coordinator would know the links between your inputs and outputs based on your IP address. When you broadcast a transaction over clearnet, the connected full node will know the link between your transaction and your IP address.

    Can I use Wasabi on Tails?

    ',8),He={href:"https://github.com/WalletWasabi/WalletWasabi/releases/tag/v2.0.8",target:"_blank",rel:"noopener noreferrer"},ze=e("code",null,"--UseTor=EnabledOnlyRunning",-1),Be=e("code",null,'"UseTor": "EnabledOnlyRunning"',-1),Ce=e("h3",{id:"can-i-use-wasabi-on-whonix",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#can-i-use-wasabi-on-whonix"},[e("span",null,"Can I use Wasabi on Whonix?")])],-1),Oe={href:"https://github.com/WalletWasabi/WalletWasabi/releases/tag/v2.0.8",target:"_blank",rel:"noopener noreferrer"},Ne=e("code",null,"--UseTor=EnabledOnlyRunning",-1),je=e("code",null,'"UseTor": "EnabledOnlyRunning"',-1),Ue=l('

    What are the differences between the Debian/Ubuntu version and the "Other Linux" version?

    Debian/Ubuntu version contains .deb package. Other Linux version contains .tar.gz package.

    The advantages of the .deb format is solely packaging related. It installs Wasabi in your computer, so you're able to access it from start menu, remove it through apt, and so on.

    The "Other Linux" option is just a generic install method not targeted to Debian/Ubuntu specifically but that works on it anyway because it is still linux.

    There's no difference in the code, the same binaries are being delivered in different formats.

    Update Wasabi

    Why should I update Wasabi?

    Wasabi is cutting edge software and is being worked on by the developers on a daily basis. Once in a while (+- every month) all the changes/improvements are being released in a new Wasabi version. The changes can contain (critical) bug fixes, small improvements, new features etc. It's always a good idea to run (one of) the latest Wasabi versions.

    How do I check the current version of Wasabi?

    In the GUI, go to the SearchBar at the top of the screen and click on About Wasabi. Here the current version of your Wasabi is displayed.

    You can also verify the version using the command line by executing wassabeed --version.

    Wasabi is cutting edge software, so it is well-advised to stay up-to-date.

    How do I know about a new version of Wasabi?

    When a new major version [v2.X.X] has been released, you'll see an orange update icon in the bottom right, upon hovering over it you can see Version 2.X.X is now available.

    Wasabi Update Available

    ',15),Ee=e("code",null,"Update",-1),Le={href:"https://wasabiwallet.io",target:"_blank",rel:"noopener noreferrer"},Qe={href:"https://twitter.com/wasabiwallet",target:"_blank",rel:"noopener noreferrer"},Ke={href:"https://reddit.com/r/WasabiWallet/",target:"_blank",rel:"noopener noreferrer"},Ve=e("h3",{id:"how-do-i-securely-upgrade-wasabi",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-do-i-securely-upgrade-wasabi"},[e("span",null,"How do I securely upgrade Wasabi?")])],-1),Re=e("p",null,"To upgrade Wasabi, you need to download the new version. Downloading and installing the newer Wasabi package will overwrite the previous one, while preserving your files like your wallets etc. So to upgrade Wasabi, simply download and install the new version like at first install.",-1),Xe={href:"https://wasabiwallet.io",target:"_blank",rel:"noopener noreferrer"},Ye={href:"http://wasabiukrxmkdgve5kynjztuovbg43uxcbcxn6y2okcrsg7gb6jdmbad.onion",target:"_blank",rel:"noopener noreferrer"},qe={href:"https://github.com/WalletWasabi/WalletWasabi/blob/master/PGP.txt",target:"_blank",rel:"noopener noreferrer"},Me={href:"https://youtu.be/DUc9A76rwX4",target:"_blank",rel:"noopener noreferrer"},Ze=e("img",{src:s,alt:"Watch the video"},null,-1),Je=l('

    What does Auto download new version in the settings mean?

    If enabled, the software will automatically download the new version's installer upon a new release. If disabled, the software will only signal, but not automatically download, that there is a new version available.

    Auto download new version is currently only available for Windows and macOS

    For Linux, this setting does not work. A new version will have to be installed manually.

    How does the Auto download new version work?

    ',4),$e={href:"https://github.com/WalletWasabi/WalletWasabi/",target:"_blank",rel:"noopener noreferrer"},ea=e("h2",{id:"advanced-installation",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#advanced-installation"},[e("span",null,"Advanced Installation")])],-1),aa=e("h3",{id:"how-do-i-compile-wasabi-from-source",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-do-i-compile-wasabi-from-source"},[e("span",null,"How do I compile Wasabi from source?")])],-1),ta={href:"https://git-scm.com/downloads",target:"_blank",rel:"noopener noreferrer"},oa={href:"https://dotnet.microsoft.com/download",target:"_blank",rel:"noopener noreferrer"},na=e("code",null,"git clone https://github.com/WalletWasabi/WalletWasabi.git",-1),ia=e("code",null,"WalletWasabi",-1),sa=e("code",null,"cd WalletWasabi/WalletWasabi.Fluent.Desktop",-1),la=e("code",null,"dotnet run",-1),ra=e("code",null,"WalletWasabi.Fluent.Desktop",-1),ha=e("code",null,"git pull",-1),da=e("h3",{id:"how-can-i-verify-the-deterministic-build",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-can-i-verify-the-deterministic-build"},[e("span",null,"How can I verify the deterministic build?")])],-1),ca={href:"https://github.com/WalletWasabi/WalletWasabi/blob/master/WalletWasabi.Documentation/Guides/DeterministicBuildGuide.md",target:"_blank",rel:"noopener noreferrer"},ua=e("h3",{id:"my-antivirus-marks-wasabi-wallet-as-a-virus-am-i-downloading-the-right-software",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#my-antivirus-marks-wasabi-wallet-as-a-virus-am-i-downloading-the-right-software"},[e("span",null,"My antivirus marks Wasabi Wallet as a virus. Am I downloading the right software?")])],-1),ba={href:"https://wasabiwallet.io",target:"_blank",rel:"noopener noreferrer"},wa={href:"https://github.com/WalletWasabi/WalletWasabi/releases",target:"_blank",rel:"noopener noreferrer"},pa=e("p",null,"If you have downloaded and verified digital signatures and your antivirus continues to report Wasabi as positive, you don't have to worry about anything; it is a false positive.",-1),fa={href:"https://www.virustotal.com/",target:"_blank",rel:"noopener noreferrer"},ga=l('

    TIP

    Remember to report Wasabi as a safe software/false positive to your antivirus. In doing so you will help users who use the same antivirus.

    Why is the executable called wassabee?

    The most obvious thing would be to call the executable Wasabi Wallet.exe on Windows and Wasabi Wallet on Linux and Mac.

    However launching Wasabi Wallet from certain terminals/command lines is problematic, so we should remove the spacing: WasabiWallet, and the case sensitivity differences between the operating systems can also cause issues, so that must go too: wasabiwallet.

    But it's too long, it needs a faster way to launch: wasabi.

    However this is too generic, it'll certainly cause conflicts, we need to make it unique: wassabee.

    ',6),_a={href:"https://www.youtube.com/watch?v=dLzFKx6ONZQ",target:"_blank",rel:"noopener noreferrer"};function ma(ya,va){const o=r("ExternalLinkIcon"),n=r("RouteLink");return p(),f("div",null,[m,e("p",null,[a("You can find the recent version of the compiled packages for Linux, Windows and Mac available on the official "),e("a",y,[a("wasabiwallet.io"),t(o)]),a(". It's always best to download software directly from the official source acknowledged by the developers. In order to preserve your network level privacy from the very first step on, please consider visiting the Tor onion service "),e("a",v,[a("wasabiukrxmkdgve5kynjztuovbg43uxcbcxn6y2okcrsg7gb6jdmbad.onion"),t(o)]),a(". The old versions of the software can be found in the "),e("a",k,[a("releases"),t(o)]),a(" of the GitHub repository, "),e("a",W,[a("here"),t(o)]),a(" you also find the libre & open source code for when you want to "),t(n,{to:"/using-wasabi/BuildSource.html"},{default:i(()=>[a("build it yourself")]),_:1}),a(". Please take special care to verify the PGP signatures of zkSNACKs' PGP public key "),e("a",x,[a("6FB3 872B 5D42 292F 5992 0797 8563 4832 8949 861E"),t(o)]),a(" over the software packages and code commits.")]),I,P,A,e("p",null,[a("With PGP signatures you can verify that the software package you download is actually the one by the developers. Every release of Wasabi is signed by "),e("a",T,[a("zkSNACKs"),t(o)]),a(", the company behind Wasabi. You can verify that the PGP public key "),e("a",F,[a("6FB3 872B 5D42 292F 5992 0797 8563 4832 8949 861E"),t(o)]),a(" is actually the one of "),e("a",S,[a("zkSNACKs"),t(o)]),a(" by exploring the "),e("a",D,[a("web of trust"),t(o)]),a(". When you have a software package that was signed by this PGP public key, then you can be sure that this is an official release approved by zkSNACKs. This protects you against malicious man in the middle attacks where bad guys give you a fake version of Wasabi with malicious code.")]),e("p",null,[e("a",G,[H,t(o)])]),z,e("p",null,[a("On the "),e("a",B,[a("WasabiWallet.io"),t(o)]),a(" website you can download the packages of the latest release. To verify the signature you also need to download the separate signature "),C,a(" file. In the terminal, change the directory to the one with the downloaded files, and verify the signature with "),O,a(" + the corresponding signature file name, depending on which operating system you are.")]),N,e("p",null,[a("For an in-depth guide for "),t(n,{to:"/using-wasabi/InstallPackage.html#debian-and-ubuntu"},{default:i(()=>[a("Debian and Ubuntu")]),_:1}),a(", "),t(n,{to:"/using-wasabi/InstallPackage.html#other-linux"},{default:i(()=>[a("other Linux")]),_:1}),a(", "),t(n,{to:"/using-wasabi/InstallPackage.html#windows"},{default:i(()=>[a("Windows")]),_:1}),a(", and "),t(n,{to:"/using-wasabi/InstallPackage.html#macOS"},{default:i(()=>[a("macOS")]),_:1}),a(" see the main documentation.")]),e("p",null,[e("a",j,[U,t(o)])]),E,e("p",null,[t(n,{to:"/FAQ/FAQ-Installation.html#where-can-i-download-wasabi"},{default:i(()=>[a("Download")]),_:1}),a(" the most recent "),L,a(" package and the "),Q,a(" signature file from the "),e("a",K,[a("wasabiwallet.io"),t(o)]),a(" or the "),e("a",V,[a("Tor onion service"),t(o)]),a(".")]),R,e("p",null,[a("Verify the signature of the package with "),X,a(" and ensure that the software was signed by zkSNACKs' PGP public key "),e("a",Y,[a("6FB3 872B 5D42 292F 5992 0797 8563 4832 8949 861E"),t(o)]),a(".")]),e("p",null,[a("Now install Wasabi with "),q,a(", and run it with "),M,a(". Check out the main documentation for a "),t(n,{to:"/using-wasabi/InstallPackage.html#debian-and-ubuntu"},{default:i(()=>[a("step-by-step guide")]),_:1}),a(".")]),e("p",null,[e("a",Z,[J,t(o)])]),$,e("p",null,[t(n,{to:"/FAQ/FAQ-Installation.html#where-can-i-download-wasabi"},{default:i(()=>[a("Download")]),_:1}),a(" the most recent "),ee,a(" package and the "),ae,a(" signature file from the "),e("a",te,[a("wasabiwallet.io"),t(o)]),a(" or the "),e("a",oe,[a("Tor onion service"),t(o)]),a(".")]),ne,e("p",null,[a("Verify the signature of the package with "),ie,a(" and ensure that the software was signed by zkSNACKs' PGP public key "),e("a",se,[a("6FB3 872B 5D42 292F 5992 0797 8563 4832 8949 861E"),t(o)]),a(". Now install Wasabi with "),le,a(", and run it with "),re,a(". Check out the main documentation for a "),t(n,{to:"/using-wasabi/InstallPackage.html#other-linux"},{default:i(()=>[a("step-by-step guide")]),_:1}),a(".")]),he,e("p",null,[t(n,{to:"/FAQ/FAQ-Installation.html#where-can-i-download-wasabi"},{default:i(()=>[a("Download")]),_:1}),a(" the most recent "),de,a(" package and the "),ce,a(" signature file from the "),e("a",ue,[a("wasabiwallet.io"),t(o)]),a(" or the "),e("a",be,[a("Tor onion service"),t(o)]),a(".")]),we,pe,fe,e("p",null,[a("Optionally, you can still verify the PGP signature of the package by "),ge,a(" and ensure the software was signed by zkSNACKs' PGP public key "),e("a",_e,[a("6FB3 872B 5D42 292F 5992 0797 8563 4832 8949 861E"),t(o)]),a(". Now install Wasabi by double-clicking the "),me,a(" file. Check out the main documentation for a "),t(n,{to:"/using-wasabi/InstallPackage.html#windows"},{default:i(()=>[a("step-by-step guide")]),_:1}),a(".")]),ye,e("p",null,[t(n,{to:"/FAQ-Installation.html#where-can-i-download-wasabi"},{default:i(()=>[a("Download")]),_:1}),a(" the most recent "),ve,a(" package and the "),ke,a(" signature file from the "),e("a",We,[a("wasabiwallet.io"),t(o)]),a(" or the "),e("a",xe,[a("Tor onion service"),t(o)]),a(".")]),Ie,Pe,e("p",null,[a("Optionally, you can still verify the PGP signature of the package with "),Ae,a(" and ensure that the software has been signed by zkSNACKs' PGP public key "),e("a",Te,[a("6FB3 872B 5D42 292F 5992 0797 8563 4832 8949 861E"),t(o)]),a(". Now install Wasabi by double-clicking the "),Fe,a(" file. Check out the main documentation for a "),t(n,{to:"/using-wasabi/InstallPackage.html#macos"},{default:i(()=>[a("step-by-step guide")]),_:1}),a(".")]),e("p",null,[e("a",Se,[De,t(o)])]),Ge,e("p",null,[a("Since Wasabi version "),e("a",He,[a("2.0.8"),t(o)]),a(" it is possible to run Wasabi on Tails. To make it work, Wasabi should be started with the "),ze,a(" start up parameter or specify "),Be,a(" in the config file. So Wasabi uses the existing Tor process, instead of starting a new one.")]),Ce,e("p",null,[a("Since Wasabi version "),e("a",Oe,[a("2.0.8"),t(o)]),a(" it is possible to run Wasabi on Whonix. To make it work, Wasabi should be started with the "),Ne,a(" start up parameter or specify "),je,a(" in the config file. So Wasabi uses the existing Tor process, instead of starting a new one.")]),Ue,e("p",null,[a("Clicking on "),Ee,a(" uses the default browser to go to the website, where you can download this new version. There are occasional silent releases like [v2.X.X.X] which fix small issues, and these are not announced in the GUI, so you will not see the orange update icon. The "),e("a",Le,[a("website"),t(o)]),a(" always contains the most recent version. All releases (major and minor) are announced on the social media like "),e("a",Qe,[a("Twitter"),t(o)]),a(" and "),e("a",Ke,[a("Reddit"),t(o)]),a(".")]),Ve,Re,e("p",null,[a("You can download the software build for the different operating systems on the main "),e("a",Xe,[a("website"),t(o)]),a(" or better over "),e("a",Ye,[a("Tor"),t(o)]),a(". For extra security, it is reccommended to also download the signatures of the build and verify them with "),e("a",qe,[a("zkSNACKs' PGP public key"),t(o)]),a(". For step-by-step instructions, follow "),t(n,{to:"/using-wasabi/InstallPackage.html"},{default:i(()=>[a("this guide")]),_:1}),a(" or see this video: "),e("a",Me,[Ze,t(o)])]),Je,e("p",null,[a(`The software will automatically download the new version's installer upon a new release. After it is downloaded, the user can press "Update on Close" to run the installer when closing Wasabi. The installer is downloaded from `),e("a",$e,[a("GitHub"),t(o)]),a(".")]),ea,aa,e("p",null,[a("If you cannot wait until the next release, and you want to experience the most cutting-edge version of Wasabi, then you can "),t(n,{to:"/using-wasabi/BuildSource.html"},{default:i(()=>[a("build the source code")]),_:1}),a(".")]),e("p",null,[a("The only two required tools are "),e("a",ta,[a("Git"),t(o)]),a(" and "),e("a",oa,[a(".NET 8.0 SDK"),t(o)]),a(' for "Build apps". You can download every line of the Wasabi code by '),na,a(", this will create a new directory called "),ia,a(". In order to build and run the Wallet software, change directory to "),sa,a(". Wasabi is written in C# with the .NET framework, and it is very easy to run it. Simply execute "),la,a(" from the "),ra,a(" folder. You can update the master branch with "),ha,a(".")]),da,e("p",null,[a("The guide for the deterministic builds can be found in the "),e("a",ca,[a("WalletWasabi repository"),t(o)]),a(".")]),ua,e("p",null,[a("After you have downloaded Wasabi from the "),e("a",ba,[a("official website"),t(o)]),a(" or from the "),e("a",wa,[a("official GitHub repository"),t(o)]),a(", make sure you have "),t(n,{to:"/FAQ/FAQ-Installation.html#how-can-i-verify-pgp-signatures"},{default:i(()=>[a("verified the PGP signatures")]),_:1}),a(".")]),pa,e("p",null,[a("If you are still not sure, before starting Wasabi, you can check that it is safe by uploading and scan it via "),e("a",fa,[a("VirusTotal"),t(o)]),a(".")]),ga,e("p",null,[a("Also, this sounds awesome and is a "),e("a",_a,[a("fun inside joke"),t(o)]),a(".")])])}const Ia=w(_,[["render",ma],["__file","FAQ-Installation.html.vue"]]),Pa=JSON.parse('{"path":"/FAQ/FAQ-Installation.html","title":"Installation FAQ","lang":"en-US","frontmatter":{"title":"Installation FAQ","description":"Frequently asked questions about how to properly install Wasabi Wallet. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Installing the Package","slug":"installing-the-package","link":"#installing-the-package","children":[{"level":3,"title":"Where can I download Wasabi?","slug":"where-can-i-download-wasabi","link":"#where-can-i-download-wasabi","children":[]},{"level":3,"title":"Why is it important to verify PGP signatures?","slug":"why-is-it-important-to-verify-pgp-signatures","link":"#why-is-it-important-to-verify-pgp-signatures","children":[]},{"level":3,"title":"How can I verify PGP signatures?","slug":"how-can-i-verify-pgp-signatures","link":"#how-can-i-verify-pgp-signatures","children":[]},{"level":3,"title":"How do I install Wasabi on Debian and Ubuntu?","slug":"how-do-i-install-wasabi-on-debian-and-ubuntu","link":"#how-do-i-install-wasabi-on-debian-and-ubuntu","children":[]},{"level":3,"title":"How do I install Wasabi on other Linux?","slug":"how-do-i-install-wasabi-on-other-linux","link":"#how-do-i-install-wasabi-on-other-linux","children":[]},{"level":3,"title":"How do I install Wasabi on Windows?","slug":"how-do-i-install-wasabi-on-windows","link":"#how-do-i-install-wasabi-on-windows","children":[]},{"level":3,"title":"How do I install Wasabi on macOS?","slug":"how-do-i-install-wasabi-on-macos","link":"#how-do-i-install-wasabi-on-macos","children":[]},{"level":3,"title":"Why are there two different packages for macOS (intel and Apple Silicon)?","slug":"why-are-there-two-different-packages-for-macos-intel-and-apple-silicon","link":"#why-are-there-two-different-packages-for-macos-intel-and-apple-silicon","children":[]},{"level":3,"title":"What happens when I install the wrong package for macOS?","slug":"what-happens-when-i-install-the-wrong-package-for-macos","link":"#what-happens-when-i-install-the-wrong-package-for-macos","children":[]},{"level":3,"title":"Do I need to install Tor separately?","slug":"do-i-need-to-install-tor-separately","link":"#do-i-need-to-install-tor-separately","children":[]},{"level":3,"title":"Can I use Wasabi on Tails?","slug":"can-i-use-wasabi-on-tails","link":"#can-i-use-wasabi-on-tails","children":[]},{"level":3,"title":"Can I use Wasabi on Whonix?","slug":"can-i-use-wasabi-on-whonix","link":"#can-i-use-wasabi-on-whonix","children":[]},{"level":3,"title":"What are the differences between the Debian/Ubuntu version and the \\"Other Linux\\" version?","slug":"what-are-the-differences-between-the-debian-ubuntu-version-and-the-other-linux-version","link":"#what-are-the-differences-between-the-debian-ubuntu-version-and-the-other-linux-version","children":[]}]},{"level":2,"title":"Update Wasabi","slug":"update-wasabi","link":"#update-wasabi","children":[{"level":3,"title":"Why should I update Wasabi?","slug":"why-should-i-update-wasabi","link":"#why-should-i-update-wasabi","children":[]},{"level":3,"title":"How do I check the current version of Wasabi?","slug":"how-do-i-check-the-current-version-of-wasabi","link":"#how-do-i-check-the-current-version-of-wasabi","children":[]},{"level":3,"title":"How do I know about a new version of Wasabi?","slug":"how-do-i-know-about-a-new-version-of-wasabi","link":"#how-do-i-know-about-a-new-version-of-wasabi","children":[]},{"level":3,"title":"How do I securely upgrade Wasabi?","slug":"how-do-i-securely-upgrade-wasabi","link":"#how-do-i-securely-upgrade-wasabi","children":[]},{"level":3,"title":"What does Auto download new version in the settings mean?","slug":"what-does-auto-download-new-version-in-the-settings-mean","link":"#what-does-auto-download-new-version-in-the-settings-mean","children":[]},{"level":3,"title":"How does the Auto download new version work?","slug":"how-does-the-auto-download-new-version-work","link":"#how-does-the-auto-download-new-version-work","children":[]}]},{"level":2,"title":"Advanced Installation","slug":"advanced-installation","link":"#advanced-installation","children":[{"level":3,"title":"How do I compile Wasabi from source?","slug":"how-do-i-compile-wasabi-from-source","link":"#how-do-i-compile-wasabi-from-source","children":[]},{"level":3,"title":"How can I verify the deterministic build?","slug":"how-can-i-verify-the-deterministic-build","link":"#how-can-i-verify-the-deterministic-build","children":[]},{"level":3,"title":"My antivirus marks Wasabi Wallet as a virus. Am I downloading the right software?","slug":"my-antivirus-marks-wasabi-wallet-as-a-virus-am-i-downloading-the-right-software","link":"#my-antivirus-marks-wasabi-wallet-as-a-virus-am-i-downloading-the-right-software","children":[]},{"level":3,"title":"Why is the executable called wassabee?","slug":"why-is-the-executable-called-wassabee","link":"#why-is-the-executable-called-wassabee","children":[]}]}],"git":{"updatedTime":1720425980000},"filePathRelative":"FAQ/FAQ-Installation.md"}');export{Ia as comp,Pa as data}; diff --git a/assets/FAQ-Introduction.html-D5iJx8Cs.js b/assets/FAQ-Introduction.html-CmWmFBw4.js similarity index 99% rename from assets/FAQ-Introduction.html-D5iJx8Cs.js rename to assets/FAQ-Introduction.html-CmWmFBw4.js index d5462f42d..4793ef52f 100644 --- a/assets/FAQ-Introduction.html-D5iJx8Cs.js +++ b/assets/FAQ-Introduction.html-CmWmFBw4.js @@ -1 +1 @@ -import{_ as l}from"./Logo_without_text_with_bg_dark_with_yt-D8lqXhN0.js";import{_ as h,r,o as c,c as d,a as e,b as t,d as a,w as s,e as n}from"./app-3S7gIoGc.js";const u={},p=n('

    Introduction to Wasabi

    The Basics

    Who can use Wasabi?

    ',3),b={href:"https://github.com/WalletWasabi/WalletWasabi/tree/master/WalletWasabi.Fluent.Desktop",target:"_blank",rel:"noopener noreferrer"},m={href:"https://github.com/WalletWasabi/WalletWasabi/tree/master/WalletWasabi.Backend",target:"_blank",rel:"noopener noreferrer"},f={href:"https://github.com/WalletWasabi/WalletWasabi/tree/master/WalletWasabi.Daemon",target:"_blank",rel:"noopener noreferrer"},w={href:"https://github.com/WalletWasabi/WalletWasabi/tree/master/WalletWasabi.Tests",target:"_blank",rel:"noopener noreferrer"},y={href:"https://github.com/WalletWasabi/WalletWasabi/tree/master/WalletWasabi.Packager",target:"_blank",rel:"noopener noreferrer"},g={href:"https://github.com/WalletWasabi/WalletWasabi/tree/master/WalletWasabi",target:"_blank",rel:"noopener noreferrer"},W={href:"https://wasabiwallet.io/swagger/",target:"_blank",rel:"noopener noreferrer"},_={href:"https://github.com/WalletWasabi/WasabiDoc",target:"_blank",rel:"noopener noreferrer"},k={href:"https://github.com/WalletWasabi/WalletWasabi/blob/master/LICENSE.md",target:"_blank",rel:"noopener noreferrer"},v=e("p",null,"Wasabi is used by individuals to make everyday payments, to manage their hardware wallet long term hodlings, and to CoinJoin their sats for added privacy. Entrepreneurs may use Wasabi to defend their customers from spies and to ensure a private business relationship. While kids may use Wasabi to stack the sats gifted by grandma, and learn the importance of hodling.",-1),x=e("div",{class:"custom-container tip"},[e("p",{class:"custom-container-title"},"TIP"),e("p",null,"Wasabi is a tool for everyone.")],-1),T=e("h3",{id:"what-is-a-coinjoin",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-is-a-coinjoin"},[e("span",null,"What is a coinjoin?")])],-1),I=e("p",null,"Coinjoin is a mechanism by which multiple participants combine their coins (or UTXOs, to be more precise) into one large transaction with multiple inputs and multiple outputs. An observer cannot determine which output belongs to which input, and neither can the participants themselves. This makes it difficult for outside parties to trace where a particular coin originated from and where it was sent to (as opposed to regular bitcoin transactions, where there is usually one sender and one receiver).",-1),B=e("p",null,"This can be done with non-custodial software like Wasabi that eliminates the risk of funds disappearing or being stolen. Each of the signatures are created on the participants’ computers after thorough verification, so nobody can alter the transaction or redirect the funds. The funds will always be in a Bitcoin address that you control.",-1),A=e("p",null,"In very simple terms, coinjoin means: “when you want to make a transaction, find someone else who also wants to make a transaction and make a joint transaction together”.",-1),S={href:"https://en.bitcoin.it/wiki/CoinJoin",target:"_blank",rel:"noopener noreferrer"},j=e("h3",{id:"do-i-need-to-trust-wasabi-with-my-coins",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#do-i-need-to-trust-wasabi-with-my-coins"},[e("span",null,"Do I need to trust Wasabi with my coins?")])],-1),C=e("h3",{id:"what-is-the-privacy-i-get-after-mixing-with-wasabi",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-is-the-privacy-i-get-after-mixing-with-wasabi"},[e("span",null,"What is the privacy I get after mixing with Wasabi?")])],-1),F=n('

    Why is Wasabi Bitcoin-only?

    There are countless reasons why it is the only logical choice to be bitcoin-only. With Bitcoin we have a once in a lifetime opportunity to manifest libre sound money. If we succeed, then an utmost beautiful agora of sovereign individuals may emerge. If we fail, then this will conjure up the most horrific Orwellian nightmare. There is no room for wasted time and energy, this great work requires our full attention. Any line of code written to support a random shitcoin takes away scarce developer time to work on real problems.

    What is considered a sufficient anonymity score?

    It is difficult to determine a sufficient anonymity score since enough research hasn’t been conducted to provide a definitive answer. The right anonymity score depends on your own personal threat model. However, to be on the safe side, with Wasabi Wallet 2.0 an anonymity score of 5 and above could be considered sufficient.

    Is there a way to check Wasabi's uptime status?

    ',5),N={href:"https://stats.uptimerobot.com/YQqGyUL8A7",target:"_blank",rel:"noopener noreferrer"},Q=e("h3",{id:"what-software-supplies-the-block-filters-that-wasabi-uses",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-software-supplies-the-block-filters-that-wasabi-uses"},[e("span",null,"What software supplies the block filters that Wasabi uses?")])],-1),q={href:"https://github.com/WalletWasabi/WalletWasabi/tree/master/WalletWasabi.Backend",target:"_blank",rel:"noopener noreferrer"},O=e("h3",{id:"is-the-backend-s-coordinator-code-open-source",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#is-the-backend-s-coordinator-code-open-source"},[e("span",null,"Is the Backend's (Coordinator) code open-source?")])],-1),z={href:"https://github.com/WalletWasabi/WalletWasabi/tree/master/WalletWasabi.Backend",target:"_blank",rel:"noopener noreferrer"},M=e("h3",{id:"is-there-an-android-ios-version",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#is-there-an-android-ios-version"},[e("span",null,"Is there an Android/iOs version?")])],-1),E=e("p",null,"No, Wasabi and CoinJoin features require considerable computational power, not currently replicable on a smartphone.",-1),D=e("h3",{id:"where-can-i-find-wasabi-wallet-on-social-media",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#where-can-i-find-wasabi-wallet-on-social-media"},[e("span",null,"Where can I find Wasabi Wallet on social media?")])],-1),Y={href:"https://twitter.com/wasabiwallet",target:"_blank",rel:"noopener noreferrer"},U={href:"https://www.reddit.com/r/WasabiWallet/",target:"_blank",rel:"noopener noreferrer"},L={href:"https://www.youtube.com/c/WasabiWallet",target:"_blank",rel:"noopener noreferrer"},P={href:"https://www.facebook.com/officialwasabiwallet/",target:"_blank",rel:"noopener noreferrer"},R={href:"https://www.instagram.com/wasabi_wallet/",target:"_blank",rel:"noopener noreferrer"},H={href:"https://discord.com/invite/nm7YHEZnJs",target:"_blank",rel:"noopener noreferrer"},J={href:"https://join.slack.com/t/tumblebit/shared_invite/enQtNjQ1MTQ2NzQ1ODI0LWIzOTg5YTM3YmNkOTg1NjZmZTQ3NmM1OTAzYmQyYzk1M2M0MTdlZDk2OTQwNzFiNTg1ZmExNzM0NjgzY2M0Yzg",target:"_blank",rel:"noopener noreferrer"},V={href:"https://t.me/WasabiWallet",target:"_blank",rel:"noopener noreferrer"},Z={href:"https://keybase.io/team/wasabiwallet",target:"_blank",rel:"noopener noreferrer"},G={href:"https://blog.wasabiwallet.io",target:"_blank",rel:"noopener noreferrer"},K=e("h2",{id:"for-advanced-wasabikas",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#for-advanced-wasabikas"},[e("span",null,"For advanced Wasabikas")])],-1),X=e("h3",{id:"can-the-coordinator-attack-me",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#can-the-coordinator-attack-me"},[e("span",null,"Can the coordinator attack me?")])],-1),$=e("p",null,"The developers have gone to great lengths to ensure that the coordinator cannot steal funds nor link inputs to outputs. The nature of Wasabi is that you should not need to trust the developers or the Wasabi coordinating server, as you can verify that the code does not leak information to anyone. Due to the nature of coinjoin transactions users don't need to trust other users or the coordinator against theft, leaving denial of service and attacks on privacy as the main concerns",-1),ee=e("p",null,[t("The only known possible 'malicious' actions that the server "),e("em",null,"could"),t(" perform are two sides of the same coin;")],-1),te=e("li",null,[e("strong",null,"Blacklisted UTXO's"),t(": Though this would not affect the users who are able to successfully mix with other 'honest/real' peers.")],-1),ae=e("strong",null,"Targeted Sybil Attack",-1),oe=e("em",null,"only",-1),ie=e("strong",null,"but does not worsen the existing privacy of the coin",-1),se={href:"https://github.com/WalletWasabi/WabiSabi/blob/master/protocol.md#attacks-on-privacy",target:"_blank",rel:"noopener noreferrer"},ne=e("h3",{id:"what-is-the-history-of-wasabi",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-is-the-history-of-wasabi"},[e("span",null,"What is the history of Wasabi?")])],-1),re={href:"https://docs.google.com/drawings/d/1wLL7aSgYBWNoyzllg6_haisFt-gQCf-QUzVzQPkARts/edit",target:"_blank",rel:"noopener noreferrer"},le=e("ul",null,[e("li",null,"The 1.0 Beta release was on August 1, 2018 (on the first anniversary of UASF)"),e("li",null,"The 1.0 release was on October 31, 2018 (on the tenth anniversary of the Bitcoin Whitepaper)"),e("li",null,"The 2.0 Testnet release was on March 1, 2022"),e("li",null,"The 2.0 release was on June 15, 2022")],-1),he={href:"https://youtu.be/XORDEX-RrAI?t=6420",target:"_blank",rel:"noopener noreferrer"},ce=e("img",{src:l,alt:"Watch the video"},null,-1),de={href:"https://youtu.be/b1Vligm0SO8",target:"_blank",rel:"noopener noreferrer"},ue=e("img",{src:l,alt:"Watch the video"},null,-1),pe=e("h3",{id:"why-is-wasabi-libre-and-open-source-software",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#why-is-wasabi-libre-and-open-source-software"},[e("span",null,"Why is Wasabi libre and open-source software?")])],-1),be={href:"https://github.com/WalletWasabi/WalletWasabi/",target:"_blank",rel:"noopener noreferrer"},me={href:"https://github.com/WalletWasabi/WalletWasabi/blob/master/LICENSE.md",target:"_blank",rel:"noopener noreferrer"},fe=n('

    Control

    Many people prefer open-source software because they have more control over the software they run.

    They can examine the code to make sure it's not doing anything they don't want it to do, and they can change parts of it they don't like. Users who aren't programmers also benefit from open-source software, since they can use this software for any purpose.

    Training

    Other people like open-source software because it helps them become better programmers.

    Open-source code is publicly accessible. Students can easily study it as they learn to make better software. Students can also share their work with others, inviting comments and critique, as they develop their skills. When people discover mistakes in programs' source code, they can share those mistakes with others to help them avoid making those same mistakes themselves.

    Security

    Some people prefer open-source software because they consider it more secure and stable than proprietary software.

    Anyone can view and modify open-source software. Other users may spot and correct errors or omissions that a program's original authors might have missed. And because so many programmers can work on a piece of open-source software without asking for permission from original authors, they can fix, update, and upgrade open-source software more quickly than they can proprietary software.

    Stability

    Many users prefer open-source software to proprietary software for important, long-term projects.

    Programmers publicly distribute the source code for open-source software. Users relying on that software for critical tasks can be sure their tools won't disappear or fall into disrepair if their original creators stop working on them. Additionally, open-source software tends to both incorporate and operate according to open standards.

    What is the general idea of WabiSabi coinjoin?

    While fungibility is an essential property of good money, Bitcoin has its limitations in this area. Numerous fungibility improvements have been proposed; however, none of them have addressed the privacy issues in full. WabiSabi is designed so that no participant, outside observer or even the coordinator can spy on the user. The scope of WabiSabi is not limited to a single transaction, it extends to transaction chains and it addresses various network layer deanonymizations. However, its scope is limited to Bitcoin's first layer. Even if an off-chain anonymity solution gets widely adopted, ultimately the entrance and exit transactions will always be settled on-chain. Therefore, there will always be need for on-chain privacy.

    Ideal fungibility requires every Bitcoin transaction to be indistinguishable from each other, but it is an unrealistic goal. WabiSabi's objective is to break all links between coins. Thus, WabiSabi enables the usage of Bitcoin in a fully anonymous way.

    ',11),we={href:"https://github.com/zksnacks/wabisabi",target:"_blank",rel:"noopener noreferrer"},ye=e("h3",{id:"what-are-the-supported-operating-systems",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-are-the-supported-operating-systems"},[e("span",null,"What are the supported operating systems?")])],-1),ge={href:"https://github.com/WalletWasabi/WalletWasabi/blob/master/WalletWasabi.Documentation/WasabiCompatibility.md#officially-supported-operating-systems",target:"_blank",rel:"noopener noreferrer"},We=e("h3",{id:"what-are-the-minimal-requirements-to-run-wasabi",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-are-the-minimal-requirements-to-run-wasabi"},[e("span",null,"What are the minimal requirements to run Wasabi?")])],-1),_e={href:"https://github.com/WalletWasabi/WalletWasabi/blob/master/WalletWasabi.Documentation/WasabiCompatibility.md#officially-supported-operating-systems",target:"_blank",rel:"noopener noreferrer"},ke={href:"https://github.com/WalletWasabi/WalletWasabi/tree/master/WalletWasabi.Daemon",target:"_blank",rel:"noopener noreferrer"};function ve(xe,Te){const o=r("ExternalLinkIcon"),i=r("RouteLink");return c(),d("div",null,[p,e("p",null,[t("Every single line of code in Wasabi, the "),e("a",b,[t("wallet"),a(o)]),t(", the "),e("a",m,[t("backend server"),a(o)]),t(", the "),e("a",f,[t("daemon"),a(o)]),t(", the "),e("a",w,[t("tests"),a(o)]),t(", the "),e("a",y,[t("packager"),a(o)]),t(", the "),e("a",g,[t("library"),a(o)]),t(", the "),e("a",W,[t("api"),a(o)]),t(", the "),e("a",_,[t("documentation"),a(o)]),t(" - has always been and will always be libre and open-source under the "),e("a",k,[t("MIT license"),a(o)]),t(". This means that anyone, yes, ANYONE can use Wasabi without permission, for any use case, free of charge.")]),v,x,T,I,B,A,e("p",null,[t("See also the "),e("a",S,[t("Bitcoin Wiki on coinjoins"),a(o)])]),j,e("p",null,[t("Since Wasabi's coinjoin implementation is trustless by design, there is no need for participants to trust each other or a third party. Both the sending address (the coinjoin input) and the receiving address (the coinjoin output) are controlled by your own private keys. The Wasabi server merely coordinates the process of combining each participant's input into one single transaction, but the Wasabi Wallet can neither steal your coins, nor figure out which outputs belong to which inputs (look up “"),a(i,{to:"/using-wasabi/CoinJoin.html"},{default:s(()=>[t("WabiSabi coinjoin")]),_:1}),t("” if you want to know more).")]),C,e("p",null,[t("This depends on how you handle your outputs after the coinjoin. There are some ways how you can unintentionally undo the mixing by being careless. For example, if you send a mixed coin to an already used address, then anyone can see that both coins are controlled by the same entity. More importantly, anyone who knows that the address belongs to you knows that you own that mixed coin. "),a(i,{to:"/why-wasabi/AddressReuse.html"},{default:s(()=>[t("Address reuse")]),_:1}),t(" compromises your privacy. Another deanonymizing scenario occurs when you combine mixed outputs with unmixed ones when sending: a third party will be able to make the connection between them as belonging to the same sender. This is why you need to be careful with non-private/"),a(i,{to:"/using-wasabi/ChangeCoins.html"},{default:s(()=>[t("change coins")]),_:1}),t(".")]),e("p",null,[t("The practice of being careful with your post-mix outputs is commonly facilitated through coin control. Find out more about coin control in "),a(i,{to:"/why-wasabi/Coins.html"},{default:s(()=>[t("here")]),_:1}),t(". However, Wasabi Wallet is build in a way to help the user to avoid privacy leaks when using the wallet.")]),F,e("p",null,[t("Yes, you can check the status of Wasabi-related services and websites (like APIs, Backend, etc.) via "),e("a",N,[t("UptimeRobot Wasabi Status Page"),a(o)]),t(".")]),Q,e("p",null,[t("The zkSNACKs coordinator supplies identical filters to every client. This means that you rely on the "),e("a",q,[t("Wasabi backend"),a(o)]),t(" to provide valid filters. But because you download the blocks from a random Bitcoin peer-to-peer node - or your own node - the coordinator cannot spy on which blocks you are interested in. Furthermore, the random node will only know which block is needed but it won't have any clue which transaction(s) belongs to the wallet.")]),O,e("p",null,[t("Yes, you can verify the code on "),e("a",z,[t("GitHub"),a(o)]),t(".")]),M,E,D,e("p",null,[t("You can find us on "),e("a",Y,[t("Twitter"),a(o)]),t(", "),e("a",U,[t("Reddit"),a(o)]),t(", "),e("a",L,[t("YouTube"),a(o)]),t(", "),e("a",P,[t("Facebook"),a(o)]),t(", "),e("a",R,[t("Instagram"),a(o)]),t(" and "),e("a",H,[t("Discord"),a(o)]),t(". For chat groups you can find us on "),e("a",J,[t("Slack"),a(o)]),t(", "),e("a",V,[t("Telegram"),a(o)]),t(" and "),e("a",Z,[t("Keybase"),a(o)]),t(".")]),e("p",null,[t("Also, remember to follow our "),e("a",G,[t("blog"),a(o)]),t(" to get the latest insights and information about Wasabi Wallet and Bitcoin privacy.")]),K,X,$,ee,e("ul",null,[te,e("li",null,[ae,t(": The follow-up concern is the inverse of the above. It is possible that the server could "),oe,t(" include one 'honest/real' coin in the mix and supply the other coins themselves. This gives a false sense of security, "),ie,t(". It would also be noticeable to all users excluding the user being targeted as their coins would not be mixed. It has been argued that this 'attack' would be very costly in terms of fees because the number of coins being mixed is verifiable. Though it is true that remixes pay zero coordination fee to zkSNACKs, they do pay mining fees. See "),e("a",se,[t("here"),a(o)]),t(" for more info.")])]),ne,e("p",null,[t("Ádám Ficsor worked with several others on a privacy-focused Bitcoin wallet called Hidden Wallet all the way "),e("a",re,[t("back in December 2015"),a(o)]),t(". Wasabi 1.0 was unveiled in 2018 at the Building on Bitcoin conference by Ádám. At the time, Wasabi was essentially HiddenWallet rebranded and rewritten from scratch with some new features. Key dates:")]),le,e("p",null,[e("a",he,[ce,a(o)])]),e("p",null,[e("a",de,[ue,a(o)])]),pe,e("p",null,[t("Wasabi follows Bitcoin's philosophy by making the software "),e("a",be,[t("open-source"),a(o)]),t(" and by publishing it under "),e("a",me,[t("MIT license"),a(o)]),t(". Bitcoin users prefer open-source software to proprietary software for a number of reasons, including:")]),fe,e("p",null,[t("WabiSabi defines a pre-mix and a post-mix wallet and a mixing technique. Pre-mix wallet functionality can be added to any Bitcoin wallet without much overhead. Post-mix wallets on the other hand have strong privacy requirements, regarding coin selection, private transaction and balance retrieval, transaction input and output indexing and broadcasting. The requirements and recommendations for pre and post-mix wallets together define the Wallet Privacy Framework. Coins from pre-mix wallets to post-mix wallets are moved by mixing. Most on-chain mixing techniques, like CoinShuffle, CoinShuffle++, TumbleBit's Classic Tumbler mode, or ZeroLink can be used. However WabiSabi defines its own mixing technique: "),a(i,{to:"/using-wasabi/CoinJoin.html"},{default:s(()=>[t("WabiSabi coinjoin")]),_:1}),t(".")]),e("p",null,[t("For more info please see "),e("a",we,[t("WabiSabi"),a(o)]),t(".")]),ye,e("p",null,[t("Wasabi runs in most operating systems with 64-bit architecture. For the complete list of all the officially supported operating systems, click "),e("a",ge,[t("here"),a(o)]),t(".")]),We,e("p",null,[t("As long as your operating system is "),e("a",_e,[t("supported"),a(o)]),t(", Wasabi should be able to run on your hardware. The more transactions a wallet has made, the more resources Wasabi will consume, particularly RAM. The software can also consume a significant amount of CPU for specific tasks, such as coinjoins or wallet loading. Approximately 3 GB of disk space are also needed, mainly to store the "),a(i,{to:"/FAQ/FAQ-UseWasabi.html#what-are-bip-158-block-filters"},{default:s(()=>[t("block filters")]),_:1}),t(". If you are running the wallet on a system with scarce resources, consider using the "),e("a",ke,[t("daemon"),a(o)]),t(" instead of the GUI application.")])])}const Ae=h(u,[["render",ve],["__file","FAQ-Introduction.html.vue"]]),Se=JSON.parse(`{"path":"/FAQ/FAQ-Introduction.html","title":"Introduction FAQ","lang":"en-US","frontmatter":{"title":"Introduction FAQ","description":"Frequently asked questions regarding the introduction to Wasabi in general. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"The Basics","slug":"the-basics","link":"#the-basics","children":[{"level":3,"title":"Who can use Wasabi?","slug":"who-can-use-wasabi","link":"#who-can-use-wasabi","children":[]},{"level":3,"title":"What is a coinjoin?","slug":"what-is-a-coinjoin","link":"#what-is-a-coinjoin","children":[]},{"level":3,"title":"Do I need to trust Wasabi with my coins?","slug":"do-i-need-to-trust-wasabi-with-my-coins","link":"#do-i-need-to-trust-wasabi-with-my-coins","children":[]},{"level":3,"title":"What is the privacy I get after mixing with Wasabi?","slug":"what-is-the-privacy-i-get-after-mixing-with-wasabi","link":"#what-is-the-privacy-i-get-after-mixing-with-wasabi","children":[]},{"level":3,"title":"Why is Wasabi Bitcoin-only?","slug":"why-is-wasabi-bitcoin-only","link":"#why-is-wasabi-bitcoin-only","children":[]},{"level":3,"title":"What is considered a sufficient anonymity score?","slug":"what-is-considered-a-sufficient-anonymity-score","link":"#what-is-considered-a-sufficient-anonymity-score","children":[]},{"level":3,"title":"Is there a way to check Wasabi's uptime status?","slug":"is-there-a-way-to-check-wasabi-s-uptime-status","link":"#is-there-a-way-to-check-wasabi-s-uptime-status","children":[]},{"level":3,"title":"What software supplies the block filters that Wasabi uses?","slug":"what-software-supplies-the-block-filters-that-wasabi-uses","link":"#what-software-supplies-the-block-filters-that-wasabi-uses","children":[]},{"level":3,"title":"Is the Backend's (Coordinator) code open-source?","slug":"is-the-backend-s-coordinator-code-open-source","link":"#is-the-backend-s-coordinator-code-open-source","children":[]},{"level":3,"title":"Is there an Android/iOs version?","slug":"is-there-an-android-ios-version","link":"#is-there-an-android-ios-version","children":[]},{"level":3,"title":"Where can I find Wasabi Wallet on social media?","slug":"where-can-i-find-wasabi-wallet-on-social-media","link":"#where-can-i-find-wasabi-wallet-on-social-media","children":[]}]},{"level":2,"title":"For advanced Wasabikas","slug":"for-advanced-wasabikas","link":"#for-advanced-wasabikas","children":[{"level":3,"title":"Can the coordinator attack me?","slug":"can-the-coordinator-attack-me","link":"#can-the-coordinator-attack-me","children":[]},{"level":3,"title":"What is the history of Wasabi?","slug":"what-is-the-history-of-wasabi","link":"#what-is-the-history-of-wasabi","children":[]},{"level":3,"title":"Why is Wasabi libre and open-source software?","slug":"why-is-wasabi-libre-and-open-source-software","link":"#why-is-wasabi-libre-and-open-source-software","children":[]},{"level":3,"title":"What is the general idea of WabiSabi coinjoin?","slug":"what-is-the-general-idea-of-wabisabi-coinjoin","link":"#what-is-the-general-idea-of-wabisabi-coinjoin","children":[]},{"level":3,"title":"What are the supported operating systems?","slug":"what-are-the-supported-operating-systems","link":"#what-are-the-supported-operating-systems","children":[]},{"level":3,"title":"What are the minimal requirements to run Wasabi?","slug":"what-are-the-minimal-requirements-to-run-wasabi","link":"#what-are-the-minimal-requirements-to-run-wasabi","children":[]}]}],"git":{"updatedTime":1720425186000},"filePathRelative":"FAQ/FAQ-Introduction.md"}`);export{Ae as comp,Se as data}; +import{_ as l}from"./Logo_without_text_with_bg_dark_with_yt-D8lqXhN0.js";import{_ as h,r,o as c,c as d,a as e,b as t,d as a,w as s,e as n}from"./app-CwImt2bI.js";const u={},p=n('

    Introduction to Wasabi

    The Basics

    Who can use Wasabi?

    ',3),b={href:"https://github.com/WalletWasabi/WalletWasabi/tree/master/WalletWasabi.Fluent.Desktop",target:"_blank",rel:"noopener noreferrer"},m={href:"https://github.com/WalletWasabi/WalletWasabi/tree/master/WalletWasabi.Backend",target:"_blank",rel:"noopener noreferrer"},f={href:"https://github.com/WalletWasabi/WalletWasabi/tree/master/WalletWasabi.Daemon",target:"_blank",rel:"noopener noreferrer"},w={href:"https://github.com/WalletWasabi/WalletWasabi/tree/master/WalletWasabi.Tests",target:"_blank",rel:"noopener noreferrer"},y={href:"https://github.com/WalletWasabi/WalletWasabi/tree/master/WalletWasabi.Packager",target:"_blank",rel:"noopener noreferrer"},g={href:"https://github.com/WalletWasabi/WalletWasabi/tree/master/WalletWasabi",target:"_blank",rel:"noopener noreferrer"},W={href:"https://wasabiwallet.io/swagger/",target:"_blank",rel:"noopener noreferrer"},_={href:"https://github.com/WalletWasabi/WasabiDoc",target:"_blank",rel:"noopener noreferrer"},k={href:"https://github.com/WalletWasabi/WalletWasabi/blob/master/LICENSE.md",target:"_blank",rel:"noopener noreferrer"},v=e("p",null,"Wasabi is used by individuals to make everyday payments, to manage their hardware wallet long term hodlings, and to CoinJoin their sats for added privacy. Entrepreneurs may use Wasabi to defend their customers from spies and to ensure a private business relationship. While kids may use Wasabi to stack the sats gifted by grandma, and learn the importance of hodling.",-1),x=e("div",{class:"custom-container tip"},[e("p",{class:"custom-container-title"},"TIP"),e("p",null,"Wasabi is a tool for everyone.")],-1),T=e("h3",{id:"what-is-a-coinjoin",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-is-a-coinjoin"},[e("span",null,"What is a coinjoin?")])],-1),I=e("p",null,"Coinjoin is a mechanism by which multiple participants combine their coins (or UTXOs, to be more precise) into one large transaction with multiple inputs and multiple outputs. An observer cannot determine which output belongs to which input, and neither can the participants themselves. This makes it difficult for outside parties to trace where a particular coin originated from and where it was sent to (as opposed to regular bitcoin transactions, where there is usually one sender and one receiver).",-1),B=e("p",null,"This can be done with non-custodial software like Wasabi that eliminates the risk of funds disappearing or being stolen. Each of the signatures are created on the participants’ computers after thorough verification, so nobody can alter the transaction or redirect the funds. The funds will always be in a Bitcoin address that you control.",-1),A=e("p",null,"In very simple terms, coinjoin means: “when you want to make a transaction, find someone else who also wants to make a transaction and make a joint transaction together”.",-1),S={href:"https://en.bitcoin.it/wiki/CoinJoin",target:"_blank",rel:"noopener noreferrer"},j=e("h3",{id:"do-i-need-to-trust-wasabi-with-my-coins",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#do-i-need-to-trust-wasabi-with-my-coins"},[e("span",null,"Do I need to trust Wasabi with my coins?")])],-1),C=e("h3",{id:"what-is-the-privacy-i-get-after-mixing-with-wasabi",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-is-the-privacy-i-get-after-mixing-with-wasabi"},[e("span",null,"What is the privacy I get after mixing with Wasabi?")])],-1),F=n('

    Why is Wasabi Bitcoin-only?

    There are countless reasons why it is the only logical choice to be bitcoin-only. With Bitcoin we have a once in a lifetime opportunity to manifest libre sound money. If we succeed, then an utmost beautiful agora of sovereign individuals may emerge. If we fail, then this will conjure up the most horrific Orwellian nightmare. There is no room for wasted time and energy, this great work requires our full attention. Any line of code written to support a random shitcoin takes away scarce developer time to work on real problems.

    What is considered a sufficient anonymity score?

    It is difficult to determine a sufficient anonymity score since enough research hasn’t been conducted to provide a definitive answer. The right anonymity score depends on your own personal threat model. However, to be on the safe side, with Wasabi Wallet 2.0 an anonymity score of 5 and above could be considered sufficient.

    Is there a way to check Wasabi's uptime status?

    ',5),N={href:"https://stats.uptimerobot.com/YQqGyUL8A7",target:"_blank",rel:"noopener noreferrer"},Q=e("h3",{id:"what-software-supplies-the-block-filters-that-wasabi-uses",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-software-supplies-the-block-filters-that-wasabi-uses"},[e("span",null,"What software supplies the block filters that Wasabi uses?")])],-1),q={href:"https://github.com/WalletWasabi/WalletWasabi/tree/master/WalletWasabi.Backend",target:"_blank",rel:"noopener noreferrer"},O=e("h3",{id:"is-the-backend-s-coordinator-code-open-source",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#is-the-backend-s-coordinator-code-open-source"},[e("span",null,"Is the Backend's (Coordinator) code open-source?")])],-1),z={href:"https://github.com/WalletWasabi/WalletWasabi/tree/master/WalletWasabi.Backend",target:"_blank",rel:"noopener noreferrer"},M=e("h3",{id:"is-there-an-android-ios-version",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#is-there-an-android-ios-version"},[e("span",null,"Is there an Android/iOs version?")])],-1),E=e("p",null,"No, Wasabi and CoinJoin features require considerable computational power, not currently replicable on a smartphone.",-1),D=e("h3",{id:"where-can-i-find-wasabi-wallet-on-social-media",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#where-can-i-find-wasabi-wallet-on-social-media"},[e("span",null,"Where can I find Wasabi Wallet on social media?")])],-1),Y={href:"https://twitter.com/wasabiwallet",target:"_blank",rel:"noopener noreferrer"},U={href:"https://www.reddit.com/r/WasabiWallet/",target:"_blank",rel:"noopener noreferrer"},L={href:"https://www.youtube.com/c/WasabiWallet",target:"_blank",rel:"noopener noreferrer"},P={href:"https://www.facebook.com/officialwasabiwallet/",target:"_blank",rel:"noopener noreferrer"},R={href:"https://www.instagram.com/wasabi_wallet/",target:"_blank",rel:"noopener noreferrer"},H={href:"https://discord.com/invite/nm7YHEZnJs",target:"_blank",rel:"noopener noreferrer"},J={href:"https://join.slack.com/t/tumblebit/shared_invite/enQtNjQ1MTQ2NzQ1ODI0LWIzOTg5YTM3YmNkOTg1NjZmZTQ3NmM1OTAzYmQyYzk1M2M0MTdlZDk2OTQwNzFiNTg1ZmExNzM0NjgzY2M0Yzg",target:"_blank",rel:"noopener noreferrer"},V={href:"https://t.me/WasabiWallet",target:"_blank",rel:"noopener noreferrer"},Z={href:"https://keybase.io/team/wasabiwallet",target:"_blank",rel:"noopener noreferrer"},G={href:"https://blog.wasabiwallet.io",target:"_blank",rel:"noopener noreferrer"},K=e("h2",{id:"for-advanced-wasabikas",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#for-advanced-wasabikas"},[e("span",null,"For advanced Wasabikas")])],-1),X=e("h3",{id:"can-the-coordinator-attack-me",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#can-the-coordinator-attack-me"},[e("span",null,"Can the coordinator attack me?")])],-1),$=e("p",null,"The developers have gone to great lengths to ensure that the coordinator cannot steal funds nor link inputs to outputs. The nature of Wasabi is that you should not need to trust the developers or the Wasabi coordinating server, as you can verify that the code does not leak information to anyone. Due to the nature of coinjoin transactions users don't need to trust other users or the coordinator against theft, leaving denial of service and attacks on privacy as the main concerns",-1),ee=e("p",null,[t("The only known possible 'malicious' actions that the server "),e("em",null,"could"),t(" perform are two sides of the same coin;")],-1),te=e("li",null,[e("strong",null,"Blacklisted UTXO's"),t(": Though this would not affect the users who are able to successfully mix with other 'honest/real' peers.")],-1),ae=e("strong",null,"Targeted Sybil Attack",-1),oe=e("em",null,"only",-1),ie=e("strong",null,"but does not worsen the existing privacy of the coin",-1),se={href:"https://github.com/WalletWasabi/WabiSabi/blob/master/protocol.md#attacks-on-privacy",target:"_blank",rel:"noopener noreferrer"},ne=e("h3",{id:"what-is-the-history-of-wasabi",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-is-the-history-of-wasabi"},[e("span",null,"What is the history of Wasabi?")])],-1),re={href:"https://docs.google.com/drawings/d/1wLL7aSgYBWNoyzllg6_haisFt-gQCf-QUzVzQPkARts/edit",target:"_blank",rel:"noopener noreferrer"},le=e("ul",null,[e("li",null,"The 1.0 Beta release was on August 1, 2018 (on the first anniversary of UASF)"),e("li",null,"The 1.0 release was on October 31, 2018 (on the tenth anniversary of the Bitcoin Whitepaper)"),e("li",null,"The 2.0 Testnet release was on March 1, 2022"),e("li",null,"The 2.0 release was on June 15, 2022")],-1),he={href:"https://youtu.be/XORDEX-RrAI?t=6420",target:"_blank",rel:"noopener noreferrer"},ce=e("img",{src:l,alt:"Watch the video"},null,-1),de={href:"https://youtu.be/b1Vligm0SO8",target:"_blank",rel:"noopener noreferrer"},ue=e("img",{src:l,alt:"Watch the video"},null,-1),pe=e("h3",{id:"why-is-wasabi-libre-and-open-source-software",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#why-is-wasabi-libre-and-open-source-software"},[e("span",null,"Why is Wasabi libre and open-source software?")])],-1),be={href:"https://github.com/WalletWasabi/WalletWasabi/",target:"_blank",rel:"noopener noreferrer"},me={href:"https://github.com/WalletWasabi/WalletWasabi/blob/master/LICENSE.md",target:"_blank",rel:"noopener noreferrer"},fe=n('

    Control

    Many people prefer open-source software because they have more control over the software they run.

    They can examine the code to make sure it's not doing anything they don't want it to do, and they can change parts of it they don't like. Users who aren't programmers also benefit from open-source software, since they can use this software for any purpose.

    Training

    Other people like open-source software because it helps them become better programmers.

    Open-source code is publicly accessible. Students can easily study it as they learn to make better software. Students can also share their work with others, inviting comments and critique, as they develop their skills. When people discover mistakes in programs' source code, they can share those mistakes with others to help them avoid making those same mistakes themselves.

    Security

    Some people prefer open-source software because they consider it more secure and stable than proprietary software.

    Anyone can view and modify open-source software. Other users may spot and correct errors or omissions that a program's original authors might have missed. And because so many programmers can work on a piece of open-source software without asking for permission from original authors, they can fix, update, and upgrade open-source software more quickly than they can proprietary software.

    Stability

    Many users prefer open-source software to proprietary software for important, long-term projects.

    Programmers publicly distribute the source code for open-source software. Users relying on that software for critical tasks can be sure their tools won't disappear or fall into disrepair if their original creators stop working on them. Additionally, open-source software tends to both incorporate and operate according to open standards.

    What is the general idea of WabiSabi coinjoin?

    While fungibility is an essential property of good money, Bitcoin has its limitations in this area. Numerous fungibility improvements have been proposed; however, none of them have addressed the privacy issues in full. WabiSabi is designed so that no participant, outside observer or even the coordinator can spy on the user. The scope of WabiSabi is not limited to a single transaction, it extends to transaction chains and it addresses various network layer deanonymizations. However, its scope is limited to Bitcoin's first layer. Even if an off-chain anonymity solution gets widely adopted, ultimately the entrance and exit transactions will always be settled on-chain. Therefore, there will always be need for on-chain privacy.

    Ideal fungibility requires every Bitcoin transaction to be indistinguishable from each other, but it is an unrealistic goal. WabiSabi's objective is to break all links between coins. Thus, WabiSabi enables the usage of Bitcoin in a fully anonymous way.

    ',11),we={href:"https://github.com/zksnacks/wabisabi",target:"_blank",rel:"noopener noreferrer"},ye=e("h3",{id:"what-are-the-supported-operating-systems",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-are-the-supported-operating-systems"},[e("span",null,"What are the supported operating systems?")])],-1),ge={href:"https://github.com/WalletWasabi/WalletWasabi/blob/master/WalletWasabi.Documentation/WasabiCompatibility.md#officially-supported-operating-systems",target:"_blank",rel:"noopener noreferrer"},We=e("h3",{id:"what-are-the-minimal-requirements-to-run-wasabi",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-are-the-minimal-requirements-to-run-wasabi"},[e("span",null,"What are the minimal requirements to run Wasabi?")])],-1),_e={href:"https://github.com/WalletWasabi/WalletWasabi/blob/master/WalletWasabi.Documentation/WasabiCompatibility.md#officially-supported-operating-systems",target:"_blank",rel:"noopener noreferrer"},ke={href:"https://github.com/WalletWasabi/WalletWasabi/tree/master/WalletWasabi.Daemon",target:"_blank",rel:"noopener noreferrer"};function ve(xe,Te){const o=r("ExternalLinkIcon"),i=r("RouteLink");return c(),d("div",null,[p,e("p",null,[t("Every single line of code in Wasabi, the "),e("a",b,[t("wallet"),a(o)]),t(", the "),e("a",m,[t("backend server"),a(o)]),t(", the "),e("a",f,[t("daemon"),a(o)]),t(", the "),e("a",w,[t("tests"),a(o)]),t(", the "),e("a",y,[t("packager"),a(o)]),t(", the "),e("a",g,[t("library"),a(o)]),t(", the "),e("a",W,[t("api"),a(o)]),t(", the "),e("a",_,[t("documentation"),a(o)]),t(" - has always been and will always be libre and open-source under the "),e("a",k,[t("MIT license"),a(o)]),t(". This means that anyone, yes, ANYONE can use Wasabi without permission, for any use case, free of charge.")]),v,x,T,I,B,A,e("p",null,[t("See also the "),e("a",S,[t("Bitcoin Wiki on coinjoins"),a(o)])]),j,e("p",null,[t("Since Wasabi's coinjoin implementation is trustless by design, there is no need for participants to trust each other or a third party. Both the sending address (the coinjoin input) and the receiving address (the coinjoin output) are controlled by your own private keys. The Wasabi server merely coordinates the process of combining each participant's input into one single transaction, but the Wasabi Wallet can neither steal your coins, nor figure out which outputs belong to which inputs (look up “"),a(i,{to:"/using-wasabi/CoinJoin.html"},{default:s(()=>[t("WabiSabi coinjoin")]),_:1}),t("” if you want to know more).")]),C,e("p",null,[t("This depends on how you handle your outputs after the coinjoin. There are some ways how you can unintentionally undo the mixing by being careless. For example, if you send a mixed coin to an already used address, then anyone can see that both coins are controlled by the same entity. More importantly, anyone who knows that the address belongs to you knows that you own that mixed coin. "),a(i,{to:"/why-wasabi/AddressReuse.html"},{default:s(()=>[t("Address reuse")]),_:1}),t(" compromises your privacy. Another deanonymizing scenario occurs when you combine mixed outputs with unmixed ones when sending: a third party will be able to make the connection between them as belonging to the same sender. This is why you need to be careful with non-private/"),a(i,{to:"/using-wasabi/ChangeCoins.html"},{default:s(()=>[t("change coins")]),_:1}),t(".")]),e("p",null,[t("The practice of being careful with your post-mix outputs is commonly facilitated through coin control. Find out more about coin control in "),a(i,{to:"/why-wasabi/Coins.html"},{default:s(()=>[t("here")]),_:1}),t(". However, Wasabi Wallet is build in a way to help the user to avoid privacy leaks when using the wallet.")]),F,e("p",null,[t("Yes, you can check the status of Wasabi-related services and websites (like APIs, Backend, etc.) via "),e("a",N,[t("UptimeRobot Wasabi Status Page"),a(o)]),t(".")]),Q,e("p",null,[t("The zkSNACKs coordinator supplies identical filters to every client. This means that you rely on the "),e("a",q,[t("Wasabi backend"),a(o)]),t(" to provide valid filters. But because you download the blocks from a random Bitcoin peer-to-peer node - or your own node - the coordinator cannot spy on which blocks you are interested in. Furthermore, the random node will only know which block is needed but it won't have any clue which transaction(s) belongs to the wallet.")]),O,e("p",null,[t("Yes, you can verify the code on "),e("a",z,[t("GitHub"),a(o)]),t(".")]),M,E,D,e("p",null,[t("You can find us on "),e("a",Y,[t("Twitter"),a(o)]),t(", "),e("a",U,[t("Reddit"),a(o)]),t(", "),e("a",L,[t("YouTube"),a(o)]),t(", "),e("a",P,[t("Facebook"),a(o)]),t(", "),e("a",R,[t("Instagram"),a(o)]),t(" and "),e("a",H,[t("Discord"),a(o)]),t(". For chat groups you can find us on "),e("a",J,[t("Slack"),a(o)]),t(", "),e("a",V,[t("Telegram"),a(o)]),t(" and "),e("a",Z,[t("Keybase"),a(o)]),t(".")]),e("p",null,[t("Also, remember to follow our "),e("a",G,[t("blog"),a(o)]),t(" to get the latest insights and information about Wasabi Wallet and Bitcoin privacy.")]),K,X,$,ee,e("ul",null,[te,e("li",null,[ae,t(": The follow-up concern is the inverse of the above. It is possible that the server could "),oe,t(" include one 'honest/real' coin in the mix and supply the other coins themselves. This gives a false sense of security, "),ie,t(". It would also be noticeable to all users excluding the user being targeted as their coins would not be mixed. It has been argued that this 'attack' would be very costly in terms of fees because the number of coins being mixed is verifiable. Though it is true that remixes pay zero coordination fee to zkSNACKs, they do pay mining fees. See "),e("a",se,[t("here"),a(o)]),t(" for more info.")])]),ne,e("p",null,[t("Ádám Ficsor worked with several others on a privacy-focused Bitcoin wallet called Hidden Wallet all the way "),e("a",re,[t("back in December 2015"),a(o)]),t(". Wasabi 1.0 was unveiled in 2018 at the Building on Bitcoin conference by Ádám. At the time, Wasabi was essentially HiddenWallet rebranded and rewritten from scratch with some new features. Key dates:")]),le,e("p",null,[e("a",he,[ce,a(o)])]),e("p",null,[e("a",de,[ue,a(o)])]),pe,e("p",null,[t("Wasabi follows Bitcoin's philosophy by making the software "),e("a",be,[t("open-source"),a(o)]),t(" and by publishing it under "),e("a",me,[t("MIT license"),a(o)]),t(". Bitcoin users prefer open-source software to proprietary software for a number of reasons, including:")]),fe,e("p",null,[t("WabiSabi defines a pre-mix and a post-mix wallet and a mixing technique. Pre-mix wallet functionality can be added to any Bitcoin wallet without much overhead. Post-mix wallets on the other hand have strong privacy requirements, regarding coin selection, private transaction and balance retrieval, transaction input and output indexing and broadcasting. The requirements and recommendations for pre and post-mix wallets together define the Wallet Privacy Framework. Coins from pre-mix wallets to post-mix wallets are moved by mixing. Most on-chain mixing techniques, like CoinShuffle, CoinShuffle++, TumbleBit's Classic Tumbler mode, or ZeroLink can be used. However WabiSabi defines its own mixing technique: "),a(i,{to:"/using-wasabi/CoinJoin.html"},{default:s(()=>[t("WabiSabi coinjoin")]),_:1}),t(".")]),e("p",null,[t("For more info please see "),e("a",we,[t("WabiSabi"),a(o)]),t(".")]),ye,e("p",null,[t("Wasabi runs in most operating systems with 64-bit architecture. For the complete list of all the officially supported operating systems, click "),e("a",ge,[t("here"),a(o)]),t(".")]),We,e("p",null,[t("As long as your operating system is "),e("a",_e,[t("supported"),a(o)]),t(", Wasabi should be able to run on your hardware. The more transactions a wallet has made, the more resources Wasabi will consume, particularly RAM. The software can also consume a significant amount of CPU for specific tasks, such as coinjoins or wallet loading. Approximately 3 GB of disk space are also needed, mainly to store the "),a(i,{to:"/FAQ/FAQ-UseWasabi.html#what-are-bip-158-block-filters"},{default:s(()=>[t("block filters")]),_:1}),t(". If you are running the wallet on a system with scarce resources, consider using the "),e("a",ke,[t("daemon"),a(o)]),t(" instead of the GUI application.")])])}const Ae=h(u,[["render",ve],["__file","FAQ-Introduction.html.vue"]]),Se=JSON.parse(`{"path":"/FAQ/FAQ-Introduction.html","title":"Introduction FAQ","lang":"en-US","frontmatter":{"title":"Introduction FAQ","description":"Frequently asked questions regarding the introduction to Wasabi in general. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"The Basics","slug":"the-basics","link":"#the-basics","children":[{"level":3,"title":"Who can use Wasabi?","slug":"who-can-use-wasabi","link":"#who-can-use-wasabi","children":[]},{"level":3,"title":"What is a coinjoin?","slug":"what-is-a-coinjoin","link":"#what-is-a-coinjoin","children":[]},{"level":3,"title":"Do I need to trust Wasabi with my coins?","slug":"do-i-need-to-trust-wasabi-with-my-coins","link":"#do-i-need-to-trust-wasabi-with-my-coins","children":[]},{"level":3,"title":"What is the privacy I get after mixing with Wasabi?","slug":"what-is-the-privacy-i-get-after-mixing-with-wasabi","link":"#what-is-the-privacy-i-get-after-mixing-with-wasabi","children":[]},{"level":3,"title":"Why is Wasabi Bitcoin-only?","slug":"why-is-wasabi-bitcoin-only","link":"#why-is-wasabi-bitcoin-only","children":[]},{"level":3,"title":"What is considered a sufficient anonymity score?","slug":"what-is-considered-a-sufficient-anonymity-score","link":"#what-is-considered-a-sufficient-anonymity-score","children":[]},{"level":3,"title":"Is there a way to check Wasabi's uptime status?","slug":"is-there-a-way-to-check-wasabi-s-uptime-status","link":"#is-there-a-way-to-check-wasabi-s-uptime-status","children":[]},{"level":3,"title":"What software supplies the block filters that Wasabi uses?","slug":"what-software-supplies-the-block-filters-that-wasabi-uses","link":"#what-software-supplies-the-block-filters-that-wasabi-uses","children":[]},{"level":3,"title":"Is the Backend's (Coordinator) code open-source?","slug":"is-the-backend-s-coordinator-code-open-source","link":"#is-the-backend-s-coordinator-code-open-source","children":[]},{"level":3,"title":"Is there an Android/iOs version?","slug":"is-there-an-android-ios-version","link":"#is-there-an-android-ios-version","children":[]},{"level":3,"title":"Where can I find Wasabi Wallet on social media?","slug":"where-can-i-find-wasabi-wallet-on-social-media","link":"#where-can-i-find-wasabi-wallet-on-social-media","children":[]}]},{"level":2,"title":"For advanced Wasabikas","slug":"for-advanced-wasabikas","link":"#for-advanced-wasabikas","children":[{"level":3,"title":"Can the coordinator attack me?","slug":"can-the-coordinator-attack-me","link":"#can-the-coordinator-attack-me","children":[]},{"level":3,"title":"What is the history of Wasabi?","slug":"what-is-the-history-of-wasabi","link":"#what-is-the-history-of-wasabi","children":[]},{"level":3,"title":"Why is Wasabi libre and open-source software?","slug":"why-is-wasabi-libre-and-open-source-software","link":"#why-is-wasabi-libre-and-open-source-software","children":[]},{"level":3,"title":"What is the general idea of WabiSabi coinjoin?","slug":"what-is-the-general-idea-of-wabisabi-coinjoin","link":"#what-is-the-general-idea-of-wabisabi-coinjoin","children":[]},{"level":3,"title":"What are the supported operating systems?","slug":"what-are-the-supported-operating-systems","link":"#what-are-the-supported-operating-systems","children":[]},{"level":3,"title":"What are the minimal requirements to run Wasabi?","slug":"what-are-the-minimal-requirements-to-run-wasabi","link":"#what-are-the-minimal-requirements-to-run-wasabi","children":[]}]}],"git":{"updatedTime":1720425980000},"filePathRelative":"FAQ/FAQ-Introduction.md"}`);export{Ae as comp,Se as data}; diff --git a/assets/FAQ-UseWasabi.html-noM30uxn.js b/assets/FAQ-UseWasabi.html-uYBqV63A.js similarity index 99% rename from assets/FAQ-UseWasabi.html-noM30uxn.js rename to assets/FAQ-UseWasabi.html-uYBqV63A.js index 8acb2a18c..b498801d2 100644 --- a/assets/FAQ-UseWasabi.html-noM30uxn.js +++ b/assets/FAQ-UseWasabi.html-uYBqV63A.js @@ -1,4 +1,4 @@ -import{_ as p}from"./AddWalletButton-C7JVhQwV.js";import{_ as w,a as m,b as y}from"./AddWalletAddPassphrase-M0V8PDu3.js";import{_ as h,a as g}from"./AddWalletConfirmRecoveryWords-DoQpsOos.js";import{_ as c}from"./CoinjoinStrategy-BZrDbG5n.js";import{_ as b}from"./WalletSynchronizing-Bg2Cuco7.js";import{_ as d,a as f}from"./AddressAwaitingPayment-B9ABKMdf.js";import{_ as v,a as _,b as k,c as u}from"./HistoryRightClick-DykL0_1P.js";import{_ as r}from"./Logo_without_text_with_bg_dark_with_yt-D8lqXhN0.js";import{_ as W}from"./AutoStartCoinjoinThreshold-B0lFY-5G.js";import{_ as x,a as T}from"./SettingsBitcoinCore-DgSldI_2.js";import{_ as I}from"./DiscreetModeActivate-Cg4X--AC.js";import{_ as j,r as l,o as C,c as A,a as e,d as a,w as o,b as t,e as s}from"./app-3S7gIoGc.js";const B="/PrivacyBar.png",S="/FeeDisplayUnit.png",H="/MusicBoxCoinjoinStopped.png",q="/TorStatusWarningIcon.png",P="/AddressesAwaitingPayment.png",F="/AddressesAwaitingPaymentEditLabel.png",R="/AddressesAwaitingPaymentQRCodeIcon.png",z="/SendFeeIcon.png",U="/SendCustomFee.png",D="/SpeedUpTxConfirm.png",N="/CancelTxConfirm.png",Q="/PrivacyProgressTile.png",M="/MusicBoxMenuItems.png",E="/RedCoinIsolation.png",O="/SettingsCoordinatorURI.png",Y="/VerifyRecoveryWords.png",G="/History.png",J="/HistoryCoinjoin.png",L="/HistoryCoinjoinExpanded.png",K="/HistorySort.png",V="/SearchBarTXIDSearch.png",X="/AnonymityScoreTarget.png",$="/SettingsDustThreshold.png",Z="/SearchBarHelpSupportOpen.png",ee="/WhiteMode.png",te="/SendPreviewTransactionReviewCoins.png",ae="/WalletCoinsSendSelectedCoins.png",ne={},oe=s('

    Use of Wasabi

    General

    How do I start using Wasabi?

    ',3),ie={href:"https://wasabiwallet.io",target:"_blank",rel:"noopener noreferrer"},se=e("h3",{id:"how-do-i-generate-a-new-wallet",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-do-i-generate-a-new-wallet"},[e("span",null,"How do I generate a new wallet?")])],-1),re=s('

    Click the Add Wallet button in the bottom left corner of the main view or in the searchbar.

    Add new wallet in Wasabi

    Click Create a new wallet.

    Create a new wallet in Wasabi

    As with everything in Wasabi, you are required to label this new wallet. Make sure that you are precise so that you know what this wallet is for and click Continue.

    Name a new wallet in Wasabi

    Now you will see the 12 recovery words. This is the mnemonic seed that you should back up, together with the passphrase you create in the next phase, in order to recover your wallet. When you've backed everything up, click Continue.

    Wasabi Wallet recovery words

    In this page you should confirm the words, as a check that you've written down your mnemonic seed in the correct order. Once you're done, click Continue.

    Confirm recovery words

    Add a passphrase. It is used to encrypt the private key (extracted from the extended private key) on the computer and needed to open the wallet and to recovered it in the future. Make sure that you properly back up and write down this passphrase.

    Confirm the passphrase and click Continue.

    Add a passphrase in Wasabi

    Careful!!

    Without knowledge of the passphrase, you CANNOT spend your bitcoin!!

    Make sure, and triple-check that you have done a proper backup of BOTH the passphrase AND the mnemonic. If you only have the recovery words, but not the passphrase, then you will NOT be able to open your wallet or to recover it.

    In order to protect your backup, consider storing the passphrase and recovery words in different locations.

    Now you get to choose your wallets coinjoin strategy. Select one and click Continue.

    Wasabi Wallet coinjoin strategies

    Can I rename my Wallet?

    Yes. A wallet can be renamed at the Wallet Settings.

    ',20),le=e("code",null,"Wallet Folder",-1),he=e("code",null,"Wallets",-1),ce=e("code",null,".json",-1),de=e("code",null,"Wallets",-1),ue=e("code",null,".json",-1),pe=e("code",null,"WalletBackups",-1),we=e("code",null,".json",-1),me=s('

    TIP

    You need to mark the “show hidden files” setting to see the Wasabi data folder.

    WARNING

    To avoid problems, make sure you close Wasabi Wallet before proceeding to rename any of your wallets.

    What is the password used for?

    ',3),ye=e("em",null,"passphrase",-1),ge={href:"https://github.com/WalletWasabi/WalletWasabi/releases/tag/v2.0.7",target:"_blank",rel:"noopener noreferrer"},be={href:"https://github.com/bitcoin/bips/blob/master/bip-0039.mediawiki",target:"_blank",rel:"noopener noreferrer"},fe={href:"https://github.com/bitcoin/bips/blob/master/bip-0038.mediawiki",target:"_blank",rel:"noopener noreferrer"},ve=e("p",null,"Wasabi stores only the BIP38 encrypted blob, so you'll need to type in the passphrase to open the wallet and to spend from Wasabi.",-1),_e=e("div",{class:"custom-container danger"},[e("p",{class:"custom-container-title"},"DANGER"),e("p",null,"The passphrase will unlock your bitcoin to anyone who has access to the recovery words backup or the computer! If your backup gets compromised, this passphrase is the only thing protecting your precious sats.")],-1),ke=e("h3",{id:"what-password-should-i-use",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-password-should-i-use"},[e("span",null,"What password should I use?")])],-1),We={class:"custom-container danger"},xe=e("p",{class:"custom-container-title"},"DANGER",-1),Te=e("strong",null,"VERY",-1),Ie={href:"https://www.eff.org/deeplinks/2016/07/new-wordlists-random-passphrases",target:"_blank",rel:"noopener noreferrer"},je=s('

    Where can I find the Wasabi data folder?

    You can easily reach it from inside Wasabi by typing Data Folder in the search bar at the top of the main view.

    Or you can manually navigate to it (depending on which OS you have):

    • Windows: /Users/{your username}/AppData/Roaming/WalletWasabi/Client
    • Linux: /home/{your username}/.walletwasabi/client
    • macOS: /Users/{your username}/.walletwasabi/client

    TIP

    You need to mark the “show hidden files” setting to see it.

    Can I spend my bitcoin without the password?

    DANGER

    NO!!! Without knowledge of your passphrase, even when you have the wallet file and recovery words, you CANNOT spend your bitcoin!

    When creating a new wallet, after labeling it properly, the next step is to select a long and random passphrase. Every time you want to spend your coins from Wasabi, you MUST provide this passphrase. So even if you have these words securely engraved in metal, without the passphrase, you cannot restore the backup of your wallet.

    TIP

    Always back up your mnemonic recovery words, and your passphrase in two separate secure locations.

    Why BIP 38?

    ',10),Ce={href:"https://github.com/bitcoin/bips/blob/master/bip-0038.mediawiki",target:"_blank",rel:"noopener noreferrer"},Ae={href:"https://github.com/MetacoSA/NBitcoin",target:"_blank",rel:"noopener noreferrer"},Be=e("h3",{id:"what-are-the-terms-and-conditions",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-are-the-terms-and-conditions"},[e("span",null,"What are the terms and conditions?")])],-1),Se=e("p",null,"The most important parts of the legal documents are summarized in the following points:",-1),He=e("ul",null,[e("li",null,"The service is open-source under the MIT license."),e("li",null,"The service is provided on a non-custodial basis. Safekeeping of keys are the sole responsibility of the user."),e("li",null,"The user is solely responsible to act according to their local laws and regulations."),e("li",null,"We do not store any personally identifiable information. Moreover, our trustless software architecture prevents us from gathering this information in the first place."),e("li",null,"A transaction fee is only charged by the service provider for CoinJoin transactions."),e("li",null,"We only provide written support, and NEVER ask for recovery words, passphrases or similar security critical information.")],-1),qe={href:"https://github.com/WalletWasabi/WalletWasabi/blob/master/WalletWasabi/Legal/Assets/LegalDocumentsWw2.txt",target:"_blank",rel:"noopener noreferrer"},Pe=s(`

    Can I import a watch-only extended public key?

    Yes, but not yet in the GUI, you will need to manually create a new wallet file.

    Open a text editor and paste the following wallet structure:

    {
    +import{_ as p}from"./AddWalletButton-C7JVhQwV.js";import{_ as w,a as m,b as y}from"./AddWalletAddPassphrase-M0V8PDu3.js";import{_ as h,a as g}from"./AddWalletConfirmRecoveryWords-DoQpsOos.js";import{_ as c}from"./CoinjoinStrategy-BZrDbG5n.js";import{_ as b}from"./WalletSynchronizing-Bg2Cuco7.js";import{_ as d,a as f}from"./AddressAwaitingPayment-B9ABKMdf.js";import{_ as v,a as _,b as k,c as u}from"./HistoryRightClick-DykL0_1P.js";import{_ as r}from"./Logo_without_text_with_bg_dark_with_yt-D8lqXhN0.js";import{_ as W}from"./AutoStartCoinjoinThreshold-B0lFY-5G.js";import{_ as x,a as T}from"./SettingsBitcoinCore-DgSldI_2.js";import{_ as I}from"./DiscreetModeActivate-Cg4X--AC.js";import{_ as j,r as l,o as C,c as A,a as e,d as a,w as o,b as t,e as s}from"./app-CwImt2bI.js";const B="/PrivacyBar.png",S="/FeeDisplayUnit.png",H="/MusicBoxCoinjoinStopped.png",q="/TorStatusWarningIcon.png",P="/AddressesAwaitingPayment.png",F="/AddressesAwaitingPaymentEditLabel.png",R="/AddressesAwaitingPaymentQRCodeIcon.png",z="/SendFeeIcon.png",U="/SendCustomFee.png",D="/SpeedUpTxConfirm.png",N="/CancelTxConfirm.png",Q="/PrivacyProgressTile.png",M="/MusicBoxMenuItems.png",E="/RedCoinIsolation.png",O="/SettingsCoordinatorURI.png",Y="/VerifyRecoveryWords.png",G="/History.png",J="/HistoryCoinjoin.png",L="/HistoryCoinjoinExpanded.png",K="/HistorySort.png",V="/SearchBarTXIDSearch.png",X="/AnonymityScoreTarget.png",$="/SettingsDustThreshold.png",Z="/SearchBarHelpSupportOpen.png",ee="/WhiteMode.png",te="/SendPreviewTransactionReviewCoins.png",ae="/WalletCoinsSendSelectedCoins.png",ne={},oe=s('

    Use of Wasabi

    General

    How do I start using Wasabi?

    ',3),ie={href:"https://wasabiwallet.io",target:"_blank",rel:"noopener noreferrer"},se=e("h3",{id:"how-do-i-generate-a-new-wallet",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-do-i-generate-a-new-wallet"},[e("span",null,"How do I generate a new wallet?")])],-1),re=s('

    Click the Add Wallet button in the bottom left corner of the main view or in the searchbar.

    Add new wallet in Wasabi

    Click Create a new wallet.

    Create a new wallet in Wasabi

    As with everything in Wasabi, you are required to label this new wallet. Make sure that you are precise so that you know what this wallet is for and click Continue.

    Name a new wallet in Wasabi

    Now you will see the 12 recovery words. This is the mnemonic seed that you should back up, together with the passphrase you create in the next phase, in order to recover your wallet. When you've backed everything up, click Continue.

    Wasabi Wallet recovery words

    In this page you should confirm the words, as a check that you've written down your mnemonic seed in the correct order. Once you're done, click Continue.

    Confirm recovery words

    Add a passphrase. It is used to encrypt the private key (extracted from the extended private key) on the computer and needed to open the wallet and to recovered it in the future. Make sure that you properly back up and write down this passphrase.

    Confirm the passphrase and click Continue.

    Add a passphrase in Wasabi

    Careful!!

    Without knowledge of the passphrase, you CANNOT spend your bitcoin!!

    Make sure, and triple-check that you have done a proper backup of BOTH the passphrase AND the mnemonic. If you only have the recovery words, but not the passphrase, then you will NOT be able to open your wallet or to recover it.

    In order to protect your backup, consider storing the passphrase and recovery words in different locations.

    Now you get to choose your wallets coinjoin strategy. Select one and click Continue.

    Wasabi Wallet coinjoin strategies

    Can I rename my Wallet?

    Yes. A wallet can be renamed at the Wallet Settings.

    ',20),le=e("code",null,"Wallet Folder",-1),he=e("code",null,"Wallets",-1),ce=e("code",null,".json",-1),de=e("code",null,"Wallets",-1),ue=e("code",null,".json",-1),pe=e("code",null,"WalletBackups",-1),we=e("code",null,".json",-1),me=s('

    TIP

    You need to mark the “show hidden files” setting to see the Wasabi data folder.

    WARNING

    To avoid problems, make sure you close Wasabi Wallet before proceeding to rename any of your wallets.

    What is the password used for?

    ',3),ye=e("em",null,"passphrase",-1),ge={href:"https://github.com/WalletWasabi/WalletWasabi/releases/tag/v2.0.7",target:"_blank",rel:"noopener noreferrer"},be={href:"https://github.com/bitcoin/bips/blob/master/bip-0039.mediawiki",target:"_blank",rel:"noopener noreferrer"},fe={href:"https://github.com/bitcoin/bips/blob/master/bip-0038.mediawiki",target:"_blank",rel:"noopener noreferrer"},ve=e("p",null,"Wasabi stores only the BIP38 encrypted blob, so you'll need to type in the passphrase to open the wallet and to spend from Wasabi.",-1),_e=e("div",{class:"custom-container danger"},[e("p",{class:"custom-container-title"},"DANGER"),e("p",null,"The passphrase will unlock your bitcoin to anyone who has access to the recovery words backup or the computer! If your backup gets compromised, this passphrase is the only thing protecting your precious sats.")],-1),ke=e("h3",{id:"what-password-should-i-use",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-password-should-i-use"},[e("span",null,"What password should I use?")])],-1),We={class:"custom-container danger"},xe=e("p",{class:"custom-container-title"},"DANGER",-1),Te=e("strong",null,"VERY",-1),Ie={href:"https://www.eff.org/deeplinks/2016/07/new-wordlists-random-passphrases",target:"_blank",rel:"noopener noreferrer"},je=s('

    Where can I find the Wasabi data folder?

    You can easily reach it from inside Wasabi by typing Data Folder in the search bar at the top of the main view.

    Or you can manually navigate to it (depending on which OS you have):

    • Windows: /Users/{your username}/AppData/Roaming/WalletWasabi/Client
    • Linux: /home/{your username}/.walletwasabi/client
    • macOS: /Users/{your username}/.walletwasabi/client

    TIP

    You need to mark the “show hidden files” setting to see it.

    Can I spend my bitcoin without the password?

    DANGER

    NO!!! Without knowledge of your passphrase, even when you have the wallet file and recovery words, you CANNOT spend your bitcoin!

    When creating a new wallet, after labeling it properly, the next step is to select a long and random passphrase. Every time you want to spend your coins from Wasabi, you MUST provide this passphrase. So even if you have these words securely engraved in metal, without the passphrase, you cannot restore the backup of your wallet.

    TIP

    Always back up your mnemonic recovery words, and your passphrase in two separate secure locations.

    Why BIP 38?

    ',10),Ce={href:"https://github.com/bitcoin/bips/blob/master/bip-0038.mediawiki",target:"_blank",rel:"noopener noreferrer"},Ae={href:"https://github.com/MetacoSA/NBitcoin",target:"_blank",rel:"noopener noreferrer"},Be=e("h3",{id:"what-are-the-terms-and-conditions",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-are-the-terms-and-conditions"},[e("span",null,"What are the terms and conditions?")])],-1),Se=e("p",null,"The most important parts of the legal documents are summarized in the following points:",-1),He=e("ul",null,[e("li",null,"The service is open-source under the MIT license."),e("li",null,"The service is provided on a non-custodial basis. Safekeeping of keys are the sole responsibility of the user."),e("li",null,"The user is solely responsible to act according to their local laws and regulations."),e("li",null,"We do not store any personally identifiable information. Moreover, our trustless software architecture prevents us from gathering this information in the first place."),e("li",null,"A transaction fee is only charged by the service provider for CoinJoin transactions."),e("li",null,"We only provide written support, and NEVER ask for recovery words, passphrases or similar security critical information.")],-1),qe={href:"https://github.com/WalletWasabi/WalletWasabi/blob/master/WalletWasabi/Legal/Assets/LegalDocumentsWw2.txt",target:"_blank",rel:"noopener noreferrer"},Pe=s(`

    Can I import a watch-only extended public key?

    Yes, but not yet in the GUI, you will need to manually create a new wallet file.

    Open a text editor and paste the following wallet structure:

    {
       "EncryptedSecret": null,
       "ChainCode": null,
       "MasterFingerprint": null,
    @@ -40,4 +40,4 @@ import{_ as p}from"./AddWalletButton-C7JVhQwV.js";import{_ as w,a as m,b as y}fr
                           0.2 BTC (Change Coin Bob)
                           0.3 BTC (Change Coin Charlie)
     

    There is no way to know which of the anon set output coins are owned by which of the input owners.

    All an observer knows is that a specific anon set output coin is owned by one of the owners of one of the input coins, that is 3 people - hence an anonymity set of 3.

    Your Wasabi software has limited information on what the actually achieved anonymity set is, so the anonymity set that the software presents you is just an estimation, not an accurate value. With Wasabi we are trying to do lower estimations, rather than higher ones.

    What is the anonymity score?

    The anonymity score is a way to estimate the level of entropy of a UTXO in an unequal-but-highly-composable output value coinjoin.

    It is different than anonymity set. For example, if the outputs are [1, 1, 1, 1, 0.5, 0.5, 0.5, 0.5, 0.4, 0.4, 0.2, 0.2, 0.2, 0.2, 0.2, 0.1, 0.1, 0.1, 0.1, 0.1] then, even when each of those 1s have anonscore 4, there are still lots of combinations of outputs that sum up to 1, so the anonset should be much higher but the anonscore is extremely conservative and takes into account many other things.

    What is the difference between anonymity set and anonymity score?

    The anonscore evolved into existence from the anonset, but with some differences. What differs is the kind of coinjoins they are applied to, where anonset was for Wasabi 1 and anonscore is for current Wasabi 2. In Wasabi 1 coinjoins there are unequal inputs, some equal outputs, and change coins. In Wasabi 2 coinjoins there are many equal inputs, many equal outputs, and (sometimes) some unique value outputs, that are not necessarily change coins. In fact most of the times they are well mixed coins.

    Basically the anonymity score is an extremely conservative anonymity set calculation.

    What are the equal denominations created in a coinjoin round?

    The standard denominations are: 5000, 6561, 8192, 10000, 13122, 16384, 19683, 20000, 32768, 39366, 50000, 59049, 65536, 100000, 118098, 131072, 177147, 200000, 262144, 354294, 500000, 524288, 531441, 1000000, 1048576, 1062882, 1594323, 2000000, 2097152, 3188646, 4194304, 4782969, 5000000, 8388608, 9565938, 10000000, 14348907, 16777216, 20000000, 28697814, 33554432, 43046721, 50000000, 67108864, 86093442, 100000000, 129140163, 134217728, 200000000, 258280326, 268435456, 387420489, 500000000, 536870912, 774840978, 1000000000, 1073741824, 1162261467, 2000000000, 2147483648, 2324522934, 3486784401, 4294967296, 5000000000, 6973568802, 8589934592, 10000000000, 10460353203, 17179869184, 20000000000, 20920706406, 31381059609, 34359738368, 50000000000, 62762119218, 68719476736, 94143178827, 100000000000, 137438953472 sats.

    So, there are 79 denominations from 0.00005000 BTC up to 1374.38953472 BTC.

    What is happening in the input registration phase?

    During this phase the client selects which coin(s) will be registered for coinjoin. Wasabi then generates the related input proofs. After that, a unique Tor identity will be generated for each input, which will be used to send the input ownership proof to the coordinator.

    The coordinator now verifies that this input is allowed to register (i.e. there is still room for more inputs, the coin is confirmed, the input proof is valid etc.). If all checks are valid, the coordinator creates and sends back the credentials.

    `,27),fa=e("h3",{id:"what-is-happening-in-the-connection-confirmation-phase",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-is-happening-in-the-connection-confirmation-phase"},[e("span",null,"What is happening in the connection confirmation phase?")])],-1),va=e("h3",{id:"what-is-happening-in-the-output-registration-phase",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-is-happening-in-the-output-registration-phase"},[e("span",null,"What is happening in the output registration phase?")])],-1),_a=e("p",null,"The client now creates a new Tor identity called Bob, which is not tied to Alice. Bob now sends the coordinator an unblinded credential (signed by the coordinator) and a bitcoin address.",-1),ka=e("h3",{id:"what-is-happening-in-the-signing-phase",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-is-happening-in-the-signing-phase"},[e("span",null,"What is happening in the signing phase?")])],-1),Wa=e("h3",{id:"what-is-happening-during-the-blame-round",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-is-happening-during-the-blame-round"},[e("span",null,"What is happening during the blame round?")])],-1),xa=e("h3",{id:"what-is-happening-in-the-broadcasting-phase",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-is-happening-in-the-broadcasting-phase"},[e("span",null,"What is happening in the broadcasting phase?")])],-1),Ta=s('

    Is there any additional anonymity using multiple wallets for CoinJoins?

    You'd gain 1 less anonymity set than if you'd only mix with one wallet (and Wasabi doesn't display that). On the other hand, the systemic anonymity is slightly improved if a few people are mixing with multiple wallets, because that removes the certainty on this Blockchain analysis assumption.

    How is the anonymity set target determined for CoinJoins?

    2*2 = 4 and 3*3 = 9. 2->3: 50% increase, 4->9:125% increase. So remixing with larger anonsets is exponentially more effective than smaller anonsets. Regarding why do we want 100 number, is among some other reasons, because that was our calculation to be that would make rounds happen in every 2-5 minutes, considering the liquidity of some custodial mixers. Regarding DoS attack, right now our DoS configuration is set to be pretty permissive and this seems to be sufficient for the time being. If a DoS attack would happen, Wasabi team would just harden it in the config file and would kick the bad actors out. Now if even that would fail, then we can start thinking about lowering the required peers and also other methods.

    I'd like to experience coinjoin but I'm not comfortable using real Bitcoin. What can I do?

    ',5),Ia=e("code",null,"Settings",-1),ja=e("code",null,"Bitcoin",-1),Ca=e("code",null,"TestNet",-1),Aa={href:"https://coinfaucet.eu/en/btc-testnet/",target:"_blank",rel:"noopener noreferrer"},Ba={href:"https://bitcoinfaucet.uo1.net/",target:"_blank",rel:"noopener noreferrer"},Sa=e("h3",{id:"does-wasabi-have-to-stay-on-during-coinjoin",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#does-wasabi-have-to-stay-on-during-coinjoin"},[e("span",null,"Does Wasabi have to stay on during coinjoin?")])],-1),Ha=e("p",null,"Yes, Wasabi needs to stay on during coinjoins, you cannot be offline and still participate in coinjoins.",-1),qa=e("p",null,"A coinjoin transaction is different from a normal transaction (where you are the only person signing), as it requires multiple participants to sign the same transaction.",-1),Pa=e("p",null,"Here is how Wasabi handles different scenarios:",-1),Fa=e("th",{style:{"text-align":"center"}},null,-1),Ra={style:{"text-align":"center"}},za=e("th",{style:{"text-align":"center"}},"After input registration phase",-1),Ua=e("tr",null,[e("td",{style:{"text-align":"center"}},"You close Wasabi"),e("td",{style:{"text-align":"center"}},"Your registered coins are automatically dequeued"),e("td",{style:{"text-align":"center"}},"Wasabi will make you wait until the round finishes")],-1),Da=e("td",{style:{"text-align":"center"}},"Wasabi goes offline",-1),Na=e("td",{style:{"text-align":"center"}},"Your registered coins are automatically timed out by the coordinator after 1 minute",-1),Qa={style:{"text-align":"center"}},Ma={href:"https://github.com/nopara73/ZeroLink/#d-dos-attack",target:"_blank",rel:"noopener noreferrer"},Ea=e("h3",{id:"what-if-there-s-a-power-outage-during-coinjoin-do-i-lose-my-coins",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-if-there-s-a-power-outage-during-coinjoin-do-i-lose-my-coins"},[e("span",null,"What if there's a power outage during CoinJoin? Do I lose my coins?")])],-1),Oa=e("h3",{id:"how-much-anonymity-set-do-i-need",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-much-anonymity-set-do-i-need"},[e("span",null,"How much anonymity set do I need?")])],-1),Ya=e("p",null,"The amount of privacy needed depends on your individual threat model, who is trying to deanonymize you? It is commonly said that an anonymity set of 50 is sufficient to evade low-level blockchain forensics analysis, but it might not protect you against large adversaries. At least one round to re-mix your coins can increase your privacy drastically. With Wasabi this can be achieved in a matter of hours.",-1),Ga=e("h3",{id:"how-does-my-wallet-communicate-with-the-wasabi-coordinator-server",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-does-my-wallet-communicate-with-the-wasabi-coordinator-server"},[e("span",null,"How does my wallet communicate with the Wasabi coordinator server?")])],-1),Ja=e("p",null,"Wasabi communicates in many ways to the coordinator server, and it is always over the Tor network.",-1),La={href:"https://github.com/bitcoin/bips/blob/master/bip-0158.mediawiki",target:"_blank",rel:"noopener noreferrer"},Ka=e("p",null,"Then, there are five different phases in a CoinJoin. You can follow these links to have a full explanation on that:",-1),Va=s('

    The backend server also sends you information about the current mempool for fee estimation as well as the US Dollar exchange rate.

    What is the address of the coordinator?

    The coordinator possibly gets paid in every coinjoin. Wasabi is using a fresh unused coordinator address for every coinjoin round.

    What is the maximum number of coins that can be registered in a coinjoin?

    Wasabi Wallet's default client is configured to register 1 up to 10 inputs per coinjoin round. However, as the coordinator cannot enforce this, a custom client could use a different configuration.

    How many coins/outputs do I get from a coinjoin?

    Wasabi Wallet's default client is configured to register 1 up to 10 outputs per coinjoin round. However, as the coordinator cannot enforce this, a custom client could use a different configuration.

    Can I manually select which coins to register for coinjoin?

    No, that is currently not possible. The automatic coinjoin robot registers the coins, based on multiple factors.

    ',9),Xa={class:"custom-container tip"},$a=e("p",{class:"custom-container-title"},"TIP",-1),Za=e("h3",{id:"how-to-exclude-freeze-coins-from-coinjoin",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-to-exclude-freeze-coins-from-coinjoin"},[e("span",null,"How to exclude/freeze coins from coinjoin?")])],-1),en={href:"https://github.com/WalletWasabi/WalletWasabi/releases/tag/v2.0.8",target:"_blank",rel:"noopener noreferrer"},tn=e("p",null,[t("Click on the music box menu items -> select "),e("em",null,"Exclude Coins"),t(" -> select the coins to exclude.")],-1),an=e("p",null,[e("img",{src:M,alt:"Music Box Menu Items",title:"Music Box Menu Items"})],-1),nn=e("p",null,"The coins will remain excluded until they are manually deselected.",-1),on=s('

    How long does it take to make my wallet 100% private?

    Depending on many factors, like the Anonymity score target, the coinjoin strategy, and the amount of bitcoin, it can take from a couple hours to multiple days.

    What coinjoin strategy should I select?

    There is no answer for all, or a "best" strategy, it depends on the user's privacy needs. The coinjoin strategy should be selected according to the user's preference: Do you want to Minimize costs, Maximize speed, or Maximize privacy? Or the user can create their own Custom strategy.

    Wasabi Coinjoin Strategy

    The default coinjoin strategy is `Maximize Speed`

    This strategy is sufficient for most users

    What is the coinjoin strategy?

    A coinjoin strategy has specific pre-configured coinjoin settings.

    There are multiple coinjoin settings which the user is able to configure according to their own prefence. Each coinjoin strategy has different specific settings for optimal performance. After a coinjoin strategy is selected, its settings are applied. It is supposed to make it easy for the user to select their preference, without having to know about the specific settings and how to configure them themselves.

    ',9),sn=s('

    What are the differences/settings per coinjoin strategy?

    Minimize CostsMaximize SpeedMaximize Privacy
    Anonymity score target55random between 27 and 75
    Coinjoin time preferenceweekshourshours
    Red coin isolationnot enablednot enabledenabled

    What does the Auto-start coinjoin threshold mean in the coinjoin settings?

    It is the amount at which your funds will automatically participate in coinjoin in the background. If the non-private wallet balance is less than this amount coinjoin will not automatically start. A use case is that it might not be economical to coinjoin with this non-private amount (fee amount compared to coinjoin amount).

    For example, if the non-private balance is 0.005 BTC and the Auto-start coinjoin threshold is 0.01 BTC, the user will have to manually press Play to start coinjoining. The default Auto-start coinjoin threshold is 0.01 BTC.

    Auto-start coinjoin threshold

    What does the Red coin isolation mean in the coinjoin settings?

    When the Red coin isolation is enabled, only a single coin with anonymity score 1 will be allowed into the coinjoin registration. To prevent possible coinjoin input heuristics from outside observers. The Red coin isolation is enabled by default when the Maximize Privacy coinjoin strategy is selected.

    Red Coin Isolation

    Do coinjoin transactions signal RBF?

    No. Coinjoin transactions do not signal RBF.

    Why do my coins occasionally get banned from participating in CoinJoin?

    A CoinJoin consists of multiple users registering inputs (coins) and blinded outputs. Once the appropriate number of participants have registered, the actual transaction (the CoinJoin) is constructed by the coordinator, and given to all participants in the span of about 60 seconds. At this point, all registered participants must sign off on the CoinJoin, and if a single one of the participants fails to sign their input, the entire CoinJoin must be restarted.

    ',13),rn={href:"https://github.com/nopara73/ZeroLink/#d-dos-attack",target:"_blank",rel:"noopener noreferrer"},ln=e("p",null,"So a simple solution looks like this - the coordinator could collect signatures from all inputs, and if one or more input refuses to sign, the coordinator could record that input and temporarily (or even permanently) ban that coin from participation. This is a nice solution, as it mitigates a single coin from ruining all CoinJoins, but it too comes with trade-offs.",-1),hn=e("p",null,"For example, most of the time, users fail to sign a CoinJoin for non-malicious reasons. Perhaps their Tor connection went down in precisely that moment, or perhaps their WiFi had a temporary flicker at the wrong time. Further, some users don't even realize that the signing phase is happening, and sometimes shut down their computer at exactly the wrong moment. All of these things hinder a successful CoinJoin for all other participants, but by pure accident.",-1),cn=e("p",null,"If you are one of the victims of this temporary banning then simply wait for the ban to expire and try again. The best thing you can do to avoid the issue is to have a strong internet connection and keep your computer online throughout the whole process.",-1),dn=e("div",{class:"custom-container tip"},[e("p",{class:"custom-container-title"},"Note:"),e("p",null,"Banning does not mean freezing. You can send banned coins to anyone you want. This is a temporary ban on your coins in participation of the CoinJoin.")],-1),un=e("h3",{id:"how-do-i-change-the-coordinator",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-do-i-change-the-coordinator"},[e("span",null,"How do I change the coordinator?")])],-1),pn={href:"https://github.com/WalletWasabi/WalletWasabi/releases/tag/v2.0.8",target:"_blank",rel:"noopener noreferrer"},wn=e("em",null,"Coordinator",-1),mn=s('

    Go to settings -> select coordinator tab -> paste/enter the new URI -> restart Wasabi -> Wasabi will now use this coordinator.

    Settings Coordinator URI

    (The displayed (default) coordinator in the image doesn't work.)

    Alternatively, the MainNetCoordinatorUri can be changed in the config file.

    Backup and Recovery

    How do I back up my mnemonic words?

    TIP

    Write down your recovery words!

    ',7),yn={href:"https://github.com/bitcoin/bips/blob/master/bip-0039.mediawiki",target:"_blank",rel:"noopener noreferrer"},gn=e("p",null,[e("img",{src:h,alt:"Wasabi Wallet recovery words",title:"Wasabi Wallet recovery words"})],-1),bn=e("div",{class:"custom-container danger"},[e("p",{class:"custom-container-title"},"DANGER"),e("p",null,"In order to restore a wallet, you need BOTH the recovery words AND the passphrase!")],-1),fn=e("p",null,"It is a good idea to keep the two in separate analog backups, such as a laminated paper written with pencil. In order to defend against nature destroying fragile paper, you can consider stamping the words into metal. Use two different backups and locations for the mnemonic and passphrase, because whoever has both [including a physical attacker] has full access to your sats. Find a secure physical location to store the backups, maybe a home safe, or an expert security deposit box.",-1),vn=e("h3",{id:"how-do-i-back-up-my-wallet-file",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-do-i-back-up-my-wallet-file"},[e("span",null,"How do I back up my wallet file?")])],-1),_n=e("code",null,"WalletBackups",-1),kn=e("code",null,"wallet.json",-1),Wn=s('

    WARNING

    Make sure to back up your passphrase separately because it is necessary to spend your bitcoin.

    TIP

    The wallet file backup is sensitive, in terms of privacy, but not critical in terms of loss of funds (if a passphrase was used when generating the wallet). So it is good advice to encrypt this wallet file.

    What do I need to recover my wallet?

    To recover your wallet you need either your Recovery Words + Passphrase, or the Wallet File + Passphrase, as shown in the table below.

    Recovery WordsWallet FilePassphrase
    Recovery Words✔️
    Wallet File✔️
    Passphrase✔️✔️

    TIP

    If no passphrase was entered at the wallet creation, then the Recovery Words or Wallet File alone are enough to recover the wallet.

    Can I recover my wallet without the password?

    ',7),xn=s('

    What should I do if I forget my password?

    Try every possibility you can think of to find your passphrase, you have an unlimited number of tries. If that still doesn't work, you might want to try external password crackers or recovery tools, but be careful to only use well-tested, well-reviewed ones.

    I lost the recovery words but I still have the .json file and the password. Is my wallet still recoverable?

    Yes, but in this case it is advisable to create a new wallet and back up the new recovery words and the passphrase, then move your bitcoin there.

    The .json file contains the encrypted secret that requires the passphrase to derive your private keys. That gives you access to your bitcoin.

    Can I verify the Recovery Words of an existing wallet?

    Yes. Go to Wallet Settings > Verify Recovery Words. Type in your recovery words in the correct order, click on Verify and it will show you if they are correct or not.

    Wasabi Wallet Verify Recovery Words

    Hardware Wallet

    ',9),Tn={href:"https://youtu.be/aU8ysH9JH9M",target:"_blank",rel:"noopener noreferrer"},In=e("img",{src:r,alt:"Watch the video"},null,-1),jn={href:"https://youtu.be/kocEpndQcsg",target:"_blank",rel:"noopener noreferrer"},Cn=e("img",{src:r,alt:"Watch the video"},null,-1),An={href:"https://youtu.be/sM2uhyROpAQ",target:"_blank",rel:"noopener noreferrer"},Bn=e("img",{src:r,alt:"Watch the video"},null,-1),Sn=e("h3",{id:"what-hardware-wallets-does-wasabi-support",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-hardware-wallets-does-wasabi-support"},[e("span",null,"What hardware wallets does Wasabi support?")])],-1),Hn={href:"https://github.com/bitcoin-core/HWI",target:"_blank",rel:"noopener noreferrer"},qn={href:"https://github.com/WalletWasabi/WalletWasabi/blob/master/WalletWasabi.Documentation/WasabiCompatibility.md#officially-supported-hardware-wallets",target:"_blank",rel:"noopener noreferrer"},Pn=e("h3",{id:"why-does-wasabi-use-the-hardware-wallet-interface",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#why-does-wasabi-use-the-hardware-wallet-interface"},[e("span",null,"Why does Wasabi use the Hardware Wallet Interface?")])],-1),Fn={href:"https://github.com/bitcoin-core/HWI",target:"_blank",rel:"noopener noreferrer"},Rn={href:"https://github.com/achow101",target:"_blank",rel:"noopener noreferrer"},zn=e("h3",{id:"does-wasabi-support-the-hidden-wallets-of-hardware-wallets",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#does-wasabi-support-the-hidden-wallets-of-hardware-wallets"},[e("span",null,"Does Wasabi support the hidden wallets of hardware wallets?")])],-1),Un={href:"https://github.com/bitcoin/bips/blob/master/bip-0039.mediawiki",target:"_blank",rel:"noopener noreferrer"},Dn=e("h3",{id:"how-can-i-generate-a-wasabi-skeleton-wallet-file-in-coldcard",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-can-i-generate-a-wasabi-skeleton-wallet-file-in-coldcard"},[e("span",null,"How can I generate a Wasabi skeleton wallet file in ColdCard?")])],-1),Nn=e("p",null,[t("On the ColdCard you go to "),e("code",null,"Advanced > MicroSD Card > Export Wallet > Wasabi Wallet"),t(" and it will save a skeleton json-file to the MicroSD card in the hardware wallet.")],-1),Qn=e("h3",{id:"how-can-i-import-the-wasabi-skeleton-wallet-file",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-can-i-import-the-wasabi-skeleton-wallet-file"},[e("span",null,"How can I import the Wasabi skeleton wallet file?")])],-1),Mn=e("p",null,[t("Take the MicroSD card from the ColdCard and plug it in the computer with the Wasabi Wallet software. In Wasabi Wallet go to "),e("code",null,"Add Wallet"),t(" and select "),e("code",null,"Import a wallet"),t(". Now select the Wasabi skeleton json-file from the MicroSD card, if this fails you can manually enter the file location in Wasabi Wallet window and load the file.")],-1),En=e("h3",{id:"how-can-i-generate-a-receiving-address-of-my-hardware-wallet",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-can-i-generate-a-receiving-address-of-my-hardware-wallet"},[e("span",null,"How can I generate a receiving address of my hardware wallet?")])],-1),On=e("p",null,[t("In Wasabi Wallet you load your previously imported wallet (from Wasabi skeleton, or USB detection) and go to the "),e("code",null,"Receive"),t(" dialog, here you enter a label for the observers of the incoming transaction and click "),e("code",null,"Continue"),t(". In the receive dialog, previously generated addresses (which haven't received any funds yet) can be viewed and copied at "),e("code",null,"Addresses Awaiting Payment"),t(".")],-1),Yn=s('

    How can I sign a transaction with a USB connected hardware wallet?

    To send a transaction you will need to connect your hardware wallet and unlock the device (using PIN or password).

    • Go to Send, enter the address to send to and the amount of bitcoin to spend.
    • Enter the label of whom you are sending to.
    • At the Preview Transaction screen, check if all the information is correct.
    • After you have checked that everything is correct, click Send Now to sign it with the connected hardware wallet and broadcast the transaction to the network.
    ',3),Gn=s('

    How can I build and export a transaction to ColdCard?

    • Enable PSBT workflow in the Wallet Settings.
    • Go to Send and enter the destination address and amount.
    • Click Continue.
    • Enter the label of whom you are sending to.
    • At the Preview Transaction screen, check that everything is correct.
    • Click on Save PSBT file and save the file to the MicroSD card.
    • You can then insert the MicroSD card (containing the PSBT) in the Coldcard for manual verification and signing.
    ',2),Jn=e("h3",{id:"how-can-i-sign-a-transaction-on-the-coldcard",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-can-i-sign-a-transaction-on-the-coldcard"},[e("span",null,"How can I sign a transaction on the ColdCard?")])],-1),Ln=e("p",null,[t("On the ColdCard (Mk2, firmware 2.1.1 and up) you enter the PIN code to unlock the hardware wallet and press "),e("code",null,"Ready To Sign"),t(" with the MicroSD card containing the previously generated transaction or PSBT-file. Verify the address and amount and the ColdCard will then create a signed.psbt and final.txn file on the MicroSD card. The finalized transaction ("),e("code",null,"xxx-final.txn"),t(") can now be broadcast by Wasabi Wallet with the "),e("code",null,"Broadcaster"),t(" tool, or even a radio or satellite dish if someone is listening!")],-1),Kn=e("h3",{id:"how-can-i-import-and-broadcast-a-final-transaction-from-coldcard",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-can-i-import-and-broadcast-a-final-transaction-from-coldcard"},[e("span",null,"How can I import and broadcast a final transaction from ColdCard?")])],-1),Vn=e("p",null,[t("In the top search bar, go to "),e("code",null,"Broadcaster"),t(" and then select "),e("code",null,"Import Transaction"),t(", now you can select the previously finalized (and signed) transaction file from the MicroSD card. If this fails you can manually type the path to this file in Wasabi Wallet to load the transaction. Now click "),e("code",null,"Broadcast Transaction"),t(" to send it off over Tor to a random Bitcoin node so it can flood over to the miners for confirmation in a block.")],-1),Xn=s('

    TIP

    A Broadcast button will be displayed next to the Send button, when PSBT workflow is enabled, for an easier workflow.

    Can I coinjoin bitcoins on my hardware wallet?

    No, that is currently not possible. A coinjoin is a multi round interactive process, and requires fast signing by the participants, thus the keys need to be on a hot computer. Thus currently you have to send the bitcoins from your hardware wallet to a hot Wasabi Wallet, do the coinjoin and then send them back to a new address on the Hardware wallet for cold-storage.

    ',3),$n={class:"custom-container tip"},Zn=e("p",{class:"custom-container-title"},"TIP",-1),eo={href:"https://content.trezor.io/coinjoin",target:"_blank",rel:"noopener noreferrer"},to=e("h3",{id:"does-ledger-live-send-my-public-keys-and-addresses-to-a-third-party-server",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#does-ledger-live-send-my-public-keys-and-addresses-to-a-third-party-server"},[e("span",null,"Does Ledger Live send my public keys and addresses to a third party server?")])],-1),ao={href:"https://support.ledger.com/hc/en-us/articles/360010892360",target:"_blank",rel:"noopener noreferrer"},no=e("p",null,"Your extended public key, however, is not shared with Ledger's node, but rather stored encrypted on your local machine.",-1),oo={href:"https://support.ledger.com/hc/en-us/articles/360011069619",target:"_blank",rel:"noopener noreferrer"},io=e("p",null,"Ledger could potentially analyze information from API calls to their nodes to link addresses to individual users, though Ledger says no logs are kept during normal operation.",-1),so=e("p",null,"To avoid any privacy leak, you can use a Ledger hardware wallet in combination with Wasabi as a software interface, and because Wasabi does not leak your addresses, your transaction history is not shared with anyone.",-1),ro=e("h3",{id:"after-i-coinjoined-my-coins-and-reached-100-privacy-i-sent-them-to-my-hardware-wallet-and-now-the-coins-have-anonscore-1-why",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#after-i-coinjoined-my-coins-and-reached-100-privacy-i-sent-them-to-my-hardware-wallet-and-now-the-coins-have-anonscore-1-why"},[e("span",null,"After I coinjoined my coins and reached 100% privacy, I sent them to my hardware wallet and now the coins have anonscore 1. Why?")])],-1),lo=e("p",null,"Everything is working as expected.",-1),ho=e("p",null,"The anonymity score (number) is tied to your wallet that you used to coinjoin, if you send a coinjoined coin to another Wasabi Wallet of yours (hardware wallet or normal wallet) it will have an anonscore of 1 because this wallet doesn't know all of the coinjoin history.",-1),co=e("p",null,'You should put a meaningful label when you generate a receive address in your hardware wallet, e.g. "private UTXO" (something that reminds you that you got this UTXO from your Wasabi Wallet and that it was coinjoined).',-1),uo=e("h3",{id:"can-i-use-trezor-one-with-wasabi",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#can-i-use-trezor-one-with-wasabi"},[e("span",null,"Can I use Trezor One with Wasabi?")])],-1),po={href:"https://github.com/WalletWasabi/WalletWasabi/blob/master/WalletWasabi.Documentation/WasabiCompatibility.md#officially-supported-hardware-wallets",target:"_blank",rel:"noopener noreferrer"},wo=e("h3",{id:"can-i-use-bitbox-with-wasabi",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#can-i-use-bitbox-with-wasabi"},[e("span",null,"Can I use BitBox with Wasabi?")])],-1),mo={href:"https://github.com/WalletWasabi/WalletWasabi/blob/master/WalletWasabi.Documentation/WasabiCompatibility.md#officially-supported-hardware-wallets",target:"_blank",rel:"noopener noreferrer"},yo=s('

    How can I type in the passphrase of my Trezor T?

    After connecting the Trezor T to your computer and upon trying to load your wallet, you get a message on the Trezor T to choose where to type your passphrase, on the device or the host (computer), choose the first option (device) then enter the passprase using the touchscreen of your Trezor T. Wasabi wallet will now load this passphrase protected wallet.

    I have coinjoined with a Trezor device on Trezor Suite, but in Wasabi I cannot see my coins?

    Trezor uses only Taproot for coinjoin, with a non-standard derivation path. So Wasabi does not know about the existence of the Trezor Suite coinjoin coins.

    How can I use Hardware Wallets on Linux (udev rules)?

    ',5),go={href:"https://github.com/WalletWasabi/WalletWasabi/releases/tag/v2.0.8",target:"_blank",rel:"noopener noreferrer"},bo=e("p",null,[t("On older versions, you need to create a set of "),e("code",null,"udev rules"),t(" for the hardware wallet to be reachable.")],-1),fo={href:"https://github.com/bitcoin-core/HWI/blob/master/hwilib/udev/README.md",target:"_blank",rel:"noopener noreferrer"},vo=s('

    History

    How can I check the transactions history?

    The wallet's main page displays the history of all transactions made with this specific wallet. It includes receiving, sending, and coinjoin transactions.

    Wasabi Wallet History

    How can I see coinjoins in the history list?

    Coinjoin transactions are indicated with a shield icon:

    History Coinjoin

    When the wallet has made multiple coinjoins, the coinjoins will be clustered. Coinjoin clusters are indicated with a double shield icon. To see the individual coinjoins, the cluster can be expanded by clicking the arrow on the left:

    History Coinjoin Expanded

    A coinjoin is a payment within the same wallet, thus it only shows the coordination fee (if any) and mining fee leaving the wallet.

    Can I sort the history items?

    Yes, the history items can be sorted by clicking on the transactions sort button:

    Sort Date Column

    Can I search for a transaction ID in the history?

    Yes. This can be done by pasting the transaction ID into the search bar or by manually typing part of the transaction ID. After clicking the result, the transaction will be highlighted in the history.

    SearchBar Search TX

    TIP

    It will only show results of the wallets which are currently open.

    Can I export a list of transactions?

    ',18),_o=e("code",null,"wallet.json",-1),ko=e("code",null,"WalletBackups",-1),Wo=e("code",null,"gethistory",-1),xo=e("h2",{id:"settings",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#settings"},[e("span",null,"Settings")])],-1),To=e("h3",{id:"how-do-i-connect-my-own-full-node-to-wasabi",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-do-i-connect-my-own-full-node-to-wasabi"},[e("span",null,"How do I connect my own full node to Wasabi?")])],-1),Io=e("ul",null,[e("li",null,"If you have a full node already running on the same computer as Wasabi, it will automatically be detected and used by default."),e("li",null,[t("If you have a full node on a remote computer, then you can connect to it by specifying the local network IP address or Tor onion service in the Wasabi "),e("code",null,"Settings"),t(" tab.")])],-1),jo=e("p",null,[e("img",{src:x,alt:"Wasabi Wallet Remote P2P Bitcoin Endpoint full node",title:"Wasabi Wallet Remote P2P Bitcoin Endpoint full node"})],-1),Co=e("ul",null,[e("li",null,[t("If you are not yet running a full node, Wasabi has the bitcoind binaries included, and with one click in the "),e("code",null,"Settings"),t(", you can start Bitcoin Knots together with Wasabi.")])],-1),Ao=e("p",null,[e("img",{src:T,alt:"Wasabi Wallet local Bitcoin Knots full node integration",title:"Wasabi Wallet local Bitcoin Knots full node integration"})],-1),Bo={href:"https://youtu.be/gWo2RAkIVrE",target:"_blank",rel:"noopener noreferrer"},So=e("img",{src:r,alt:"Watch the video"},null,-1),Ho=s('

    How can I turn off Tor?

    You can turn off Network anonymization (Tor) in the Settings. Note that this is a privacy concern, especially when you coinjoin and when you broadcast a transaction. In the first case, the coordinator would know the links between your inputs and outputs based on your IP address. In the second case, if you happen to broadcast a transaction of yours to a full node that is spying on you, it will know the link between your transaction and your IP address.

    DANGER

    It is recommended to always use Tor! The setting to turn it off is only intended for debugging and trouble shooting.

    How can I change the anonymity score target?

    The anonscore target is a wallet specific setting which is determined by the Coinjoin Strategy, but can also be manually changed in the Coinjoin Settings dialog.

    On the main view click the three dots on the top right corner after loading the wallet. Choose Coinjoin Settings, click Change (Coinjoin strategy), click Customize. Move the Anonymity score target slider to the desired value and click Done.

    Coinjoin Settings Anonymity score target

    Alternatively, you can change the anonymity score target by editing the wallet file. Go to the SearchBar and click Wallet Folder and open the wallet json file and edit the AnonScoreTarget value.

    "AnonScoreTarget": 5,
    -

    What is the dust threshold?

    `,10),qo={href:"https://bitcoin.stackexchange.com/questions/10986/what-is-meant-by-bitcoin-dust",target:"_blank",rel:"noopener noreferrer"},Po={href:"https://en.bitcoin.it/Privacy#Forced_address_reuse",target:"_blank",rel:"noopener noreferrer"},Fo=s('

    Specifically in the context of Wasabi, with the dust threshold settings you can limit the value of spam coins shown in the GUI. Coins that you receive from other wallets (so no self-spend) which are less than the dust threshold in value and are received on an already used address are not shown. For example: When it is set to 0.0000 5000 BTC, and you receive a coin worth 0.0000 4000 BTC from a different wallet to an already used address, then this transaction and the coin in the coin list will not be shown.

    Wasabi Wallet Dust threshold settings

    Where can I find the logs?

    In the SearchBar you can see there are several logs available.

    • The Logs shows the general log information about Wasabi Wallet.
    • The Tor Logs shows the Tor specific logs.

    Wasabi Wallet SearchBar Help&Support and Open

    ',6),Ro=e("h3",{id:"how-to-activate-deactivate-discreet-mode",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-to-activate-deactivate-discreet-mode"},[e("span",null,"How to activate/deactivate discreet mode?")])],-1),zo=e("p",null,"You can activate/deactivate Discreet Mode by clicking the Discreet Mode icon in the bottom left corner of the main view.",-1),Uo=e("p",null,[e("img",{src:I,alt:"Discreet Mode Icon",title:"Discreet Mode Icon"})],-1),Do=e("h3",{id:"how-can-i-change-to-the-white-theme",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-can-i-change-to-the-white-theme"},[e("span",null,"How can I change to the white theme?")])],-1),No=e("code",null,"Dark Mode",-1),Qo=e("code",null,"Dark Mode",-1),Mo=e("code",null,".walletwasabi/client/UIConfig.json",-1),Eo=e("code",null,"UIConfig.json",-1),Oo=e("code",null,'"DarkModeEnabled": true',-1),Yo=e("code",null,'"DarkModeEnabled": false',-1),Go=s('

    Wasabi Wallet white theme

    Coin Control Best Practices

    What are coins?

    ',3),Jo=e("h3",{id:"how-can-i-enable-manual-coin-control",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-can-i-enable-manual-coin-control"},[e("span",null,"How can I enable (manual) coin control?")])],-1),Lo=e("code",null,"alt",-1),Ko=e("code",null,"option",-1),Vo=e("em",null,"Review coins",-1),Xo=s('

    Send Review Coins

    This is a developer feature

    Do NOT use the manual coin control if you do not know what you are doing. Misusing it can have seriously bad privacy consequences.

    How do I select coins for spending?

    In the normal send workflow, Wasabi automatically selects which coins to send.

    To send a specific coin, the user can use the Wallet Coins dialog (a.k.a coinlist). The coinlist can be brought up by pressing the keyboard combination CTRL + C + D simultaneously on the main view or via the search bar.

    This is for advanced usage only

    Users should stick to the default send workflow. Misusing the coinlist for sending can result in critical privacy risks.

    Wallet Coins Send Selected Coins

    This is not full coin control

    You can only send coins in full. There is no possiblity to enter a bitcoin amount or receive change.

    Can I consolidate anonset coins?

    It is advisable to limit the recombining of mixed coins because it can only decrease the privacy of these coins. This reveals that all the consolidated UTXOs are controlled by one entity, which was not known before the consolidation. That said, if you combine only a couple of mixed coins, you might not reveal your pre-coinjoin transaction history, especially when you did several re-mixes. So consolidating some private coins is OK to do.

    Take great care!

    Never consolidate non-private coins with private (mixed) coins, as this negates the privacy benefits of the coinjoin.

    ',11),$o={href:"https://youtu.be/Tk8-N1kHa4g",target:"_blank",rel:"noopener noreferrer"},Zo=e("img",{src:r,alt:"Watch the video"},null,-1),ei=e("h3",{id:"how-can-i-send-my-anonset-coins-to-my-hardware-wallet",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-can-i-send-my-anonset-coins-to-my-hardware-wallet"},[e("span",null,"How can I send my anonset coins to my hardware wallet?")])],-1),ti=e("p",null,[t("Most hardware wallets communicate with servers to provide you with your balance. This reveals your public key to the server, which damages your privacy - the hardware wallet company can now link together all your addresses. As a result "),e("strong",null,"it is not recommended"),t(" that you send your mixed coins to an address associated with your hardware wallet unless you are confident that you have set up your hardware wallet in a way that it does not communicate with a 3rd party server (see below).")],-1),ai={href:"https://github.com/chris-belcher/electrum-personal-server",target:"_blank",rel:"noopener noreferrer"},ni={href:"https://github.com/kyuupichan/electrumx",target:"_blank",rel:"noopener noreferrer"},oi={href:"https://github.com/romanz/electrs",target:"_blank",rel:"noopener noreferrer"},ii=e("h3",{id:"what-can-i-do-with-small-change",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-can-i-do-with-small-change"},[e("span",null,"What can I do with small change?")])],-1),si=e("em",null,"change avoidance",-1),ri=e("p",null,"You should treat change as a kind of toxic waste (handled with great care). You can spend the change to the same entity as the initial transaction, without loosing much privacy. Only spend the change to another entity, if these two won't make you trouble knowing you interact with both of them. If needed, you can consolidate several change coins, but we advise you to do it in a coinjoin. In JoinMarket you can specify the exact amount of coinjoin, so it can be exactly the amount of the change. Or open a new Lightning Network node (not your main Lightning node), create a channel to a random peer on the network and route the funds back to you.",-1),li={class:"custom-container tip"},hi=e("p",{class:"custom-container-title"},"TIP",-1),ci=e("h2",{id:"music-box",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#music-box"},[e("span",null,"Music Box")])],-1),di=e("h3",{id:"what-does-awaiting-cheaper-coinjoins-mean",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-does-awaiting-cheaper-coinjoins-mean"},[e("span",null,[t("What does "),e("code",null,"Awaiting cheaper coinjoins"),t(" mean?")])])],-1),ui=e("h3",{id:"what-does-awaiting-the-blame-round-mean",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-does-awaiting-the-blame-round-mean"},[e("span",null,[t("What does "),e("code",null,"Awaiting the blame round"),t(" mean?")])])],-1),pi=e("h3",{id:"what-does-insufficient-funds-eligible-for-coinjoin-mean",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-does-insufficient-funds-eligible-for-coinjoin-mean"},[e("span",null,[t("What does "),e("code",null,"Insufficient funds eligible for coinjoin"),t(" mean?")])])],-1),wi=e("h3",{id:"what-does-some-funds-are-rejected-from-coinjoining-mean",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-does-some-funds-are-rejected-from-coinjoining-mean"},[e("span",null,[t("What does "),e("code",null,"Some funds are rejected from coinjoining"),t(" mean?")])])],-1),mi=e("code",null,"Wallet Coins",-1),yi=e("h2",{id:"buy-anything-button",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#buy-anything-button"},[e("span",null,"Buy Anything Button")])],-1),gi=e("h3",{id:"what-is-the-buy-anything-button",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-is-the-buy-anything-button"},[e("span",null,"What is the Buy Anything Button?")])],-1),bi={href:"https://shopinbit.com/",target:"_blank",rel:"noopener noreferrer"},fi=e("em",null,"Buy Anything",-1),vi=s('

    How does the Buy Anything Button work?

    When clicking on the Buy Anything Button, the user communicates with ShopinBit over a new Tor identity (unless Tor is disabled in the Settings). The user gets asked some questions, like what he wants to buy, and some follow-up questions needed for the order. After the details are confirmed in the chat, a bitcoin address gets displayed to pay the invoice. Once ShopinBit has received the bitcoin on the address with a confirmation, they will start processing the order. The processing time depends on what has been bought. For example, a physical product may take weeks to deliver but a spontaneous travel booking can be arranged within days.

    Does the Buy Anything Button hurt my privacy?

    The Buy Anything Button does not compromise your wallet's privacy. Things like the wallet balance and history are still private. However, when providing some personal details like e-mail and shipping address for the order, then ShopinBit is aware of these, the same as when ordering directly from them or any other merchant. They are aware of this and that's why they ask for the minimal required info possible to complete the order. Your wallet information is never connected to the information used for ordering anything.

    But of course, make sure to use private coins when sending them/anyone your bitcoin!

    What can I order and for whom is this available?

    ',6),_i={href:"https://shopinbit.com/",target:"_blank",rel:"noopener noreferrer"},ki=e("h2",{id:"advanced-usage",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#advanced-usage"},[e("span",null,"Advanced Usage")])],-1),Wi=e("h3",{id:"can-i-change-the-default-ports-for-the-wasabi-s-bundled-tor",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#can-i-change-the-default-ports-for-the-wasabi-s-bundled-tor"},[e("span",null,"Can I change the default ports for the Wasabi's bundled Tor?")])],-1),xi={href:"https://github.com/WalletWasabi/WalletWasabi/releases/tag/v2.0.6",target:"_blank",rel:"noopener noreferrer"},Ti=e("h3",{id:"where-does-the-btc-exchange-rate-come-from",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#where-does-the-btc-exchange-rate-come-from"},[e("span",null,"Where does the BTC exchange rate come from?")])],-1),Ii=e("p",null,"Wasabi fetches the BTC/USD exchange rate from one of these exchanges: blockchain.com, Bitstamp, CoinGecko, Coinbase, Gemini and Coingate. It first tries to fetch the exchange rate from blockchain.com, if that's not possible it will try to fetch it from the next exchange in the listed order (and so on, until success).",-1);function ji(Ci,Ai){const n=l("RouteLink"),i=l("ExternalLinkIcon");return C(),A("div",null,[oe,e("ol",null,[e("li",null,[a(n,{to:"/using-wasabi/InstallPackage.html"},{default:o(()=>[t("Download & Install")]),_:1}),t(" Wasabi (like with any other software) from the "),e("a",ie,[t("official website"),a(i)]),t(".")]),e("li",null,[a(n,{to:"/using-wasabi/WalletGeneration.html"},{default:o(()=>[t("Create a new wallet")]),_:1}),t(" or use an already existing one, by "),a(n,{to:"/using-wasabi/WalletRecovery.html"},{default:o(()=>[t("importing or recovering")]),_:1}),t(" your own wallet.")]),e("li",null,[a(n,{to:"/using-wasabi/Receive.html"},{default:o(()=>[t("Receive")]),_:1}),t(" some bitcoin.")]),e("li",null,[t("Wait, and let the wallet do some "),a(n,{to:"/using-wasabi/CoinJoin.html"},{default:o(()=>[t("coinjoins")]),_:1}),t(". Your wallet's privacy progress % will increase.")]),e("li",null,[t("Enjoy your private bitcoin funds! "),a(n,{to:"/using-wasabi/Send.html"},{default:o(()=>[t("Spend")]),_:1}),t(" some, send to your "),a(n,{to:"/using-wasabi/ColdWasabi.html"},{default:o(()=>[t("hardware wallet")]),_:1}),t(" (for cold storage) or leave them in Wasabi for a while.")])]),se,e("p",null,[t("You can "),a(n,{to:"/using-wasabi/WalletGeneration.html"},{default:o(()=>[t("generate as many new wallets")]),_:1}),t(" as you'd like, for no extra cost and without asking for permission.")]),re,e("p",null,[t("Alternatively, the wallet file can be manually renamed by doing the following: Type "),le,t(" in the search bar at the top of the main view to access the "),he,t(" folder and rename the "),ce,t(" wallet file. Or you can navigate to the "),de,t(" folder (inside the "),a(n,{to:"/FAQ/FAQ-UseWasabi.html#where-can-i-find-the-wasabi-data-folder"},{default:o(()=>[t("Wasabi data folder")]),_:1}),t(") and rename the "),ue,t(" wallet file. Then go to "),pe,t(" folder (inside the "),a(n,{to:"/FAQ/FAQ-UseWasabi.html#where-can-i-find-the-wasabi-data-folder"},{default:o(()=>[t("Wasabi data folder")]),_:1}),t(") and rename the "),we,t(" wallet file.")]),me,e("p",null,[t("The password (named "),ye,t(" since Wasabi version "),e("a",ge,[t("2.0.7"),a(i)]),t(" you set is used:")]),e("ul",null,[e("li",null,[t("As a 13th word (passphrase) as described in "),e("a",be,[t("BIP 39"),a(i)]),t(".")]),e("li",null,[t("To encrypt the private key of the extended private key as described in "),e("a",fe,[t("BIP 38"),a(i)]),t(" to get an encrypted secret which is stored on the computer.")])]),ve,_e,ke,e("div",We,[xe,e("p",null,[t("It is "),Te,t(" important to use a "),a(n,{to:"/using-wasabi/PasswordBestPractices.html"},{default:o(()=>[t("random and long passphrase")]),_:1}),t(".")])]),e("p",null,[t("Since it is very difficult for humans to generate true randomness, it is good to use a tool to help find a strong passphrase. This can be the "),e("a",Ie,[t("Diceware english wordlist"),a(i)]),t(" for true off-line password generation. A secure password manager software might also be used, but be careful here.")]),je,e("p",null,[e("a",Ce,[t("BIP 38"),a(i)]),t(" is a good standard, a well-tested and very secure way to encrypt a private key. It is also implemented in the "),e("a",Ae,[t("NBitcoin library"),a(i)]),t(", which is used by Wasabi. Additionally, there is no standard way (BIP) to encrypt HD wallets. Take into account that it is not only encryption what BIP 38 provides but also a brute-force protection.")]),Be,Se,He,e("p",null,[t("Read the whole document of "),e("a",qe,[t("terms and conditions, privacy policy, and legal statement here"),a(i)])]),Pe,e("p",null,[t("Save this file in your "),a(n,{to:"/FAQ/FAQ-UseWasabi.html#where-can-i-find-the-wasabi-data-folder"},{default:o(()=>[Fe,t(" data folder")]),_:1}),t(" as a json file like this: "),Re,t(". The "),ze,t(" will be displayed in the GUI.")]),Ue,De,Ne,Qe,Me,e("p",null,[a(n,{to:"/FAQ/FAQ-UseWasabi.html#what-does-the-privacy-progress-mean"},{default:o(()=>[t("The privacy progress")]),_:1}),t(" is influenced by the anonymity score target. If the coinjoin strategy is changed to one with a different anonnymity score target, this will cause the privacy progress to increase or decrease.")]),Ee,e("p",null,[t("A "),e("a",Oe,[t("BIP-158 block filter"),a(i)]),t(" is a data structure that contains a hash of all the addresses referenced in a block. It is much smaller than the whole block itself. The Wasabi coordinator generates these block filters, and sends them out to any wallet that requests them. A wallet client checks locally if the block filter matches any of the addresses in the wallet. If not, then the filter is stored for later reference and for syncing new wallets. If yes, then the wallet connects to a random Bitcoin peer-to-peer full node over Tor to request this entire block.")]),Ye,Ge,e("ol",null,[e("li",null,[e("p",null,[t("If you are connected to "),a(n,{to:"/using-wasabi/BitcoinFullNode.html"},{default:o(()=>[t("your own full node")]),_:1}),t(" then it will fetch the block from there.")])]),Je]),e("p",null,[t("Read more "),a(n,{to:"/using-wasabi/WalletLoad.html"},{default:o(()=>[t("here")]),_:1}),t(".")]),Le,e("p",null,[t("If the Tor network is having "),e("a",Ke,[t("issues"),a(i)]),t(", Wasabi notifies this and displays a warning triangle icon. For example, when Tor is experiencing a DDoS attack. Hover over the icon with the cursor to display more information.")]),Ve,e("div",Xe,[$e,e("p",null,[t("If you are doing a re-synchronization because you expect some missing funds, but after resync you still think your balance is not correct then try to increase the "),a(n,{to:"/FAQ/FAQ-UseWasabi.html#how-do-i-change-the-gap-limit-of-a-wallet"},{default:o(()=>[t("gap limit")]),_:1}),t(" of the wallet.")])]),Ze,et,tt,e("p",null,[t("Yes. See "),a(n,{to:"/using-wasabi/Daemon.html"},{default:o(()=>[t("this chapter")]),_:1}),t(" for more details.")]),at,nt,e("p",null,[t("Bitcoin is designed so that for every payment you can use a new address that is not tied to any of your previous addresses. When you use a new address for every coin, then it becomes much much more difficult to find out that these coins are yours. However, when you use "),a(n,{to:"/why-wasabi/AddressReuse.html"},{default:o(()=>[t("the same address for every coin")]),_:1}),t(", then everyone knows that all coins can be spent by one individual who has the private key - you! Thus, when someone finds out that you control this address, maybe you published it in your social media profile for donations, or you sent a coin to another peer who knows you, then he knows also how many bitcoin you have in that same address. Take good care to whom you tell your addresses, and every time use a different address.")]),ot,e("p",null,[t("Wasabi uses "),e("a",it,[t("BIP 44 multi-account hierarchy for deterministic wallets"),a(i)]),t(" so that you can generate countless addresses and have them all securely backed-up in the 12 recovery words.")]),st,rt,e("p",null,[t("You can generate a new bech32 address in the "),lt,t(" dialog of Wasabi Wallet. First you must set a label for it, so that you later know who knows that this address is yours. Be precise in the label of the observers who know this address is yours, as this is an important part of good "),a(n,{to:"/why-wasabi/Coins.html"},{default:o(()=>[t("coin selection")]),_:1}),t(" privacy best practices. Do not write anything else on the label exept the name of the entities that know this address belongs to you. Then you can click on "),ht,t(" which will now show you the address, and you can copy it to the clipboard. After a coin has been sent to this address, it is removed from the GUI. This is a good feature to help protect you against "),a(n,{to:"/why-wasabi/AddressReuse.html"},{default:o(()=>[t("address reuse")]),_:1}),t(".")]),ct,e("p",null,[t("Close Wasabi and edit the "),dt,t(" setting (which is "),ut,t(" by default) in the wallet file. The value depends on the settings of other tools that use the wallet too (e.g. use "),pt,t(" for "),e("a",wt,[t("BTCPay Server"),a(i)]),t(").")]),mt,e("p",null,[t("You can change the label of your "),yt,t(" by clicking on the edit icon. This is useful when you have generated a receiving address with a specific label, but then the sender (anyone that knows this address is yours) has changed. Take care with whom you have shared this address, because if you send it to several people, they all know this address belongs to you, and they might all send many coins to the same address. This is very bad for your privacy because of "),a(n,{to:"/why-wasabi/AddressReuse.html"},{default:o(()=>[t("address reuse")]),_:1}),t(", and it confuses you with the labeling of each unique coin.")]),gt,e("p",null,[t('Some wallets/exchanges do not yet support native SegWit bech32 addresses and may give an error message (e.g. "unknown bitcoin address"). Please contact these services to upgrade their infrastructure to support the latest industry standards. Wasabi cannot generate non-SegWit addresses, so one solution is to manage your funds with a wallet which does support legacy addresses. To check Bech32 adoption and wallets/exchanges support you can follow the '),e("a",bt,[t("Bitcoin Wiki"),a(i)]),t(" and "),e("a",ft,[t("Bitcoin Optech"),a(i)]),t(".")]),vt,e("p",null,[t("Wasabi follows "),e("a",_t,[t("BIP 84: Derivation scheme for P2WPKH Based Accounts"),a(i)]),t(" ("),kt,t(") and "),e("a",Wt,[t("BIP 86: Key Derivation for Single Key P2TR Outputs"),a(i)]),t(" ("),xt,t(").")]),Tt,e("p",null,[t("Yet multisig is a popular feature, and many Wasabikas do request it for extra security, willing to trade-off some privacy. "),e("a",It,[t("Electrum Wallet"),a(i)]),t(" is a fantastic wallet with many features, but only private if you connect to your own Electrum server full node. Electrum can be used to create different types of m-of-n multisig scripts, including the use of hardware wallets.")]),jt,Ct,e("p",null,[t("When Wasabi is running, it connects to random Bitcoin peer to peer nodes and listens for their gossip of all transactions on the network. Based on this information Wasabi builds its own local mempool of unconfirmed transactions. So when you have Wasabi running, you will be notified about an incoming receiving transaction as soon as it is gossiped on the network. But when Wasabi is offline, it does not listen to the network and it will not know about your unconfirmed transaction when you next launch Wasabi. In this case you have to wait until your transaction is confirmed in a block, and based on the "),e("a",At,[t("BIP 158 block filters"),a(i)]),t(", Wasabi will download that whole block including your transaction from a random P2P node.")]),Bt,e("p",null,[t("Wasabi doesn't provide a way to export all generated addresses (used and unused), however they are listed by using the "),a(n,{to:"/using-wasabi/RPC.html#listkeys"},{default:o(()=>[t("listkeys")]),_:1}),t(" RPC command.")]),e("p",null,[t("It is not possible to view previously used addresses in the GUI, as here only "),a(n,{to:"/FAQ/FAQ-UseWasabi.html#where-can-i-find-previously-generated-addresses"},{default:o(()=>[t("unused addresses")]),_:1}),t(" are shown.")]),St,e("p",null,[t("Unfortunately pay to many is not yet implemented in the GUI. However, you can use the "),a(n,{to:"/using-wasabi/RPC.html#send"},{default:o(()=>[t("RPC server "),Ht,t(" call")]),_:1}),t(" and specify multiple destination addresses.")]),qt,Pt,Ft,e("p",null,[t("All "),Rt,t(" transactions signal RBF by default. A pending transaction may be bumped (with RBF) by using the "),a(n,{to:"/FAQ/FAQ-UseWasabi.html#how-can-i-speed-up-a-pending-unconfirmed-transaction-cpfp-rbf"},{default:o(()=>[zt,t(" feature")]),_:1}),t(".")]),Ut,Dt,Nt,Qt,e("p",null,[t("Wasabi uses the "),e("a",Mt,[t("smartfee"),a(i)]),t(" estimation algorithm provided by bitcoind. This integrates both data from recent blocks, as well as the local mempool to estimate the current and future demand for blockspace. The lower the fee is, the longer the estimated wait; and the higher the fee, the faster the confirmation will come. There are several different confidence levels, each of them gives an educated guess how soon the transaction will confirm. But the provided time frames are only a rough estimation, and not at all a precise metric.")]),Et,e("p",null,[t("Because confirmation fee estimation is more an art than a science, you can also set the fee manually. Then you can go after your gut feeling, "),e("a",Ot,[t("mempool analysis"),a(i)]),t(", or just putting the minimum of 1 sat/vByte.")]),Yt,e("p",null,[t("If for some reason this fails, and a local "),a(n,{to:"/using-wasabi/BitcoinFullNode.html"},{default:o(()=>[t("Bitcoin full node")]),_:1}),t(" is connected, then this is used to broadcast the transaction. By default it is gossiped to 8 peers over clearnet, but this depends on how the full node is configured by the user.")]),Gt,Jt,e("p",null,[t("Wasabi might implement "),e("a",Lt,[t("BIP 156"),a(i)]),t(" the Dandelion protocol for transaction broadcasting when the Bitcoin network adopts it.")]),Kt,e("p",null,[t("When you "),a(n,{to:"/using-wasabi/CoinJoin.html"},{default:o(()=>[t("CoinJoin")]),_:1}),t(" coins with Wasabi, you actually de-link the trail from Bob/exchange, to the coins in your wallet. Those specific coins will be private after coinjoining. They can now be spent without having to worry about your boss or the exchange tracking your behavior.")]),Vt,Xt,$t,Zt,ea,ta,e("p",null,[t("Since Wasabi version "),e("a",aa,[t("2.0.4"),a(i)]),t(" this FAQ is now obsolete because of the new "),a(n,{to:"/FAQ/FAQ-UseWasabi.html#how-can-i-speed-up-a-pending-transaction"},{default:o(()=>[na,t(" feature")]),_:1}),t(" that can be used.")]),oa,e("p",null,[t("Read more "),a(n,{to:"/using-wasabi/Send.html#speed-up-or-cancel-transaction"},{default:o(()=>[t("here")]),_:1}),t(".")]),ia,e("p",null,[t("Read more "),a(n,{to:"/using-wasabi/Send.html#speed-up-or-cancel-transaction"},{default:o(()=>[t("here")]),_:1}),t(".")]),sa,e("p",null,[t("Yes, you can always send from your wallet. However, a best practice is to only send private funds. Making your wallet 100% private "),a(n,{to:"/FAQ/FAQ-UseWasabi.html#how-long-does-it-take-to-make-my-wallet-100-private"},{default:o(()=>[t("takes some time")]),_:1}),t(", but in the mean time you can always send the (private) funds.")]),ra,e("div",la,[ha,e("p",null,[t("Since Wasabi version "),e("a",ca,[t("2.0.4"),a(i)]),t(", there are privacy suggestions to only send private or semi-private coins.")])]),e("p",null,[t("Read more "),a(n,{to:"/using-wasabi/Send.html#privacy-suggestions"},{default:o(()=>[t("here")]),_:1}),t(".")]),da,ua,pa,wa,e("p",null,[t("Wasabi is an Anonymizing software provider so it is not a money transmitter, thus not under Bank Secrecy Act (BSA) regulations. Basically we can continue to operate like now and "),a(n,{to:"/why-wasabi/LegalConcern.html"},{default:o(()=>[t("it is compliant")]),_:1}),t(".")]),ma,e("p",null,[e("a",ya,[ga,a(i)])]),ba,e("p",null,[t("Since the goal is to have at least the minimum input count in one round, the "),a(n,{to:"/using-wasabi/CoinJoin.html#input-registration"},{default:o(()=>[t("input registration phase")]),_:1}),t(" can fail if too few participants registered in the available time frame.")]),fa,e("p",null,[t("Because the input registration phase takes some time, the coordinator needs to ensure that everyone is still online and ready to continue. So in the "),a(n,{to:"/using-wasabi/CoinJoin.html#connection-confirmation"},{default:o(()=>[t("connection confirmation phase")]),_:1}),t(" every Alice sends a signal to the coordinator that she is still online, and when all Alices do so, or after a timeout and the number of online Alices is still larger than the minimum number of inputs, this phase ends.")]),va,e("p",null,[t("In this "),a(n,{to:"/using-wasabi/CoinJoin.html#output-registration"},{default:o(()=>[t("phase")]),_:1}),t(", every client needs to change the value of their credentials to the desired output values. For example, the client presents to the coordinator two old credentials and two newly created ones. The two pairs sum up to the exact same value, which the coordinator can verify, without knowing the amount value of the credentials. This process may repeat multiple times.")]),_a,ka,e("p",null,[t("After all inputs and outputs are registered, the coordinator has all the information to build the coinjoin transaction. This raw (unsigned) transaction is sent to all Alices, each of them verifies that the transaction is valid and then signs it. The signatures are sent back to the coordinator who accumulates all of them. The "),a(n,{to:"/using-wasabi/CoinJoin.html#signing"},{default:o(()=>[t("singing phase")]),_:1}),t(" is concluded when the coordinator receives all the valid signatures for all registered inputs.")]),Wa,e("p",null,[t("If the signing phase fails from becoming successful due to some Alices disrupting the round, then a "),a(n,{to:"/using-wasabi/CoinJoin.html#blame-round"},{default:o(()=>[t("blame round")]),_:1}),t(" will be created with the successful Alices. In the blame round a new coinjoin will be constructed by repeating the coinjoin phases. All Alices have to sign this new transaction and send their signature to the coordinator.")]),xa,e("p",null,[t("In the "),a(n,{to:"/using-wasabi/CoinJoin.html#broadcasting"},{default:o(()=>[t("broadcasting phase")]),_:1}),t(" the coordinator sends the signed final CoinJoin transaction to several random Bitcoin peer to peer nodes, and it is gossiped throughout the network to the miners.")]),Ta,e("p",null,[t("You can try to make a coinjoin via Wasabi on the Bitcoin "),a(n,{to:"/using-wasabi/Testnet.html"},{default:o(()=>[t("TestNet")]),_:1}),t(" (an alternative Bitcoin network, to be used for testing). Go to "),Ia,t(" > "),ja,t(" and change the network to "),Ca,t('. Then restart your Wasabi and create a new wallet, this is needed because Wasabi differentiates between "Main wallets" and "TestNet wallets". This wallet will synchronize for the TestNet, and generate TestNet addresses. You can get tBTC from faucets like: '),e("a",Aa,[t("coinfaucet.eu/en/btc-testnet"),a(i)]),t(" or "),e("a",Ba,[t("bitcoinfaucet.uo1.net"),a(i)])]),Sa,Ha,qa,Pa,e("table",null,[e("thead",null,[e("tr",null,[Fa,e("th",Ra,[t("During "),a(n,{to:"/FAQ/FAQ-UseWasabi.html#what-is-happening-in-the-input-registration-phase"},{default:o(()=>[t("input registration phase")]),_:1})]),za])]),e("tbody",null,[Ua,e("tr",null,[Da,Na,e("td",Qa,[t("The coin(s) that disrupted the round will be banned for 6h from participating in another coinjoin. (This is to prevent "),e("a",Ma,[t("DoS attacks"),a(i)]),t(")")])])])]),Ea,e("p",null,[t("No you don't. CoinJoins are atomic, they either happen or they don't. If your wallet crashes or your computer goes offline during CoinJoin you simply don't participate in this CoinJoin, look at table "),a(n,{to:"/FAQ/FAQ-UseWasabi.html#does-wasabi-have-to-stay-on-during-coinjoin"},{default:o(()=>[t("here")]),_:1}),t(" for more info.")]),Oa,Ya,Ga,Ja,e("p",null,[t("First of all, Wasabi uses "),e("a",La,[t("BIP 158 block filters"),a(i)]),t(" to ensure network level privacy. You can follow these FAQs to have a full explanation on the theme:")]),e("ul",null,[e("li",null,[a(n,{to:"/FAQ/FAQ-UseWasabi.html#what-are-bip-158-block-filters"},{default:o(()=>[t("What are BIP-158 Block Filters?")]),_:1})]),e("li",null,[a(n,{to:"/FAQ/FAQ-Introduction.html#what-software-supplies-the-block-filters-that-wasabi-uses"},{default:o(()=>[t("What software supplies the block filters that Wasabi uses?")]),_:1})]),e("li",null,[a(n,{to:"/FAQ/FAQ-Introduction.html#can-the-coordinator-attack-me"},{default:o(()=>[t("Can the coordinator attack me?")]),_:1})]),e("li",null,[a(n,{to:"/FAQ/FAQ-Introduction.html#is-the-backend-s-coordinator-code-open-source"},{default:o(()=>[t("Is the backend's coordinator code open-source?")]),_:1})])]),Ka,e("ol",null,[e("li",null,[a(n,{to:"/FAQ/FAQ-UseWasabi.html#what-is-happening-in-the-input-registration-phase"},{default:o(()=>[t("Input registration phase")]),_:1})]),e("li",null,[a(n,{to:"/FAQ/FAQ-UseWasabi.html#what-is-happening-in-the-connection-confirmation-phase"},{default:o(()=>[t("Connection confirmation phase")]),_:1})]),e("li",null,[a(n,{to:"/FAQ/FAQ-UseWasabi.html#what-is-happening-in-the-output-registration-phase"},{default:o(()=>[t("Output registration phase")]),_:1})]),e("li",null,[a(n,{to:"/FAQ/FAQ-UseWasabi.html#what-is-happening-in-the-signing-phase"},{default:o(()=>[t("Signing phase")]),_:1})]),e("li",null,[a(n,{to:"/FAQ/FAQ-UseWasabi.html#what-is-happening-in-the-broadcasting-phase"},{default:o(()=>[t("Broadcasting phase")]),_:1})])]),Va,e("div",Xa,[$a,e("p",null,[t("You can enable the "),a(n,{to:"/FAQ/FAQ-UseWasabi.html#what-does-the-red-coin-isolation-mean-in-the-coinjoin-settings"},{default:o(()=>[t("red coin isolation")]),_:1}),t(" setting, in case you want to prevent possible input heuristics (from outside observers) of anonscore 1 coins into the same coinjoin round.")])]),Za,e("p",null,[t("Since Wasabi version "),e("a",en,[t("2.0.8"),a(i)]),t(" it is possible to exclude coins from participating in coinjoin in the GUI.")]),tn,an,nn,e("p",null,[t("Alternatively, coins can be excluded from coinjoin using the "),a(n,{to:"/using-wasabi/RPC.html#excludefromcoinjoin"},{default:o(()=>[t("excludefromcoinjoin")]),_:1}),t(" RPC call.")]),on,e("p",null,[t("Read more "),a(n,{to:"/using-wasabi/CoinJoin.html"},{default:o(()=>[t("here")]),_:1}),t(".")]),sn,e("p",null,[t("So this introduces a problem, or an attack vector - a malicious user could purposefully register coins, only to wait for the signing phase and not sign. This would halt the entire CoinJoin process for all other participants and Wasabi would no longer work. This is also known as "),e("a",rn,[t("denial of service attack"),a(i)]),t(".")]),ln,hn,cn,dn,un,e("p",null,[t("Since Wasabi version "),e("a",pn,[t("2.0.8"),a(i)]),t(", the coordinator can be changed in the GUI in the "),wn,t(" tab in the settings.")]),mn,e("p",null,[t("Wasabi uses "),e("a",yn,[t("BIP 39: mnemonic code for generating deterministic keys"),a(i)]),t(" to enable easy backups of all private keys in the wallet. The mnemonic is displayed as 12 recovery words that are only shown once during the wallet generation.")]),gn,bn,fn,e("p",null,[t("Please see "),a(n,{to:"/using-wasabi/BackupBestPractices.html"},{default:o(()=>[t("Wasabi Backup Best Practices")]),_:1}),t(" for more information about backups.")]),vn,e("p",null,[t("Although you can back up your private keys with the mnemonic words and passphrase, this is only a last resort recovery. If you want to also secure your address labels, the anonscore and additional metadata, then you can do a digital backup. Simply copy the "),_n,t(" folder with the "),kn,t(" files from your "),a(n,{to:"/FAQ/FAQ-UseWasabi.html#where-can-i-find-the-wasabi-data-folder"},{default:o(()=>[t("Wasabi data folder")]),_:1}),t(" onto suitable hardware, for example an encrypted USB stick. Note that this file has the encrypted private key (extracted from the extended private key), meaning that you only need the passphrase to spend the bitcoin. This also contains the extended public key, the public keys, and the address labels, meaning that it completely links all the coins, both pre and post mix, with clear proof.")]),Wn,e("p",null,[t("No. The passphrase/password you set is used as a 13th word (passphrase) as described in BIP39, you should back it up when you generate a wallet. It is necessary to spend your bitcoin or to recover your wallet, as shown in "),a(n,{to:"/FAQ/FAQ-UseWasabi.html#what-do-i-need-to-recover-my-wallet"},{default:o(()=>[t("this table")]),_:1}),t(".")]),xn,e("p",null,[e("a",Tn,[In,a(i)])]),e("p",null,[e("a",jn,[Cn,a(i)])]),e("p",null,[e("a",An,[Bn,a(i)])]),Sn,e("p",null,[t("Wasabi uses the Bitcoin Core "),e("a",Hn,[t("Hardware Wallet Interface (HWI)"),a(i)]),t(" which allows it to support a variety of hardware wallets. For the complete list of all the officially supported hardware wallets, click "),e("a",qn,[t("here"),a(i)]),t(".")]),Pn,e("p",null,[t("Wasabi uses the "),e("a",Fn,[t("Bitcoin Core Hardware Wallet Interface [HWI]"),a(i)]),t(", a python library tool for proper integration of off-line signing devices. It provides a standard way for any software wallet to communicate with any hardware wallet without needing any device specific drivers. HWI was developed and carefully reviewed over several years, with outstanding contributions by "),e("a",Rn,[t("Andrew Chow"),a(i)]),t(". Wasabi implements C# code that executes the HWI tool. Wasabi uses this powerful tool because there are no other dependencies necessary to support all the existing and future hardware wallets.")]),zn,e("p",null,[t("Partially. Only device side passphrase is supported. PC side passphrase is not. This means that the hidden wallet feature can be used with Trezor T, Ledger Nano S, Nano S Plus, Nano X and ColdCard. After the 12 or 24 words, enter the passphrase as the 13th or 25th word on the hardware wallet. It’s part of "),e("a",Un,[t("BIP 39"),a(i)]),t(".")]),Dn,Nn,e("p",null,[t("Read more "),a(n,{to:"/using-wasabi/ColdWasabi.html"},{default:o(()=>[t("here")]),_:1}),t(".")]),Qn,Mn,e("p",null,[t("Read more "),a(n,{to:"/using-wasabi/ColdWasabi.html#connecting-coldcard-via-sd-card"},{default:o(()=>[t("here")]),_:1}),t(".")]),En,On,e("p",null,[t("Read more "),a(n,{to:"/using-wasabi/ColdWasabi.html"},{default:o(()=>[t("here")]),_:1}),t(".")]),Yn,e("p",null,[t("Read more "),a(n,{to:"/using-wasabi/ColdWasabi.html#connecting-via-usb"},{default:o(()=>[t("here")]),_:1}),t(".")]),Gn,e("p",null,[t("Read more "),a(n,{to:"/using-wasabi/ColdWasabi.html#connecting-coldcard-via-sd-card"},{default:o(()=>[t("here")]),_:1}),t(".")]),Jn,Ln,e("p",null,[t("Read more "),a(n,{to:"/using-wasabi/ColdWasabi.html#connecting-coldcard-via-sd-card"},{default:o(()=>[t("here")]),_:1}),t(".")]),Kn,Vn,e("p",null,[t("Read more "),a(n,{to:"/using-wasabi/ColdWasabi.html#connecting-coldcard-via-sd-card"},{default:o(()=>[t("here")]),_:1}),t(".")]),Xn,e("p",null,[t("Read more "),a(n,{to:"/using-wasabi/ColdWasabi.html#cold-wasabi-protocol"},{default:o(()=>[t("here")]),_:1}),t(".")]),e("div",$n,[Zn,e("p",null,[t("Trezor now supports coinjoin with the Trezor Suite, using same rounds as Wasabi Wallet users. Read more "),e("a",eo,[t("here"),a(i)]),t(".")])]),to,e("p",null,[t("Only if you add your accounts in the app, but not if you update your device firmware or install apps. When using the Ledger Live software wallet to manage your coins, you send all of your used, and 20 unused addresses to Ledger's nodes. "),e("a",ao,[t("Source"),a(i)])]),no,e("p",null,[t("Read more "),e("a",oo,[t("here"),a(i)]),t(".")]),io,so,ro,lo,ho,co,uo,e("p",null,[t("No. Unfortunately, Trezor One is not supported by Wasabi Wallet. For the complete list of all the officially supported hardware wallets, click "),e("a",po,[t("here"),a(i)]),t(".")]),wo,e("p",null,[t("No. Unfortunately, BitBox is not supported by Wasabi Wallet. For the complete list of all the officially supported hardware wallets, click "),e("a",mo,[t("here"),a(i)]),t(".")]),yo,e("p",null,[t("Since Wasabi version "),e("a",go,[t("2.0.8"),a(i)]),t(" the Wasabi package contains the required udev rules, so they don't need to be manually installed.")]),bo,e("p",null,[t("Udev rules instructions can be found "),e("a",fo,[t("here"),a(i)]),t(".")]),vo,e("p",null,[t("There is currently no convenient way to export a list with transaction details inside the GUI. However, you can see the "),_o,t(" files inside the "),ko,t(" folder (you can find it in your "),a(n,{to:"/FAQ/FAQ-UseWasabi.html#where-can-i-find-the-wasabi-data-folder"},{default:o(()=>[t("Wasabi data folder")]),_:1}),t(") which contains all the public keys, labels and anonset.")]),e("p",null,[t("You can use the "),a(n,{to:"/using-wasabi/RPC.html#gethistory"},{default:o(()=>[t("Wasabi RPC server "),Wo,t(" call")]),_:1}),t(" to get a list of all transactions, including date, block height, amount, label and tx id.")]),xo,To,e("p",null,[t("There are three different ways of using your "),a(n,{to:"/using-wasabi/BitcoinFullNode.html"},{default:o(()=>[t("Bitcoin full node with Wasabi")]),_:1}),t(":")]),Io,jo,Co,Ao,e("p",null,[e("a",Bo,[So,a(i)])]),Ho,e("p",null,[t("Dust can mean "),e("a",qo,[t("a lot of things"),a(i)]),t(", depending on how you look at it. It can be a non-economical input, that is a UTXO that has less value than the fees it would cost to spend this coin. A dust attack is actually about "),e("a",Po,[t("forced address reuse"),a(i)]),t(", the malicious actor sends very small amounts into old addresses and consolidation of these dust UTXOs can link several coins in a wallet cluster.")]),Fo,e("p",null,[t("Alternatively, you can find the logs inside your "),a(n,{to:"/FAQ/FAQ-UseWasabi.html#where-can-i-find-the-wasabi-data-folder"},{default:o(()=>[t("Wasabi data folder")]),_:1}),t(".")]),Ro,zo,e("p",null,[t("Read more "),a(n,{to:"/using-wasabi/DiscreetMode.html"},{default:o(()=>[t("here")]),_:1}),t(".")]),Uo,Do,e("p",null,[t("You can change from the default dark to the white theme by disabling "),No,t(" in the Settings. Alternatively, you can switch to "),Qo,t(" in the "),Mo,t(),a(n,{to:"/FAQ/FAQ-UseWasabi.html#where-can-i-find-the-wasabi-data-folder"},{default:o(()=>[t("data folder")]),_:1}),t(". Open the "),Eo,t(" file and change the line from "),Oo,t(" to "),Yo,t(". Save the file and restart Wasabi. Please note that Wasabi is designed for the dark theme, and some color schemes might not look beautiful in the white mode.")]),Go,e("p",null,[t("Bitcoin uses a system of "),a(n,{to:"/why-wasabi/Coins.html"},{default:o(()=>[t("inputs and outputs")]),_:1}),t(" to keep track of who owns how many sats. Every transaction specifies one or more inputs, the chunk of bitcoin being spent, and one or more outputs, the destination of who receives the bitcoin. A coin is also called an unspent transaction output (UTXO), meaning that this output has not been used as the input of a new transaction - it is yet to be spent. In order to spend a UTXO, the valid signature and script has to be provided in the transaction. This ensures that only with knowledge of the correct private key can this coin be sent to a new address. This chain of links between inputs being spent and outputs being generated is verified by every full node, and stored on the blockchain.")]),Jo,e("p",null,[t("The default "),a(n,{to:"/using-wasabi/Send.html#how-to-send-bitcoin-step-by-step"},{default:o(()=>[t("send workflow")]),_:1}),t(' uses the automatic coin selection algorithm, which is optimized in a way that "traditional" coin control is obsolete. However, the user can review which coins are selected, or select different coins using the (manual) coin control. This can be done by pressing and holding the keystroke '),Lo,t(" (or "),Ko,t(" on mac device) at the Preview Transaction screen, which will bring up the "),Vo,t(" button to click on.")]),Xo,e("p",null,[e("a",$o,[Zo,a(i)])]),ei,ti,e("p",null,[t("You can, however, manage your hardware wallet with the Wasabi interface. Alternatively, you can use your hardware wallet with Electrum, and in order to not leak any information to third-party servers run your own "),e("a",ai,[t("Electrum Personal Server"),a(i)]),t(", "),e("a",ni,[t("ElectrumX"),a(i)]),t(" or "),e("a",oi,[t("Electrs"),a(i)]),t(".")]),ii,e("p",null,[t("There are no hard and fast rules for "),a(n,{to:"/using-wasabi/ChangeCoins.html"},{default:o(()=>[t("what to do with the change")]),_:1}),t(". Generally try to avoid having change by using the "),a(n,{to:"/using-wasabi/Send.html#how-to-send-bitcoin-step-by-step"},{default:o(()=>[si,t(" suggestions when sending")]),_:1}),t(". Generally change should be coinjoined, Wasabi automatically coinjoins the change if possible (if the change is more than the "),a(n,{to:"/FAQ/FAQ-UseWasabi.html#what-is-the-minimum-amount-required-to-coinjoin"},{default:o(()=>[t("coinjoin minimum")]),_:1}),t(").")]),ri,e("div",li,[hi,e("p",null,[t("For more information, see this "),a(n,{to:"/using-wasabi/ChangeCoins.html"},{default:o(()=>[t("dedicated chapter")]),_:1}),t(".")])]),ci,di,e("p",null,[t("It means your wallet is waiting to participate in a cheaper coinjoin round(s) because the fee rate of the current coinjoin(s) is higher than the median of the selected "),a(n,{to:"/glossary/Glossary-PrivacyWasabi.html#coinjoin-time-preference"},{default:o(()=>[t("Coinjoin time preference")]),_:1}),t(".")]),ui,e("p",null,[t("If some other participant disrupted the round by failing to sign the coinjoin transaction, this message briefly appears before a new coinjoin, known as the "),a(n,{to:"/using-wasabi/CoinJoin.html#blame-round"},{default:o(()=>[t("blame round")]),_:1}),t(", is created with the responsive participants from the failed round.")]),pi,e("p",null,[t("This message is displayed when some coins cannot coinjoin, for example when they are unconfirmed or below the "),a(n,{to:"/FAQ/FAQ-UseWasabi.html#what-is-the-minimum-amount-required-to-coinjoin"},{default:o(()=>[t("minimum coinjoin amount")]),_:1}),t(".")]),wi,e("p",null,[t("If an input has failed to sign during a previous round it registered to, it will be "),a(n,{to:"/FAQ/FAQ-UseWasabi.html#why-do-my-coins-occasionally-get-banned-from-participating-in-coinjoin"},{default:o(()=>[t("temporarily banned")]),_:1}),t(" to prevent denial of service attacks. Coinjoin coordinators may also reject funds for risk management purposes. You can view the ban time at the "),mi,t(" dialog via the search bar or with the keyboard shortcut “CTRL + C + D”.")]),yi,gi,e("p",null,[t("The Buy Anything button was introduced in Wasabi version 2.0.5 which can be used to make purchases directly with Bitcoin. The button is an integration using "),e("a",bi,[t("Shopinbit's"),a(i)]),t(" premium concierge service and travel booking services which are now conveniently accessible from your wallet. You can "),fi,t(" because ShopinBit has a team of experts that handle your customized orders, whether it's electronics, cars, flights, or hotels. There is currently a $1,000 minimum purchase limit for this service.")]),vi,e("p",null,[t("ShopinBit can get you anything that is legal in Poland. Some services may or may not be available depending on the jurisdiction. Their Terms and Conditions are displayed and required to be accepted before ordering. For (legal) information and questions, please refer to the "),e("a",_i,[t("Shopinbit website"),a(i)]),t(".")]),ki,Wi,e("p",null,[t("Yes. Since Wasabi version "),e("a",xi,[t("2.0.6"),a(i)]),t(" it is possible to specify the Tor SOCKS5 and the Tor control ports. This can be done by specifying the port(s) at startup with the "),a(n,{to:"/using-wasabi/StartupParameters.html#non-config-file-configurations"},{default:o(()=>[t("startup parameters")]),_:1}),t(".")]),Ti,Ii])}const Mi=j(ne,[["render",ji],["__file","FAQ-UseWasabi.html.vue"]]),Ei=JSON.parse(`{"path":"/FAQ/FAQ-UseWasabi.html","title":"Use of Wasabi FAQ","lang":"en-US","frontmatter":{"title":"Use of Wasabi FAQ","description":"Frequently asked questions about the nuances of how to use Wasabi properly. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"General","slug":"general","link":"#general","children":[{"level":3,"title":"How do I start using Wasabi?","slug":"how-do-i-start-using-wasabi","link":"#how-do-i-start-using-wasabi","children":[]},{"level":3,"title":"How do I generate a new wallet?","slug":"how-do-i-generate-a-new-wallet","link":"#how-do-i-generate-a-new-wallet","children":[]},{"level":3,"title":"Can I rename my Wallet?","slug":"can-i-rename-my-wallet","link":"#can-i-rename-my-wallet","children":[]},{"level":3,"title":"What is the password used for?","slug":"what-is-the-password-used-for","link":"#what-is-the-password-used-for","children":[]},{"level":3,"title":"What password should I use?","slug":"what-password-should-i-use","link":"#what-password-should-i-use","children":[]},{"level":3,"title":"Where can I find the Wasabi data folder?","slug":"where-can-i-find-the-wasabi-data-folder","link":"#where-can-i-find-the-wasabi-data-folder","children":[]},{"level":3,"title":"Can I spend my bitcoin without the password?","slug":"can-i-spend-my-bitcoin-without-the-password","link":"#can-i-spend-my-bitcoin-without-the-password","children":[]},{"level":3,"title":"Why BIP 38?","slug":"why-bip-38","link":"#why-bip-38","children":[]},{"level":3,"title":"What are the terms and conditions?","slug":"what-are-the-terms-and-conditions","link":"#what-are-the-terms-and-conditions","children":[]},{"level":3,"title":"Can I import a watch-only extended public key?","slug":"can-i-import-a-watch-only-extended-public-key","link":"#can-i-import-a-watch-only-extended-public-key","children":[]},{"level":3,"title":"What does the privacy progress mean?","slug":"what-does-the-privacy-progress-mean","link":"#what-does-the-privacy-progress-mean","children":[]},{"level":3,"title":"Why does the privacy progress change if I select a different coinjoin strategy?","slug":"why-does-the-privacy-progress-change-if-i-select-a-different-coinjoin-strategy","link":"#why-does-the-privacy-progress-change-if-i-select-a-different-coinjoin-strategy","children":[]},{"level":3,"title":"What does the bar with the colored segments mean?","slug":"what-does-the-bar-with-the-colored-segments-mean","link":"#what-does-the-bar-with-the-colored-segments-mean","children":[]},{"level":3,"title":"How can I display the fee in sats?","slug":"how-can-i-display-the-fee-in-sats","link":"#how-can-i-display-the-fee-in-sats","children":[]},{"level":3,"title":"What is the box (music box) at the bottom of the wallet's main view?","slug":"what-is-the-box-music-box-at-the-bottom-of-the-wallet-s-main-view","link":"#what-is-the-box-music-box-at-the-bottom-of-the-wallet-s-main-view","children":[]},{"level":3,"title":"Does Wasabi support Taproot?","slug":"does-wasabi-support-taproot","link":"#does-wasabi-support-taproot","children":[]}]},{"level":2,"title":"Synchronization","slug":"synchronization","link":"#synchronization","children":[{"level":3,"title":"What are BIP-158 block filters?","slug":"what-are-bip-158-block-filters","link":"#what-are-bip-158-block-filters","children":[]},{"level":3,"title":"How does Wasabi download a relevant block?","slug":"how-does-wasabi-download-a-relevant-block","link":"#how-does-wasabi-download-a-relevant-block","children":[]},{"level":3,"title":"How do I know if the synchronization is finished?","slug":"how-do-i-know-if-the-synchronization-is-finished","link":"#how-do-i-know-if-the-synchronization-is-finished","children":[]},{"level":3,"title":"Why does the Tor status have a warning triangle icon?","slug":"why-does-the-tor-status-have-a-warning-triangle-icon","link":"#why-does-the-tor-status-have-a-warning-triangle-icon","children":[]},{"level":3,"title":"How long does the initial, and a subsequent synchronization take?","slug":"how-long-does-the-initial-and-a-subsequent-synchronization-take","link":"#how-long-does-the-initial-and-a-subsequent-synchronization-take","children":[]},{"level":3,"title":"Can I shutdown my computer while a wallet is synchronizing?","slug":"can-i-shutdown-my-computer-while-a-wallet-is-synchronizing","link":"#can-i-shutdown-my-computer-while-a-wallet-is-synchronizing","children":[]},{"level":3,"title":"How do I resync (rescan) my wallet?","slug":"how-do-i-resync-rescan-my-wallet","link":"#how-do-i-resync-rescan-my-wallet","children":[]},{"level":3,"title":"Can Wasabi work with a pruned bitcoin node?","slug":"can-wasabi-work-with-a-pruned-bitcoin-node","link":"#can-wasabi-work-with-a-pruned-bitcoin-node","children":[]},{"level":3,"title":"Can I run a Wasabi headless daemon?","slug":"can-i-run-a-wasabi-headless-daemon","link":"#can-i-run-a-wasabi-headless-daemon","children":[]}]},{"level":2,"title":"Receive","slug":"receive","link":"#receive","children":[{"level":3,"title":"Why is it bad to re-use addresses?","slug":"why-is-it-bad-to-re-use-addresses","link":"#why-is-it-bad-to-re-use-addresses","children":[]},{"level":3,"title":"How do I generate a new receiving address?","slug":"how-do-i-generate-a-new-receiving-address","link":"#how-do-i-generate-a-new-receiving-address","children":[]},{"level":3,"title":"Where can I find previously generated addresses?","slug":"where-can-i-find-previously-generated-addresses","link":"#where-can-i-find-previously-generated-addresses","children":[]},{"level":3,"title":"What is the gap limit?","slug":"what-is-the-gap-limit","link":"#what-is-the-gap-limit","children":[]},{"level":3,"title":"How do I change the gap limit of a wallet?","slug":"how-do-i-change-the-gap-limit-of-a-wallet","link":"#how-do-i-change-the-gap-limit-of-a-wallet","children":[]},{"level":3,"title":"Why do I have to label my address?","slug":"why-do-i-have-to-label-my-address","link":"#why-do-i-have-to-label-my-address","children":[]},{"level":3,"title":"How can I change the label of my receive address?","slug":"how-can-i-change-the-label-of-my-receive-address","link":"#how-can-i-change-the-label-of-my-receive-address","children":[]},{"level":3,"title":"How can I edit the labels of my address after a transaction has gone through?","slug":"how-can-i-edit-the-labels-of-my-address-after-a-transaction-has-gone-through","link":"#how-can-i-edit-the-labels-of-my-address-after-a-transaction-has-gone-through","children":[]},{"level":3,"title":"Are there privacy concerns regarding whom I send my address?","slug":"are-there-privacy-concerns-regarding-whom-i-send-my-address","link":"#are-there-privacy-concerns-regarding-whom-i-send-my-address","children":[]},{"level":3,"title":"Why does Wasabi only use SegWit bech32 addresses?","slug":"why-does-wasabi-only-use-segwit-bech32-addresses","link":"#why-does-wasabi-only-use-segwit-bech32-addresses","children":[]},{"level":3,"title":"Why do some third party services say the Wasabi address is invalid?","slug":"why-do-some-third-party-services-say-the-wasabi-address-is-invalid","link":"#why-do-some-third-party-services-say-the-wasabi-address-is-invalid","children":[]},{"level":3,"title":"Where can I find my address QR code?","slug":"where-can-i-find-my-address-qr-code","link":"#where-can-i-find-my-address-qr-code","children":[]},{"level":3,"title":"What derivation paths does Wasabi use?","slug":"what-derivation-paths-does-wasabi-use","link":"#what-derivation-paths-does-wasabi-use","children":[]},{"level":3,"title":"Can I generate a multi signature script?","slug":"can-i-generate-a-multi-signature-script","link":"#can-i-generate-a-multi-signature-script","children":[]},{"level":3,"title":"How does Wasabi know of incoming transactions to the mempool?","slug":"how-does-wasabi-know-of-incoming-transactions-to-the-mempool","link":"#how-does-wasabi-know-of-incoming-transactions-to-the-mempool","children":[]},{"level":3,"title":"Can I export all my receive addresses?","slug":"can-i-export-all-my-receive-addresses","link":"#can-i-export-all-my-receive-addresses","children":[]}]},{"level":2,"title":"Send","slug":"send","link":"#send","children":[{"level":3,"title":"How do I set a destination address?","slug":"how-do-i-set-a-destination-address","link":"#how-do-i-set-a-destination-address","children":[]},{"level":3,"title":"How do I set the payment amount?","slug":"how-do-i-set-the-payment-amount","link":"#how-do-i-set-the-payment-amount","children":[]},{"level":3,"title":"Can I pay to many addresses?","slug":"can-i-pay-to-many-addresses","link":"#can-i-pay-to-many-addresses","children":[]},{"level":3,"title":"Can I set a custom change address?","slug":"can-i-set-a-custom-change-address","link":"#can-i-set-a-custom-change-address","children":[]},{"level":3,"title":"Does Wasabi support sending RBF?","slug":"does-wasabi-support-sending-rbf","link":"#does-wasabi-support-sending-rbf","children":[]},{"level":3,"title":"Why does Wasabi choose a new random node every time I send a transaction?","slug":"why-does-wasabi-choose-a-new-random-node-every-time-i-send-a-transaction","link":"#why-does-wasabi-choose-a-new-random-node-every-time-i-send-a-transaction","children":[]},{"level":3,"title":"What fee should I select?","slug":"what-fee-should-i-select","link":"#what-fee-should-i-select","children":[]},{"level":3,"title":"How do I set custom fee rate?","slug":"how-do-i-set-custom-fee-rate","link":"#how-do-i-set-custom-fee-rate","children":[]},{"level":3,"title":"How does Wasabi select which coins to send?","slug":"how-does-wasabi-select-which-coins-to-send","link":"#how-does-wasabi-select-which-coins-to-send","children":[]},{"level":3,"title":"How is the transaction broadcast?","slug":"how-is-the-transaction-broadcast","link":"#how-is-the-transaction-broadcast","children":[]},{"level":3,"title":"What is the cluster history?","slug":"what-is-the-cluster-history","link":"#what-is-the-cluster-history","children":[]},{"level":3,"title":"Why Wasabi did not send some of my selected coins?","slug":"why-wasabi-did-not-send-some-of-my-selected-coins","link":"#why-wasabi-did-not-send-some-of-my-selected-coins","children":[]},{"level":3,"title":"How can I bump the transaction fee with child pays for parent (CPFP)?","slug":"how-can-i-bump-the-transaction-fee-with-child-pays-for-parent-cpfp","link":"#how-can-i-bump-the-transaction-fee-with-child-pays-for-parent-cpfp","children":[]},{"level":3,"title":"How can I speed up a pending/unconfirmed transaction (CPFP/RBF)?","slug":"how-can-i-speed-up-a-pending-unconfirmed-transaction-cpfp-rbf","link":"#how-can-i-speed-up-a-pending-unconfirmed-transaction-cpfp-rbf","children":[]},{"level":3,"title":"How can I cancel a pending/unconfirmed transaction?","slug":"how-can-i-cancel-a-pending-unconfirmed-transaction","link":"#how-can-i-cancel-a-pending-unconfirmed-transaction","children":[]},{"level":3,"title":"Why is there no Send button, only the Receive button is displayed?","slug":"why-is-there-no-send-button-only-the-receive-button-is-displayed","link":"#why-is-there-no-send-button-only-the-receive-button-is-displayed","children":[]},{"level":3,"title":"Can I send (privately) from my wallet when the privacy progress is below 100%?","slug":"can-i-send-privately-from-my-wallet-when-the-privacy-progress-is-below-100","link":"#can-i-send-privately-from-my-wallet-when-the-privacy-progress-is-below-100","children":[]}]},{"level":2,"title":"CoinJoin","slug":"coinjoin","link":"#coinjoin","children":[{"level":3,"title":"What's the legal status of Wasabi/CoinJoin?","slug":"what-s-the-legal-status-of-wasabi-coinjoin","link":"#what-s-the-legal-status-of-wasabi-coinjoin","children":[]},{"level":3,"title":"What is the minimum amount required to coinjoin?","slug":"what-is-the-minimum-amount-required-to-coinjoin","link":"#what-is-the-minimum-amount-required-to-coinjoin","children":[]},{"level":3,"title":"What is the maximum amount I can coinjoin?","slug":"what-is-the-maximum-amount-i-can-coinjoin","link":"#what-is-the-maximum-amount-i-can-coinjoin","children":[]},{"level":3,"title":"What are the fees for the coinjoin?","slug":"what-are-the-fees-for-the-coinjoin","link":"#what-are-the-fees-for-the-coinjoin","children":[]},{"level":3,"title":"What is the anonymity set?","slug":"what-is-the-anonymity-set","link":"#what-is-the-anonymity-set","children":[]},{"level":3,"title":"What is the anonymity score?","slug":"what-is-the-anonymity-score","link":"#what-is-the-anonymity-score","children":[]},{"level":3,"title":"What is the difference between anonymity set and anonymity score?","slug":"what-is-the-difference-between-anonymity-set-and-anonymity-score","link":"#what-is-the-difference-between-anonymity-set-and-anonymity-score","children":[]},{"level":3,"title":"What are the equal denominations created in a coinjoin round?","slug":"what-are-the-equal-denominations-created-in-a-coinjoin-round","link":"#what-are-the-equal-denominations-created-in-a-coinjoin-round","children":[]},{"level":3,"title":"What is happening in the input registration phase?","slug":"what-is-happening-in-the-input-registration-phase","link":"#what-is-happening-in-the-input-registration-phase","children":[]},{"level":3,"title":"What is happening in the connection confirmation phase?","slug":"what-is-happening-in-the-connection-confirmation-phase","link":"#what-is-happening-in-the-connection-confirmation-phase","children":[]},{"level":3,"title":"What is happening in the output registration phase?","slug":"what-is-happening-in-the-output-registration-phase","link":"#what-is-happening-in-the-output-registration-phase","children":[]},{"level":3,"title":"What is happening in the signing phase?","slug":"what-is-happening-in-the-signing-phase","link":"#what-is-happening-in-the-signing-phase","children":[]},{"level":3,"title":"What is happening during the blame round?","slug":"what-is-happening-during-the-blame-round","link":"#what-is-happening-during-the-blame-round","children":[]},{"level":3,"title":"What is happening in the broadcasting phase?","slug":"what-is-happening-in-the-broadcasting-phase","link":"#what-is-happening-in-the-broadcasting-phase","children":[]},{"level":3,"title":"Is there any additional anonymity using multiple wallets for CoinJoins?","slug":"is-there-any-additional-anonymity-using-multiple-wallets-for-coinjoins","link":"#is-there-any-additional-anonymity-using-multiple-wallets-for-coinjoins","children":[]},{"level":3,"title":"How is the anonymity set target determined for CoinJoins?","slug":"how-is-the-anonymity-set-target-determined-for-coinjoins","link":"#how-is-the-anonymity-set-target-determined-for-coinjoins","children":[]},{"level":3,"title":"I'd like to experience coinjoin but I'm not comfortable using real Bitcoin. What can I do?","slug":"i-d-like-to-experience-coinjoin-but-i-m-not-comfortable-using-real-bitcoin-what-can-i-do","link":"#i-d-like-to-experience-coinjoin-but-i-m-not-comfortable-using-real-bitcoin-what-can-i-do","children":[]},{"level":3,"title":"Does Wasabi have to stay on during coinjoin?","slug":"does-wasabi-have-to-stay-on-during-coinjoin","link":"#does-wasabi-have-to-stay-on-during-coinjoin","children":[]},{"level":3,"title":"What if there's a power outage during CoinJoin? Do I lose my coins?","slug":"what-if-there-s-a-power-outage-during-coinjoin-do-i-lose-my-coins","link":"#what-if-there-s-a-power-outage-during-coinjoin-do-i-lose-my-coins","children":[]},{"level":3,"title":"How much anonymity set do I need?","slug":"how-much-anonymity-set-do-i-need","link":"#how-much-anonymity-set-do-i-need","children":[]},{"level":3,"title":"How does my wallet communicate with the Wasabi coordinator server?","slug":"how-does-my-wallet-communicate-with-the-wasabi-coordinator-server","link":"#how-does-my-wallet-communicate-with-the-wasabi-coordinator-server","children":[]},{"level":3,"title":"What is the address of the coordinator?","slug":"what-is-the-address-of-the-coordinator","link":"#what-is-the-address-of-the-coordinator","children":[]},{"level":3,"title":"What is the maximum number of coins that can be registered in a coinjoin?","slug":"what-is-the-maximum-number-of-coins-that-can-be-registered-in-a-coinjoin","link":"#what-is-the-maximum-number-of-coins-that-can-be-registered-in-a-coinjoin","children":[]},{"level":3,"title":"How many coins/outputs do I get from a coinjoin?","slug":"how-many-coins-outputs-do-i-get-from-a-coinjoin","link":"#how-many-coins-outputs-do-i-get-from-a-coinjoin","children":[]},{"level":3,"title":"Can I manually select which coins to register for coinjoin?","slug":"can-i-manually-select-which-coins-to-register-for-coinjoin","link":"#can-i-manually-select-which-coins-to-register-for-coinjoin","children":[]},{"level":3,"title":"How to exclude/freeze coins from coinjoin?","slug":"how-to-exclude-freeze-coins-from-coinjoin","link":"#how-to-exclude-freeze-coins-from-coinjoin","children":[]},{"level":3,"title":"How long does it take to make my wallet 100% private?","slug":"how-long-does-it-take-to-make-my-wallet-100-private","link":"#how-long-does-it-take-to-make-my-wallet-100-private","children":[]},{"level":3,"title":"What coinjoin strategy should I select?","slug":"what-coinjoin-strategy-should-i-select","link":"#what-coinjoin-strategy-should-i-select","children":[]},{"level":3,"title":"What is the coinjoin strategy?","slug":"what-is-the-coinjoin-strategy","link":"#what-is-the-coinjoin-strategy","children":[]},{"level":3,"title":"What are the differences/settings per coinjoin strategy?","slug":"what-are-the-differences-settings-per-coinjoin-strategy","link":"#what-are-the-differences-settings-per-coinjoin-strategy","children":[]},{"level":3,"title":"What does the Auto-start coinjoin threshold mean in the coinjoin settings?","slug":"what-does-the-auto-start-coinjoin-threshold-mean-in-the-coinjoin-settings","link":"#what-does-the-auto-start-coinjoin-threshold-mean-in-the-coinjoin-settings","children":[]},{"level":3,"title":"What does the Red coin isolation mean in the coinjoin settings?","slug":"what-does-the-red-coin-isolation-mean-in-the-coinjoin-settings","link":"#what-does-the-red-coin-isolation-mean-in-the-coinjoin-settings","children":[]},{"level":3,"title":"Do coinjoin transactions signal RBF?","slug":"do-coinjoin-transactions-signal-rbf","link":"#do-coinjoin-transactions-signal-rbf","children":[]},{"level":3,"title":"Why do my coins occasionally get banned from participating in CoinJoin?","slug":"why-do-my-coins-occasionally-get-banned-from-participating-in-coinjoin","link":"#why-do-my-coins-occasionally-get-banned-from-participating-in-coinjoin","children":[]},{"level":3,"title":"How do I change the coordinator?","slug":"how-do-i-change-the-coordinator","link":"#how-do-i-change-the-coordinator","children":[]}]},{"level":2,"title":"Backup and Recovery","slug":"backup-and-recovery","link":"#backup-and-recovery","children":[{"level":3,"title":"How do I back up my mnemonic words?","slug":"how-do-i-back-up-my-mnemonic-words","link":"#how-do-i-back-up-my-mnemonic-words","children":[]},{"level":3,"title":"How do I back up my wallet file?","slug":"how-do-i-back-up-my-wallet-file","link":"#how-do-i-back-up-my-wallet-file","children":[]},{"level":3,"title":"What do I need to recover my wallet?","slug":"what-do-i-need-to-recover-my-wallet","link":"#what-do-i-need-to-recover-my-wallet","children":[]},{"level":3,"title":"Can I recover my wallet without the password?","slug":"can-i-recover-my-wallet-without-the-password","link":"#can-i-recover-my-wallet-without-the-password","children":[]},{"level":3,"title":"What should I do if I forget my password?","slug":"what-should-i-do-if-i-forget-my-password","link":"#what-should-i-do-if-i-forget-my-password","children":[]},{"level":3,"title":"I lost the recovery words but I still have the .json file and the password. Is my wallet still recoverable?","slug":"i-lost-the-recovery-words-but-i-still-have-the-json-file-and-the-password-is-my-wallet-still-recoverable","link":"#i-lost-the-recovery-words-but-i-still-have-the-json-file-and-the-password-is-my-wallet-still-recoverable","children":[]},{"level":3,"title":"Can I verify the Recovery Words of an existing wallet?","slug":"can-i-verify-the-recovery-words-of-an-existing-wallet","link":"#can-i-verify-the-recovery-words-of-an-existing-wallet","children":[]}]},{"level":2,"title":"Hardware Wallet","slug":"hardware-wallet","link":"#hardware-wallet","children":[{"level":3,"title":"What hardware wallets does Wasabi support?","slug":"what-hardware-wallets-does-wasabi-support","link":"#what-hardware-wallets-does-wasabi-support","children":[]},{"level":3,"title":"Why does Wasabi use the Hardware Wallet Interface?","slug":"why-does-wasabi-use-the-hardware-wallet-interface","link":"#why-does-wasabi-use-the-hardware-wallet-interface","children":[]},{"level":3,"title":"Does Wasabi support the hidden wallets of hardware wallets?","slug":"does-wasabi-support-the-hidden-wallets-of-hardware-wallets","link":"#does-wasabi-support-the-hidden-wallets-of-hardware-wallets","children":[]},{"level":3,"title":"How can I generate a Wasabi skeleton wallet file in ColdCard?","slug":"how-can-i-generate-a-wasabi-skeleton-wallet-file-in-coldcard","link":"#how-can-i-generate-a-wasabi-skeleton-wallet-file-in-coldcard","children":[]},{"level":3,"title":"How can I import the Wasabi skeleton wallet file?","slug":"how-can-i-import-the-wasabi-skeleton-wallet-file","link":"#how-can-i-import-the-wasabi-skeleton-wallet-file","children":[]},{"level":3,"title":"How can I generate a receiving address of my hardware wallet?","slug":"how-can-i-generate-a-receiving-address-of-my-hardware-wallet","link":"#how-can-i-generate-a-receiving-address-of-my-hardware-wallet","children":[]},{"level":3,"title":"How can I sign a transaction with a USB connected hardware wallet?","slug":"how-can-i-sign-a-transaction-with-a-usb-connected-hardware-wallet","link":"#how-can-i-sign-a-transaction-with-a-usb-connected-hardware-wallet","children":[]},{"level":3,"title":"How can I build and export a transaction to ColdCard?","slug":"how-can-i-build-and-export-a-transaction-to-coldcard","link":"#how-can-i-build-and-export-a-transaction-to-coldcard","children":[]},{"level":3,"title":"How can I sign a transaction on the ColdCard?","slug":"how-can-i-sign-a-transaction-on-the-coldcard","link":"#how-can-i-sign-a-transaction-on-the-coldcard","children":[]},{"level":3,"title":"How can I import and broadcast a final transaction from ColdCard?","slug":"how-can-i-import-and-broadcast-a-final-transaction-from-coldcard","link":"#how-can-i-import-and-broadcast-a-final-transaction-from-coldcard","children":[]},{"level":3,"title":"Can I coinjoin bitcoins on my hardware wallet?","slug":"can-i-coinjoin-bitcoins-on-my-hardware-wallet","link":"#can-i-coinjoin-bitcoins-on-my-hardware-wallet","children":[]},{"level":3,"title":"Does Ledger Live send my public keys and addresses to a third party server?","slug":"does-ledger-live-send-my-public-keys-and-addresses-to-a-third-party-server","link":"#does-ledger-live-send-my-public-keys-and-addresses-to-a-third-party-server","children":[]},{"level":3,"title":"After I coinjoined my coins and reached 100% privacy, I sent them to my hardware wallet and now the coins have anonscore 1. Why?","slug":"after-i-coinjoined-my-coins-and-reached-100-privacy-i-sent-them-to-my-hardware-wallet-and-now-the-coins-have-anonscore-1-why","link":"#after-i-coinjoined-my-coins-and-reached-100-privacy-i-sent-them-to-my-hardware-wallet-and-now-the-coins-have-anonscore-1-why","children":[]},{"level":3,"title":"Can I use Trezor One with Wasabi?","slug":"can-i-use-trezor-one-with-wasabi","link":"#can-i-use-trezor-one-with-wasabi","children":[]},{"level":3,"title":"Can I use BitBox with Wasabi?","slug":"can-i-use-bitbox-with-wasabi","link":"#can-i-use-bitbox-with-wasabi","children":[]},{"level":3,"title":"How can I type in the passphrase of my Trezor T?","slug":"how-can-i-type-in-the-passphrase-of-my-trezor-t","link":"#how-can-i-type-in-the-passphrase-of-my-trezor-t","children":[]},{"level":3,"title":"I have coinjoined with a Trezor device on Trezor Suite, but in Wasabi I cannot see my coins?","slug":"i-have-coinjoined-with-a-trezor-device-on-trezor-suite-but-in-wasabi-i-cannot-see-my-coins","link":"#i-have-coinjoined-with-a-trezor-device-on-trezor-suite-but-in-wasabi-i-cannot-see-my-coins","children":[]},{"level":3,"title":"How can I use Hardware Wallets on Linux (udev rules)?","slug":"how-can-i-use-hardware-wallets-on-linux-udev-rules","link":"#how-can-i-use-hardware-wallets-on-linux-udev-rules","children":[]}]},{"level":2,"title":"History","slug":"history","link":"#history","children":[{"level":3,"title":"How can I check the transactions history?","slug":"how-can-i-check-the-transactions-history","link":"#how-can-i-check-the-transactions-history","children":[]},{"level":3,"title":"How can I see coinjoins in the history list?","slug":"how-can-i-see-coinjoins-in-the-history-list","link":"#how-can-i-see-coinjoins-in-the-history-list","children":[]},{"level":3,"title":"Can I sort the history items?","slug":"can-i-sort-the-history-items","link":"#can-i-sort-the-history-items","children":[]},{"level":3,"title":"Can I search for a transaction ID in the history?","slug":"can-i-search-for-a-transaction-id-in-the-history","link":"#can-i-search-for-a-transaction-id-in-the-history","children":[]},{"level":3,"title":"Can I export a list of transactions?","slug":"can-i-export-a-list-of-transactions","link":"#can-i-export-a-list-of-transactions","children":[]}]},{"level":2,"title":"Settings","slug":"settings","link":"#settings","children":[{"level":3,"title":"How do I connect my own full node to Wasabi?","slug":"how-do-i-connect-my-own-full-node-to-wasabi","link":"#how-do-i-connect-my-own-full-node-to-wasabi","children":[]},{"level":3,"title":"How can I turn off Tor?","slug":"how-can-i-turn-off-tor","link":"#how-can-i-turn-off-tor","children":[]},{"level":3,"title":"How can I change the anonymity score target?","slug":"how-can-i-change-the-anonymity-score-target","link":"#how-can-i-change-the-anonymity-score-target","children":[]},{"level":3,"title":"What is the dust threshold?","slug":"what-is-the-dust-threshold","link":"#what-is-the-dust-threshold","children":[]},{"level":3,"title":"Where can I find the logs?","slug":"where-can-i-find-the-logs","link":"#where-can-i-find-the-logs","children":[]},{"level":3,"title":"How to activate/deactivate discreet mode?","slug":"how-to-activate-deactivate-discreet-mode","link":"#how-to-activate-deactivate-discreet-mode","children":[]},{"level":3,"title":"How can I change to the white theme?","slug":"how-can-i-change-to-the-white-theme","link":"#how-can-i-change-to-the-white-theme","children":[]}]},{"level":2,"title":"Coin Control Best Practices","slug":"coin-control-best-practices","link":"#coin-control-best-practices","children":[{"level":3,"title":"What are coins?","slug":"what-are-coins","link":"#what-are-coins","children":[]},{"level":3,"title":"How can I enable (manual) coin control?","slug":"how-can-i-enable-manual-coin-control","link":"#how-can-i-enable-manual-coin-control","children":[]},{"level":3,"title":"How do I select coins for spending?","slug":"how-do-i-select-coins-for-spending","link":"#how-do-i-select-coins-for-spending","children":[]},{"level":3,"title":"Can I consolidate anonset coins?","slug":"can-i-consolidate-anonset-coins","link":"#can-i-consolidate-anonset-coins","children":[]},{"level":3,"title":"How can I send my anonset coins to my hardware wallet?","slug":"how-can-i-send-my-anonset-coins-to-my-hardware-wallet","link":"#how-can-i-send-my-anonset-coins-to-my-hardware-wallet","children":[]},{"level":3,"title":"What can I do with small change?","slug":"what-can-i-do-with-small-change","link":"#what-can-i-do-with-small-change","children":[]}]},{"level":2,"title":"Music Box","slug":"music-box","link":"#music-box","children":[{"level":3,"title":"What does Awaiting cheaper coinjoins mean?","slug":"what-does-awaiting-cheaper-coinjoins-mean","link":"#what-does-awaiting-cheaper-coinjoins-mean","children":[]},{"level":3,"title":"What does Awaiting the blame round mean?","slug":"what-does-awaiting-the-blame-round-mean","link":"#what-does-awaiting-the-blame-round-mean","children":[]},{"level":3,"title":"What does Insufficient funds eligible for coinjoin mean?","slug":"what-does-insufficient-funds-eligible-for-coinjoin-mean","link":"#what-does-insufficient-funds-eligible-for-coinjoin-mean","children":[]},{"level":3,"title":"What does Some funds are rejected from coinjoining mean?","slug":"what-does-some-funds-are-rejected-from-coinjoining-mean","link":"#what-does-some-funds-are-rejected-from-coinjoining-mean","children":[]}]},{"level":2,"title":"Buy Anything Button","slug":"buy-anything-button","link":"#buy-anything-button","children":[{"level":3,"title":"What is the Buy Anything Button?","slug":"what-is-the-buy-anything-button","link":"#what-is-the-buy-anything-button","children":[]},{"level":3,"title":"How does the Buy Anything Button work?","slug":"how-does-the-buy-anything-button-work","link":"#how-does-the-buy-anything-button-work","children":[]},{"level":3,"title":"Does the Buy Anything Button hurt my privacy?","slug":"does-the-buy-anything-button-hurt-my-privacy","link":"#does-the-buy-anything-button-hurt-my-privacy","children":[]},{"level":3,"title":"What can I order and for whom is this available?","slug":"what-can-i-order-and-for-whom-is-this-available","link":"#what-can-i-order-and-for-whom-is-this-available","children":[]}]},{"level":2,"title":"Advanced Usage","slug":"advanced-usage","link":"#advanced-usage","children":[{"level":3,"title":"Can I change the default ports for the Wasabi's bundled Tor?","slug":"can-i-change-the-default-ports-for-the-wasabi-s-bundled-tor","link":"#can-i-change-the-default-ports-for-the-wasabi-s-bundled-tor","children":[]},{"level":3,"title":"Where does the BTC exchange rate come from?","slug":"where-does-the-btc-exchange-rate-come-from","link":"#where-does-the-btc-exchange-rate-come-from","children":[]}]}],"git":{"updatedTime":1720425186000},"filePathRelative":"FAQ/FAQ-UseWasabi.md"}`);export{Mi as comp,Ei as data}; +

    What is the dust threshold?

    `,10),qo={href:"https://bitcoin.stackexchange.com/questions/10986/what-is-meant-by-bitcoin-dust",target:"_blank",rel:"noopener noreferrer"},Po={href:"https://en.bitcoin.it/Privacy#Forced_address_reuse",target:"_blank",rel:"noopener noreferrer"},Fo=s('

    Specifically in the context of Wasabi, with the dust threshold settings you can limit the value of spam coins shown in the GUI. Coins that you receive from other wallets (so no self-spend) which are less than the dust threshold in value and are received on an already used address are not shown. For example: When it is set to 0.0000 5000 BTC, and you receive a coin worth 0.0000 4000 BTC from a different wallet to an already used address, then this transaction and the coin in the coin list will not be shown.

    Wasabi Wallet Dust threshold settings

    Where can I find the logs?

    In the SearchBar you can see there are several logs available.

    • The Logs shows the general log information about Wasabi Wallet.
    • The Tor Logs shows the Tor specific logs.

    Wasabi Wallet SearchBar Help&Support and Open

    ',6),Ro=e("h3",{id:"how-to-activate-deactivate-discreet-mode",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-to-activate-deactivate-discreet-mode"},[e("span",null,"How to activate/deactivate discreet mode?")])],-1),zo=e("p",null,"You can activate/deactivate Discreet Mode by clicking the Discreet Mode icon in the bottom left corner of the main view.",-1),Uo=e("p",null,[e("img",{src:I,alt:"Discreet Mode Icon",title:"Discreet Mode Icon"})],-1),Do=e("h3",{id:"how-can-i-change-to-the-white-theme",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-can-i-change-to-the-white-theme"},[e("span",null,"How can I change to the white theme?")])],-1),No=e("code",null,"Dark Mode",-1),Qo=e("code",null,"Dark Mode",-1),Mo=e("code",null,".walletwasabi/client/UIConfig.json",-1),Eo=e("code",null,"UIConfig.json",-1),Oo=e("code",null,'"DarkModeEnabled": true',-1),Yo=e("code",null,'"DarkModeEnabled": false',-1),Go=s('

    Wasabi Wallet white theme

    Coin Control Best Practices

    What are coins?

    ',3),Jo=e("h3",{id:"how-can-i-enable-manual-coin-control",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-can-i-enable-manual-coin-control"},[e("span",null,"How can I enable (manual) coin control?")])],-1),Lo=e("code",null,"alt",-1),Ko=e("code",null,"option",-1),Vo=e("em",null,"Review coins",-1),Xo=s('

    Send Review Coins

    This is a developer feature

    Do NOT use the manual coin control if you do not know what you are doing. Misusing it can have seriously bad privacy consequences.

    How do I select coins for spending?

    In the normal send workflow, Wasabi automatically selects which coins to send.

    To send a specific coin, the user can use the Wallet Coins dialog (a.k.a coinlist). The coinlist can be brought up by pressing the keyboard combination CTRL + C + D simultaneously on the main view or via the search bar.

    This is for advanced usage only

    Users should stick to the default send workflow. Misusing the coinlist for sending can result in critical privacy risks.

    Wallet Coins Send Selected Coins

    This is not full coin control

    You can only send coins in full. There is no possiblity to enter a bitcoin amount or receive change.

    Can I consolidate anonset coins?

    It is advisable to limit the recombining of mixed coins because it can only decrease the privacy of these coins. This reveals that all the consolidated UTXOs are controlled by one entity, which was not known before the consolidation. That said, if you combine only a couple of mixed coins, you might not reveal your pre-coinjoin transaction history, especially when you did several re-mixes. So consolidating some private coins is OK to do.

    Take great care!

    Never consolidate non-private coins with private (mixed) coins, as this negates the privacy benefits of the coinjoin.

    ',11),$o={href:"https://youtu.be/Tk8-N1kHa4g",target:"_blank",rel:"noopener noreferrer"},Zo=e("img",{src:r,alt:"Watch the video"},null,-1),ei=e("h3",{id:"how-can-i-send-my-anonset-coins-to-my-hardware-wallet",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-can-i-send-my-anonset-coins-to-my-hardware-wallet"},[e("span",null,"How can I send my anonset coins to my hardware wallet?")])],-1),ti=e("p",null,[t("Most hardware wallets communicate with servers to provide you with your balance. This reveals your public key to the server, which damages your privacy - the hardware wallet company can now link together all your addresses. As a result "),e("strong",null,"it is not recommended"),t(" that you send your mixed coins to an address associated with your hardware wallet unless you are confident that you have set up your hardware wallet in a way that it does not communicate with a 3rd party server (see below).")],-1),ai={href:"https://github.com/chris-belcher/electrum-personal-server",target:"_blank",rel:"noopener noreferrer"},ni={href:"https://github.com/kyuupichan/electrumx",target:"_blank",rel:"noopener noreferrer"},oi={href:"https://github.com/romanz/electrs",target:"_blank",rel:"noopener noreferrer"},ii=e("h3",{id:"what-can-i-do-with-small-change",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-can-i-do-with-small-change"},[e("span",null,"What can I do with small change?")])],-1),si=e("em",null,"change avoidance",-1),ri=e("p",null,"You should treat change as a kind of toxic waste (handled with great care). You can spend the change to the same entity as the initial transaction, without loosing much privacy. Only spend the change to another entity, if these two won't make you trouble knowing you interact with both of them. If needed, you can consolidate several change coins, but we advise you to do it in a coinjoin. In JoinMarket you can specify the exact amount of coinjoin, so it can be exactly the amount of the change. Or open a new Lightning Network node (not your main Lightning node), create a channel to a random peer on the network and route the funds back to you.",-1),li={class:"custom-container tip"},hi=e("p",{class:"custom-container-title"},"TIP",-1),ci=e("h2",{id:"music-box",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#music-box"},[e("span",null,"Music Box")])],-1),di=e("h3",{id:"what-does-awaiting-cheaper-coinjoins-mean",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-does-awaiting-cheaper-coinjoins-mean"},[e("span",null,[t("What does "),e("code",null,"Awaiting cheaper coinjoins"),t(" mean?")])])],-1),ui=e("h3",{id:"what-does-awaiting-the-blame-round-mean",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-does-awaiting-the-blame-round-mean"},[e("span",null,[t("What does "),e("code",null,"Awaiting the blame round"),t(" mean?")])])],-1),pi=e("h3",{id:"what-does-insufficient-funds-eligible-for-coinjoin-mean",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-does-insufficient-funds-eligible-for-coinjoin-mean"},[e("span",null,[t("What does "),e("code",null,"Insufficient funds eligible for coinjoin"),t(" mean?")])])],-1),wi=e("h3",{id:"what-does-some-funds-are-rejected-from-coinjoining-mean",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-does-some-funds-are-rejected-from-coinjoining-mean"},[e("span",null,[t("What does "),e("code",null,"Some funds are rejected from coinjoining"),t(" mean?")])])],-1),mi=e("code",null,"Wallet Coins",-1),yi=e("h2",{id:"buy-anything-button",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#buy-anything-button"},[e("span",null,"Buy Anything Button")])],-1),gi=e("h3",{id:"what-is-the-buy-anything-button",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-is-the-buy-anything-button"},[e("span",null,"What is the Buy Anything Button?")])],-1),bi={href:"https://shopinbit.com/",target:"_blank",rel:"noopener noreferrer"},fi=e("em",null,"Buy Anything",-1),vi=s('

    How does the Buy Anything Button work?

    When clicking on the Buy Anything Button, the user communicates with ShopinBit over a new Tor identity (unless Tor is disabled in the Settings). The user gets asked some questions, like what he wants to buy, and some follow-up questions needed for the order. After the details are confirmed in the chat, a bitcoin address gets displayed to pay the invoice. Once ShopinBit has received the bitcoin on the address with a confirmation, they will start processing the order. The processing time depends on what has been bought. For example, a physical product may take weeks to deliver but a spontaneous travel booking can be arranged within days.

    Does the Buy Anything Button hurt my privacy?

    The Buy Anything Button does not compromise your wallet's privacy. Things like the wallet balance and history are still private. However, when providing some personal details like e-mail and shipping address for the order, then ShopinBit is aware of these, the same as when ordering directly from them or any other merchant. They are aware of this and that's why they ask for the minimal required info possible to complete the order. Your wallet information is never connected to the information used for ordering anything.

    But of course, make sure to use private coins when sending them/anyone your bitcoin!

    What can I order and for whom is this available?

    ',6),_i={href:"https://shopinbit.com/",target:"_blank",rel:"noopener noreferrer"},ki=e("h2",{id:"advanced-usage",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#advanced-usage"},[e("span",null,"Advanced Usage")])],-1),Wi=e("h3",{id:"can-i-change-the-default-ports-for-the-wasabi-s-bundled-tor",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#can-i-change-the-default-ports-for-the-wasabi-s-bundled-tor"},[e("span",null,"Can I change the default ports for the Wasabi's bundled Tor?")])],-1),xi={href:"https://github.com/WalletWasabi/WalletWasabi/releases/tag/v2.0.6",target:"_blank",rel:"noopener noreferrer"},Ti=e("h3",{id:"where-does-the-btc-exchange-rate-come-from",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#where-does-the-btc-exchange-rate-come-from"},[e("span",null,"Where does the BTC exchange rate come from?")])],-1),Ii=e("p",null,"Wasabi fetches the BTC/USD exchange rate from one of these exchanges: blockchain.com, Bitstamp, CoinGecko, Coinbase, Gemini and Coingate. It first tries to fetch the exchange rate from blockchain.com, if that's not possible it will try to fetch it from the next exchange in the listed order (and so on, until success).",-1);function ji(Ci,Ai){const n=l("RouteLink"),i=l("ExternalLinkIcon");return C(),A("div",null,[oe,e("ol",null,[e("li",null,[a(n,{to:"/using-wasabi/InstallPackage.html"},{default:o(()=>[t("Download & Install")]),_:1}),t(" Wasabi (like with any other software) from the "),e("a",ie,[t("official website"),a(i)]),t(".")]),e("li",null,[a(n,{to:"/using-wasabi/WalletGeneration.html"},{default:o(()=>[t("Create a new wallet")]),_:1}),t(" or use an already existing one, by "),a(n,{to:"/using-wasabi/WalletRecovery.html"},{default:o(()=>[t("importing or recovering")]),_:1}),t(" your own wallet.")]),e("li",null,[a(n,{to:"/using-wasabi/Receive.html"},{default:o(()=>[t("Receive")]),_:1}),t(" some bitcoin.")]),e("li",null,[t("Wait, and let the wallet do some "),a(n,{to:"/using-wasabi/CoinJoin.html"},{default:o(()=>[t("coinjoins")]),_:1}),t(". Your wallet's privacy progress % will increase.")]),e("li",null,[t("Enjoy your private bitcoin funds! "),a(n,{to:"/using-wasabi/Send.html"},{default:o(()=>[t("Spend")]),_:1}),t(" some, send to your "),a(n,{to:"/using-wasabi/ColdWasabi.html"},{default:o(()=>[t("hardware wallet")]),_:1}),t(" (for cold storage) or leave them in Wasabi for a while.")])]),se,e("p",null,[t("You can "),a(n,{to:"/using-wasabi/WalletGeneration.html"},{default:o(()=>[t("generate as many new wallets")]),_:1}),t(" as you'd like, for no extra cost and without asking for permission.")]),re,e("p",null,[t("Alternatively, the wallet file can be manually renamed by doing the following: Type "),le,t(" in the search bar at the top of the main view to access the "),he,t(" folder and rename the "),ce,t(" wallet file. Or you can navigate to the "),de,t(" folder (inside the "),a(n,{to:"/FAQ/FAQ-UseWasabi.html#where-can-i-find-the-wasabi-data-folder"},{default:o(()=>[t("Wasabi data folder")]),_:1}),t(") and rename the "),ue,t(" wallet file. Then go to "),pe,t(" folder (inside the "),a(n,{to:"/FAQ/FAQ-UseWasabi.html#where-can-i-find-the-wasabi-data-folder"},{default:o(()=>[t("Wasabi data folder")]),_:1}),t(") and rename the "),we,t(" wallet file.")]),me,e("p",null,[t("The password (named "),ye,t(" since Wasabi version "),e("a",ge,[t("2.0.7"),a(i)]),t(" you set is used:")]),e("ul",null,[e("li",null,[t("As a 13th word (passphrase) as described in "),e("a",be,[t("BIP 39"),a(i)]),t(".")]),e("li",null,[t("To encrypt the private key of the extended private key as described in "),e("a",fe,[t("BIP 38"),a(i)]),t(" to get an encrypted secret which is stored on the computer.")])]),ve,_e,ke,e("div",We,[xe,e("p",null,[t("It is "),Te,t(" important to use a "),a(n,{to:"/using-wasabi/PasswordBestPractices.html"},{default:o(()=>[t("random and long passphrase")]),_:1}),t(".")])]),e("p",null,[t("Since it is very difficult for humans to generate true randomness, it is good to use a tool to help find a strong passphrase. This can be the "),e("a",Ie,[t("Diceware english wordlist"),a(i)]),t(" for true off-line password generation. A secure password manager software might also be used, but be careful here.")]),je,e("p",null,[e("a",Ce,[t("BIP 38"),a(i)]),t(" is a good standard, a well-tested and very secure way to encrypt a private key. It is also implemented in the "),e("a",Ae,[t("NBitcoin library"),a(i)]),t(", which is used by Wasabi. Additionally, there is no standard way (BIP) to encrypt HD wallets. Take into account that it is not only encryption what BIP 38 provides but also a brute-force protection.")]),Be,Se,He,e("p",null,[t("Read the whole document of "),e("a",qe,[t("terms and conditions, privacy policy, and legal statement here"),a(i)])]),Pe,e("p",null,[t("Save this file in your "),a(n,{to:"/FAQ/FAQ-UseWasabi.html#where-can-i-find-the-wasabi-data-folder"},{default:o(()=>[Fe,t(" data folder")]),_:1}),t(" as a json file like this: "),Re,t(". The "),ze,t(" will be displayed in the GUI.")]),Ue,De,Ne,Qe,Me,e("p",null,[a(n,{to:"/FAQ/FAQ-UseWasabi.html#what-does-the-privacy-progress-mean"},{default:o(()=>[t("The privacy progress")]),_:1}),t(" is influenced by the anonymity score target. If the coinjoin strategy is changed to one with a different anonnymity score target, this will cause the privacy progress to increase or decrease.")]),Ee,e("p",null,[t("A "),e("a",Oe,[t("BIP-158 block filter"),a(i)]),t(" is a data structure that contains a hash of all the addresses referenced in a block. It is much smaller than the whole block itself. The Wasabi coordinator generates these block filters, and sends them out to any wallet that requests them. A wallet client checks locally if the block filter matches any of the addresses in the wallet. If not, then the filter is stored for later reference and for syncing new wallets. If yes, then the wallet connects to a random Bitcoin peer-to-peer full node over Tor to request this entire block.")]),Ye,Ge,e("ol",null,[e("li",null,[e("p",null,[t("If you are connected to "),a(n,{to:"/using-wasabi/BitcoinFullNode.html"},{default:o(()=>[t("your own full node")]),_:1}),t(" then it will fetch the block from there.")])]),Je]),e("p",null,[t("Read more "),a(n,{to:"/using-wasabi/WalletLoad.html"},{default:o(()=>[t("here")]),_:1}),t(".")]),Le,e("p",null,[t("If the Tor network is having "),e("a",Ke,[t("issues"),a(i)]),t(", Wasabi notifies this and displays a warning triangle icon. For example, when Tor is experiencing a DDoS attack. Hover over the icon with the cursor to display more information.")]),Ve,e("div",Xe,[$e,e("p",null,[t("If you are doing a re-synchronization because you expect some missing funds, but after resync you still think your balance is not correct then try to increase the "),a(n,{to:"/FAQ/FAQ-UseWasabi.html#how-do-i-change-the-gap-limit-of-a-wallet"},{default:o(()=>[t("gap limit")]),_:1}),t(" of the wallet.")])]),Ze,et,tt,e("p",null,[t("Yes. See "),a(n,{to:"/using-wasabi/Daemon.html"},{default:o(()=>[t("this chapter")]),_:1}),t(" for more details.")]),at,nt,e("p",null,[t("Bitcoin is designed so that for every payment you can use a new address that is not tied to any of your previous addresses. When you use a new address for every coin, then it becomes much much more difficult to find out that these coins are yours. However, when you use "),a(n,{to:"/why-wasabi/AddressReuse.html"},{default:o(()=>[t("the same address for every coin")]),_:1}),t(", then everyone knows that all coins can be spent by one individual who has the private key - you! Thus, when someone finds out that you control this address, maybe you published it in your social media profile for donations, or you sent a coin to another peer who knows you, then he knows also how many bitcoin you have in that same address. Take good care to whom you tell your addresses, and every time use a different address.")]),ot,e("p",null,[t("Wasabi uses "),e("a",it,[t("BIP 44 multi-account hierarchy for deterministic wallets"),a(i)]),t(" so that you can generate countless addresses and have them all securely backed-up in the 12 recovery words.")]),st,rt,e("p",null,[t("You can generate a new bech32 address in the "),lt,t(" dialog of Wasabi Wallet. First you must set a label for it, so that you later know who knows that this address is yours. Be precise in the label of the observers who know this address is yours, as this is an important part of good "),a(n,{to:"/why-wasabi/Coins.html"},{default:o(()=>[t("coin selection")]),_:1}),t(" privacy best practices. Do not write anything else on the label exept the name of the entities that know this address belongs to you. Then you can click on "),ht,t(" which will now show you the address, and you can copy it to the clipboard. After a coin has been sent to this address, it is removed from the GUI. This is a good feature to help protect you against "),a(n,{to:"/why-wasabi/AddressReuse.html"},{default:o(()=>[t("address reuse")]),_:1}),t(".")]),ct,e("p",null,[t("Close Wasabi and edit the "),dt,t(" setting (which is "),ut,t(" by default) in the wallet file. The value depends on the settings of other tools that use the wallet too (e.g. use "),pt,t(" for "),e("a",wt,[t("BTCPay Server"),a(i)]),t(").")]),mt,e("p",null,[t("You can change the label of your "),yt,t(" by clicking on the edit icon. This is useful when you have generated a receiving address with a specific label, but then the sender (anyone that knows this address is yours) has changed. Take care with whom you have shared this address, because if you send it to several people, they all know this address belongs to you, and they might all send many coins to the same address. This is very bad for your privacy because of "),a(n,{to:"/why-wasabi/AddressReuse.html"},{default:o(()=>[t("address reuse")]),_:1}),t(", and it confuses you with the labeling of each unique coin.")]),gt,e("p",null,[t('Some wallets/exchanges do not yet support native SegWit bech32 addresses and may give an error message (e.g. "unknown bitcoin address"). Please contact these services to upgrade their infrastructure to support the latest industry standards. Wasabi cannot generate non-SegWit addresses, so one solution is to manage your funds with a wallet which does support legacy addresses. To check Bech32 adoption and wallets/exchanges support you can follow the '),e("a",bt,[t("Bitcoin Wiki"),a(i)]),t(" and "),e("a",ft,[t("Bitcoin Optech"),a(i)]),t(".")]),vt,e("p",null,[t("Wasabi follows "),e("a",_t,[t("BIP 84: Derivation scheme for P2WPKH Based Accounts"),a(i)]),t(" ("),kt,t(") and "),e("a",Wt,[t("BIP 86: Key Derivation for Single Key P2TR Outputs"),a(i)]),t(" ("),xt,t(").")]),Tt,e("p",null,[t("Yet multisig is a popular feature, and many Wasabikas do request it for extra security, willing to trade-off some privacy. "),e("a",It,[t("Electrum Wallet"),a(i)]),t(" is a fantastic wallet with many features, but only private if you connect to your own Electrum server full node. Electrum can be used to create different types of m-of-n multisig scripts, including the use of hardware wallets.")]),jt,Ct,e("p",null,[t("When Wasabi is running, it connects to random Bitcoin peer to peer nodes and listens for their gossip of all transactions on the network. Based on this information Wasabi builds its own local mempool of unconfirmed transactions. So when you have Wasabi running, you will be notified about an incoming receiving transaction as soon as it is gossiped on the network. But when Wasabi is offline, it does not listen to the network and it will not know about your unconfirmed transaction when you next launch Wasabi. In this case you have to wait until your transaction is confirmed in a block, and based on the "),e("a",At,[t("BIP 158 block filters"),a(i)]),t(", Wasabi will download that whole block including your transaction from a random P2P node.")]),Bt,e("p",null,[t("Wasabi doesn't provide a way to export all generated addresses (used and unused), however they are listed by using the "),a(n,{to:"/using-wasabi/RPC.html#listkeys"},{default:o(()=>[t("listkeys")]),_:1}),t(" RPC command.")]),e("p",null,[t("It is not possible to view previously used addresses in the GUI, as here only "),a(n,{to:"/FAQ/FAQ-UseWasabi.html#where-can-i-find-previously-generated-addresses"},{default:o(()=>[t("unused addresses")]),_:1}),t(" are shown.")]),St,e("p",null,[t("Unfortunately pay to many is not yet implemented in the GUI. However, you can use the "),a(n,{to:"/using-wasabi/RPC.html#send"},{default:o(()=>[t("RPC server "),Ht,t(" call")]),_:1}),t(" and specify multiple destination addresses.")]),qt,Pt,Ft,e("p",null,[t("All "),Rt,t(" transactions signal RBF by default. A pending transaction may be bumped (with RBF) by using the "),a(n,{to:"/FAQ/FAQ-UseWasabi.html#how-can-i-speed-up-a-pending-unconfirmed-transaction-cpfp-rbf"},{default:o(()=>[zt,t(" feature")]),_:1}),t(".")]),Ut,Dt,Nt,Qt,e("p",null,[t("Wasabi uses the "),e("a",Mt,[t("smartfee"),a(i)]),t(" estimation algorithm provided by bitcoind. This integrates both data from recent blocks, as well as the local mempool to estimate the current and future demand for blockspace. The lower the fee is, the longer the estimated wait; and the higher the fee, the faster the confirmation will come. There are several different confidence levels, each of them gives an educated guess how soon the transaction will confirm. But the provided time frames are only a rough estimation, and not at all a precise metric.")]),Et,e("p",null,[t("Because confirmation fee estimation is more an art than a science, you can also set the fee manually. Then you can go after your gut feeling, "),e("a",Ot,[t("mempool analysis"),a(i)]),t(", or just putting the minimum of 1 sat/vByte.")]),Yt,e("p",null,[t("If for some reason this fails, and a local "),a(n,{to:"/using-wasabi/BitcoinFullNode.html"},{default:o(()=>[t("Bitcoin full node")]),_:1}),t(" is connected, then this is used to broadcast the transaction. By default it is gossiped to 8 peers over clearnet, but this depends on how the full node is configured by the user.")]),Gt,Jt,e("p",null,[t("Wasabi might implement "),e("a",Lt,[t("BIP 156"),a(i)]),t(" the Dandelion protocol for transaction broadcasting when the Bitcoin network adopts it.")]),Kt,e("p",null,[t("When you "),a(n,{to:"/using-wasabi/CoinJoin.html"},{default:o(()=>[t("CoinJoin")]),_:1}),t(" coins with Wasabi, you actually de-link the trail from Bob/exchange, to the coins in your wallet. Those specific coins will be private after coinjoining. They can now be spent without having to worry about your boss or the exchange tracking your behavior.")]),Vt,Xt,$t,Zt,ea,ta,e("p",null,[t("Since Wasabi version "),e("a",aa,[t("2.0.4"),a(i)]),t(" this FAQ is now obsolete because of the new "),a(n,{to:"/FAQ/FAQ-UseWasabi.html#how-can-i-speed-up-a-pending-transaction"},{default:o(()=>[na,t(" feature")]),_:1}),t(" that can be used.")]),oa,e("p",null,[t("Read more "),a(n,{to:"/using-wasabi/Send.html#speed-up-or-cancel-transaction"},{default:o(()=>[t("here")]),_:1}),t(".")]),ia,e("p",null,[t("Read more "),a(n,{to:"/using-wasabi/Send.html#speed-up-or-cancel-transaction"},{default:o(()=>[t("here")]),_:1}),t(".")]),sa,e("p",null,[t("Yes, you can always send from your wallet. However, a best practice is to only send private funds. Making your wallet 100% private "),a(n,{to:"/FAQ/FAQ-UseWasabi.html#how-long-does-it-take-to-make-my-wallet-100-private"},{default:o(()=>[t("takes some time")]),_:1}),t(", but in the mean time you can always send the (private) funds.")]),ra,e("div",la,[ha,e("p",null,[t("Since Wasabi version "),e("a",ca,[t("2.0.4"),a(i)]),t(", there are privacy suggestions to only send private or semi-private coins.")])]),e("p",null,[t("Read more "),a(n,{to:"/using-wasabi/Send.html#privacy-suggestions"},{default:o(()=>[t("here")]),_:1}),t(".")]),da,ua,pa,wa,e("p",null,[t("Wasabi is an Anonymizing software provider so it is not a money transmitter, thus not under Bank Secrecy Act (BSA) regulations. Basically we can continue to operate like now and "),a(n,{to:"/why-wasabi/LegalConcern.html"},{default:o(()=>[t("it is compliant")]),_:1}),t(".")]),ma,e("p",null,[e("a",ya,[ga,a(i)])]),ba,e("p",null,[t("Since the goal is to have at least the minimum input count in one round, the "),a(n,{to:"/using-wasabi/CoinJoin.html#input-registration"},{default:o(()=>[t("input registration phase")]),_:1}),t(" can fail if too few participants registered in the available time frame.")]),fa,e("p",null,[t("Because the input registration phase takes some time, the coordinator needs to ensure that everyone is still online and ready to continue. So in the "),a(n,{to:"/using-wasabi/CoinJoin.html#connection-confirmation"},{default:o(()=>[t("connection confirmation phase")]),_:1}),t(" every Alice sends a signal to the coordinator that she is still online, and when all Alices do so, or after a timeout and the number of online Alices is still larger than the minimum number of inputs, this phase ends.")]),va,e("p",null,[t("In this "),a(n,{to:"/using-wasabi/CoinJoin.html#output-registration"},{default:o(()=>[t("phase")]),_:1}),t(", every client needs to change the value of their credentials to the desired output values. For example, the client presents to the coordinator two old credentials and two newly created ones. The two pairs sum up to the exact same value, which the coordinator can verify, without knowing the amount value of the credentials. This process may repeat multiple times.")]),_a,ka,e("p",null,[t("After all inputs and outputs are registered, the coordinator has all the information to build the coinjoin transaction. This raw (unsigned) transaction is sent to all Alices, each of them verifies that the transaction is valid and then signs it. The signatures are sent back to the coordinator who accumulates all of them. The "),a(n,{to:"/using-wasabi/CoinJoin.html#signing"},{default:o(()=>[t("singing phase")]),_:1}),t(" is concluded when the coordinator receives all the valid signatures for all registered inputs.")]),Wa,e("p",null,[t("If the signing phase fails from becoming successful due to some Alices disrupting the round, then a "),a(n,{to:"/using-wasabi/CoinJoin.html#blame-round"},{default:o(()=>[t("blame round")]),_:1}),t(" will be created with the successful Alices. In the blame round a new coinjoin will be constructed by repeating the coinjoin phases. All Alices have to sign this new transaction and send their signature to the coordinator.")]),xa,e("p",null,[t("In the "),a(n,{to:"/using-wasabi/CoinJoin.html#broadcasting"},{default:o(()=>[t("broadcasting phase")]),_:1}),t(" the coordinator sends the signed final CoinJoin transaction to several random Bitcoin peer to peer nodes, and it is gossiped throughout the network to the miners.")]),Ta,e("p",null,[t("You can try to make a coinjoin via Wasabi on the Bitcoin "),a(n,{to:"/using-wasabi/Testnet.html"},{default:o(()=>[t("TestNet")]),_:1}),t(" (an alternative Bitcoin network, to be used for testing). Go to "),Ia,t(" > "),ja,t(" and change the network to "),Ca,t('. Then restart your Wasabi and create a new wallet, this is needed because Wasabi differentiates between "Main wallets" and "TestNet wallets". This wallet will synchronize for the TestNet, and generate TestNet addresses. You can get tBTC from faucets like: '),e("a",Aa,[t("coinfaucet.eu/en/btc-testnet"),a(i)]),t(" or "),e("a",Ba,[t("bitcoinfaucet.uo1.net"),a(i)])]),Sa,Ha,qa,Pa,e("table",null,[e("thead",null,[e("tr",null,[Fa,e("th",Ra,[t("During "),a(n,{to:"/FAQ/FAQ-UseWasabi.html#what-is-happening-in-the-input-registration-phase"},{default:o(()=>[t("input registration phase")]),_:1})]),za])]),e("tbody",null,[Ua,e("tr",null,[Da,Na,e("td",Qa,[t("The coin(s) that disrupted the round will be banned for 6h from participating in another coinjoin. (This is to prevent "),e("a",Ma,[t("DoS attacks"),a(i)]),t(")")])])])]),Ea,e("p",null,[t("No you don't. CoinJoins are atomic, they either happen or they don't. If your wallet crashes or your computer goes offline during CoinJoin you simply don't participate in this CoinJoin, look at table "),a(n,{to:"/FAQ/FAQ-UseWasabi.html#does-wasabi-have-to-stay-on-during-coinjoin"},{default:o(()=>[t("here")]),_:1}),t(" for more info.")]),Oa,Ya,Ga,Ja,e("p",null,[t("First of all, Wasabi uses "),e("a",La,[t("BIP 158 block filters"),a(i)]),t(" to ensure network level privacy. You can follow these FAQs to have a full explanation on the theme:")]),e("ul",null,[e("li",null,[a(n,{to:"/FAQ/FAQ-UseWasabi.html#what-are-bip-158-block-filters"},{default:o(()=>[t("What are BIP-158 Block Filters?")]),_:1})]),e("li",null,[a(n,{to:"/FAQ/FAQ-Introduction.html#what-software-supplies-the-block-filters-that-wasabi-uses"},{default:o(()=>[t("What software supplies the block filters that Wasabi uses?")]),_:1})]),e("li",null,[a(n,{to:"/FAQ/FAQ-Introduction.html#can-the-coordinator-attack-me"},{default:o(()=>[t("Can the coordinator attack me?")]),_:1})]),e("li",null,[a(n,{to:"/FAQ/FAQ-Introduction.html#is-the-backend-s-coordinator-code-open-source"},{default:o(()=>[t("Is the backend's coordinator code open-source?")]),_:1})])]),Ka,e("ol",null,[e("li",null,[a(n,{to:"/FAQ/FAQ-UseWasabi.html#what-is-happening-in-the-input-registration-phase"},{default:o(()=>[t("Input registration phase")]),_:1})]),e("li",null,[a(n,{to:"/FAQ/FAQ-UseWasabi.html#what-is-happening-in-the-connection-confirmation-phase"},{default:o(()=>[t("Connection confirmation phase")]),_:1})]),e("li",null,[a(n,{to:"/FAQ/FAQ-UseWasabi.html#what-is-happening-in-the-output-registration-phase"},{default:o(()=>[t("Output registration phase")]),_:1})]),e("li",null,[a(n,{to:"/FAQ/FAQ-UseWasabi.html#what-is-happening-in-the-signing-phase"},{default:o(()=>[t("Signing phase")]),_:1})]),e("li",null,[a(n,{to:"/FAQ/FAQ-UseWasabi.html#what-is-happening-in-the-broadcasting-phase"},{default:o(()=>[t("Broadcasting phase")]),_:1})])]),Va,e("div",Xa,[$a,e("p",null,[t("You can enable the "),a(n,{to:"/FAQ/FAQ-UseWasabi.html#what-does-the-red-coin-isolation-mean-in-the-coinjoin-settings"},{default:o(()=>[t("red coin isolation")]),_:1}),t(" setting, in case you want to prevent possible input heuristics (from outside observers) of anonscore 1 coins into the same coinjoin round.")])]),Za,e("p",null,[t("Since Wasabi version "),e("a",en,[t("2.0.8"),a(i)]),t(" it is possible to exclude coins from participating in coinjoin in the GUI.")]),tn,an,nn,e("p",null,[t("Alternatively, coins can be excluded from coinjoin using the "),a(n,{to:"/using-wasabi/RPC.html#excludefromcoinjoin"},{default:o(()=>[t("excludefromcoinjoin")]),_:1}),t(" RPC call.")]),on,e("p",null,[t("Read more "),a(n,{to:"/using-wasabi/CoinJoin.html"},{default:o(()=>[t("here")]),_:1}),t(".")]),sn,e("p",null,[t("So this introduces a problem, or an attack vector - a malicious user could purposefully register coins, only to wait for the signing phase and not sign. This would halt the entire CoinJoin process for all other participants and Wasabi would no longer work. This is also known as "),e("a",rn,[t("denial of service attack"),a(i)]),t(".")]),ln,hn,cn,dn,un,e("p",null,[t("Since Wasabi version "),e("a",pn,[t("2.0.8"),a(i)]),t(", the coordinator can be changed in the GUI in the "),wn,t(" tab in the settings.")]),mn,e("p",null,[t("Wasabi uses "),e("a",yn,[t("BIP 39: mnemonic code for generating deterministic keys"),a(i)]),t(" to enable easy backups of all private keys in the wallet. The mnemonic is displayed as 12 recovery words that are only shown once during the wallet generation.")]),gn,bn,fn,e("p",null,[t("Please see "),a(n,{to:"/using-wasabi/BackupBestPractices.html"},{default:o(()=>[t("Wasabi Backup Best Practices")]),_:1}),t(" for more information about backups.")]),vn,e("p",null,[t("Although you can back up your private keys with the mnemonic words and passphrase, this is only a last resort recovery. If you want to also secure your address labels, the anonscore and additional metadata, then you can do a digital backup. Simply copy the "),_n,t(" folder with the "),kn,t(" files from your "),a(n,{to:"/FAQ/FAQ-UseWasabi.html#where-can-i-find-the-wasabi-data-folder"},{default:o(()=>[t("Wasabi data folder")]),_:1}),t(" onto suitable hardware, for example an encrypted USB stick. Note that this file has the encrypted private key (extracted from the extended private key), meaning that you only need the passphrase to spend the bitcoin. This also contains the extended public key, the public keys, and the address labels, meaning that it completely links all the coins, both pre and post mix, with clear proof.")]),Wn,e("p",null,[t("No. The passphrase/password you set is used as a 13th word (passphrase) as described in BIP39, you should back it up when you generate a wallet. It is necessary to spend your bitcoin or to recover your wallet, as shown in "),a(n,{to:"/FAQ/FAQ-UseWasabi.html#what-do-i-need-to-recover-my-wallet"},{default:o(()=>[t("this table")]),_:1}),t(".")]),xn,e("p",null,[e("a",Tn,[In,a(i)])]),e("p",null,[e("a",jn,[Cn,a(i)])]),e("p",null,[e("a",An,[Bn,a(i)])]),Sn,e("p",null,[t("Wasabi uses the Bitcoin Core "),e("a",Hn,[t("Hardware Wallet Interface (HWI)"),a(i)]),t(" which allows it to support a variety of hardware wallets. For the complete list of all the officially supported hardware wallets, click "),e("a",qn,[t("here"),a(i)]),t(".")]),Pn,e("p",null,[t("Wasabi uses the "),e("a",Fn,[t("Bitcoin Core Hardware Wallet Interface [HWI]"),a(i)]),t(", a python library tool for proper integration of off-line signing devices. It provides a standard way for any software wallet to communicate with any hardware wallet without needing any device specific drivers. HWI was developed and carefully reviewed over several years, with outstanding contributions by "),e("a",Rn,[t("Andrew Chow"),a(i)]),t(". Wasabi implements C# code that executes the HWI tool. Wasabi uses this powerful tool because there are no other dependencies necessary to support all the existing and future hardware wallets.")]),zn,e("p",null,[t("Partially. Only device side passphrase is supported. PC side passphrase is not. This means that the hidden wallet feature can be used with Trezor T, Ledger Nano S, Nano S Plus, Nano X and ColdCard. After the 12 or 24 words, enter the passphrase as the 13th or 25th word on the hardware wallet. It’s part of "),e("a",Un,[t("BIP 39"),a(i)]),t(".")]),Dn,Nn,e("p",null,[t("Read more "),a(n,{to:"/using-wasabi/ColdWasabi.html"},{default:o(()=>[t("here")]),_:1}),t(".")]),Qn,Mn,e("p",null,[t("Read more "),a(n,{to:"/using-wasabi/ColdWasabi.html#connecting-coldcard-via-sd-card"},{default:o(()=>[t("here")]),_:1}),t(".")]),En,On,e("p",null,[t("Read more "),a(n,{to:"/using-wasabi/ColdWasabi.html"},{default:o(()=>[t("here")]),_:1}),t(".")]),Yn,e("p",null,[t("Read more "),a(n,{to:"/using-wasabi/ColdWasabi.html#connecting-via-usb"},{default:o(()=>[t("here")]),_:1}),t(".")]),Gn,e("p",null,[t("Read more "),a(n,{to:"/using-wasabi/ColdWasabi.html#connecting-coldcard-via-sd-card"},{default:o(()=>[t("here")]),_:1}),t(".")]),Jn,Ln,e("p",null,[t("Read more "),a(n,{to:"/using-wasabi/ColdWasabi.html#connecting-coldcard-via-sd-card"},{default:o(()=>[t("here")]),_:1}),t(".")]),Kn,Vn,e("p",null,[t("Read more "),a(n,{to:"/using-wasabi/ColdWasabi.html#connecting-coldcard-via-sd-card"},{default:o(()=>[t("here")]),_:1}),t(".")]),Xn,e("p",null,[t("Read more "),a(n,{to:"/using-wasabi/ColdWasabi.html#cold-wasabi-protocol"},{default:o(()=>[t("here")]),_:1}),t(".")]),e("div",$n,[Zn,e("p",null,[t("Trezor now supports coinjoin with the Trezor Suite, using same rounds as Wasabi Wallet users. Read more "),e("a",eo,[t("here"),a(i)]),t(".")])]),to,e("p",null,[t("Only if you add your accounts in the app, but not if you update your device firmware or install apps. When using the Ledger Live software wallet to manage your coins, you send all of your used, and 20 unused addresses to Ledger's nodes. "),e("a",ao,[t("Source"),a(i)])]),no,e("p",null,[t("Read more "),e("a",oo,[t("here"),a(i)]),t(".")]),io,so,ro,lo,ho,co,uo,e("p",null,[t("No. Unfortunately, Trezor One is not supported by Wasabi Wallet. For the complete list of all the officially supported hardware wallets, click "),e("a",po,[t("here"),a(i)]),t(".")]),wo,e("p",null,[t("No. Unfortunately, BitBox is not supported by Wasabi Wallet. For the complete list of all the officially supported hardware wallets, click "),e("a",mo,[t("here"),a(i)]),t(".")]),yo,e("p",null,[t("Since Wasabi version "),e("a",go,[t("2.0.8"),a(i)]),t(" the Wasabi package contains the required udev rules, so they don't need to be manually installed.")]),bo,e("p",null,[t("Udev rules instructions can be found "),e("a",fo,[t("here"),a(i)]),t(".")]),vo,e("p",null,[t("There is currently no convenient way to export a list with transaction details inside the GUI. However, you can see the "),_o,t(" files inside the "),ko,t(" folder (you can find it in your "),a(n,{to:"/FAQ/FAQ-UseWasabi.html#where-can-i-find-the-wasabi-data-folder"},{default:o(()=>[t("Wasabi data folder")]),_:1}),t(") which contains all the public keys, labels and anonset.")]),e("p",null,[t("You can use the "),a(n,{to:"/using-wasabi/RPC.html#gethistory"},{default:o(()=>[t("Wasabi RPC server "),Wo,t(" call")]),_:1}),t(" to get a list of all transactions, including date, block height, amount, label and tx id.")]),xo,To,e("p",null,[t("There are three different ways of using your "),a(n,{to:"/using-wasabi/BitcoinFullNode.html"},{default:o(()=>[t("Bitcoin full node with Wasabi")]),_:1}),t(":")]),Io,jo,Co,Ao,e("p",null,[e("a",Bo,[So,a(i)])]),Ho,e("p",null,[t("Dust can mean "),e("a",qo,[t("a lot of things"),a(i)]),t(", depending on how you look at it. It can be a non-economical input, that is a UTXO that has less value than the fees it would cost to spend this coin. A dust attack is actually about "),e("a",Po,[t("forced address reuse"),a(i)]),t(", the malicious actor sends very small amounts into old addresses and consolidation of these dust UTXOs can link several coins in a wallet cluster.")]),Fo,e("p",null,[t("Alternatively, you can find the logs inside your "),a(n,{to:"/FAQ/FAQ-UseWasabi.html#where-can-i-find-the-wasabi-data-folder"},{default:o(()=>[t("Wasabi data folder")]),_:1}),t(".")]),Ro,zo,e("p",null,[t("Read more "),a(n,{to:"/using-wasabi/DiscreetMode.html"},{default:o(()=>[t("here")]),_:1}),t(".")]),Uo,Do,e("p",null,[t("You can change from the default dark to the white theme by disabling "),No,t(" in the Settings. Alternatively, you can switch to "),Qo,t(" in the "),Mo,t(),a(n,{to:"/FAQ/FAQ-UseWasabi.html#where-can-i-find-the-wasabi-data-folder"},{default:o(()=>[t("data folder")]),_:1}),t(". Open the "),Eo,t(" file and change the line from "),Oo,t(" to "),Yo,t(". Save the file and restart Wasabi. Please note that Wasabi is designed for the dark theme, and some color schemes might not look beautiful in the white mode.")]),Go,e("p",null,[t("Bitcoin uses a system of "),a(n,{to:"/why-wasabi/Coins.html"},{default:o(()=>[t("inputs and outputs")]),_:1}),t(" to keep track of who owns how many sats. Every transaction specifies one or more inputs, the chunk of bitcoin being spent, and one or more outputs, the destination of who receives the bitcoin. A coin is also called an unspent transaction output (UTXO), meaning that this output has not been used as the input of a new transaction - it is yet to be spent. In order to spend a UTXO, the valid signature and script has to be provided in the transaction. This ensures that only with knowledge of the correct private key can this coin be sent to a new address. This chain of links between inputs being spent and outputs being generated is verified by every full node, and stored on the blockchain.")]),Jo,e("p",null,[t("The default "),a(n,{to:"/using-wasabi/Send.html#how-to-send-bitcoin-step-by-step"},{default:o(()=>[t("send workflow")]),_:1}),t(' uses the automatic coin selection algorithm, which is optimized in a way that "traditional" coin control is obsolete. However, the user can review which coins are selected, or select different coins using the (manual) coin control. This can be done by pressing and holding the keystroke '),Lo,t(" (or "),Ko,t(" on mac device) at the Preview Transaction screen, which will bring up the "),Vo,t(" button to click on.")]),Xo,e("p",null,[e("a",$o,[Zo,a(i)])]),ei,ti,e("p",null,[t("You can, however, manage your hardware wallet with the Wasabi interface. Alternatively, you can use your hardware wallet with Electrum, and in order to not leak any information to third-party servers run your own "),e("a",ai,[t("Electrum Personal Server"),a(i)]),t(", "),e("a",ni,[t("ElectrumX"),a(i)]),t(" or "),e("a",oi,[t("Electrs"),a(i)]),t(".")]),ii,e("p",null,[t("There are no hard and fast rules for "),a(n,{to:"/using-wasabi/ChangeCoins.html"},{default:o(()=>[t("what to do with the change")]),_:1}),t(". Generally try to avoid having change by using the "),a(n,{to:"/using-wasabi/Send.html#how-to-send-bitcoin-step-by-step"},{default:o(()=>[si,t(" suggestions when sending")]),_:1}),t(". Generally change should be coinjoined, Wasabi automatically coinjoins the change if possible (if the change is more than the "),a(n,{to:"/FAQ/FAQ-UseWasabi.html#what-is-the-minimum-amount-required-to-coinjoin"},{default:o(()=>[t("coinjoin minimum")]),_:1}),t(").")]),ri,e("div",li,[hi,e("p",null,[t("For more information, see this "),a(n,{to:"/using-wasabi/ChangeCoins.html"},{default:o(()=>[t("dedicated chapter")]),_:1}),t(".")])]),ci,di,e("p",null,[t("It means your wallet is waiting to participate in a cheaper coinjoin round(s) because the fee rate of the current coinjoin(s) is higher than the median of the selected "),a(n,{to:"/glossary/Glossary-PrivacyWasabi.html#coinjoin-time-preference"},{default:o(()=>[t("Coinjoin time preference")]),_:1}),t(".")]),ui,e("p",null,[t("If some other participant disrupted the round by failing to sign the coinjoin transaction, this message briefly appears before a new coinjoin, known as the "),a(n,{to:"/using-wasabi/CoinJoin.html#blame-round"},{default:o(()=>[t("blame round")]),_:1}),t(", is created with the responsive participants from the failed round.")]),pi,e("p",null,[t("This message is displayed when some coins cannot coinjoin, for example when they are unconfirmed or below the "),a(n,{to:"/FAQ/FAQ-UseWasabi.html#what-is-the-minimum-amount-required-to-coinjoin"},{default:o(()=>[t("minimum coinjoin amount")]),_:1}),t(".")]),wi,e("p",null,[t("If an input has failed to sign during a previous round it registered to, it will be "),a(n,{to:"/FAQ/FAQ-UseWasabi.html#why-do-my-coins-occasionally-get-banned-from-participating-in-coinjoin"},{default:o(()=>[t("temporarily banned")]),_:1}),t(" to prevent denial of service attacks. Coinjoin coordinators may also reject funds for risk management purposes. You can view the ban time at the "),mi,t(" dialog via the search bar or with the keyboard shortcut “CTRL + C + D”.")]),yi,gi,e("p",null,[t("The Buy Anything button was introduced in Wasabi version 2.0.5 which can be used to make purchases directly with Bitcoin. The button is an integration using "),e("a",bi,[t("Shopinbit's"),a(i)]),t(" premium concierge service and travel booking services which are now conveniently accessible from your wallet. You can "),fi,t(" because ShopinBit has a team of experts that handle your customized orders, whether it's electronics, cars, flights, or hotels. There is currently a $1,000 minimum purchase limit for this service.")]),vi,e("p",null,[t("ShopinBit can get you anything that is legal in Poland. Some services may or may not be available depending on the jurisdiction. Their Terms and Conditions are displayed and required to be accepted before ordering. For (legal) information and questions, please refer to the "),e("a",_i,[t("Shopinbit website"),a(i)]),t(".")]),ki,Wi,e("p",null,[t("Yes. Since Wasabi version "),e("a",xi,[t("2.0.6"),a(i)]),t(" it is possible to specify the Tor SOCKS5 and the Tor control ports. This can be done by specifying the port(s) at startup with the "),a(n,{to:"/using-wasabi/StartupParameters.html#non-config-file-configurations"},{default:o(()=>[t("startup parameters")]),_:1}),t(".")]),Ti,Ii])}const Mi=j(ne,[["render",ji],["__file","FAQ-UseWasabi.html.vue"]]),Ei=JSON.parse(`{"path":"/FAQ/FAQ-UseWasabi.html","title":"Use of Wasabi FAQ","lang":"en-US","frontmatter":{"title":"Use of Wasabi FAQ","description":"Frequently asked questions about the nuances of how to use Wasabi properly. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"General","slug":"general","link":"#general","children":[{"level":3,"title":"How do I start using Wasabi?","slug":"how-do-i-start-using-wasabi","link":"#how-do-i-start-using-wasabi","children":[]},{"level":3,"title":"How do I generate a new wallet?","slug":"how-do-i-generate-a-new-wallet","link":"#how-do-i-generate-a-new-wallet","children":[]},{"level":3,"title":"Can I rename my Wallet?","slug":"can-i-rename-my-wallet","link":"#can-i-rename-my-wallet","children":[]},{"level":3,"title":"What is the password used for?","slug":"what-is-the-password-used-for","link":"#what-is-the-password-used-for","children":[]},{"level":3,"title":"What password should I use?","slug":"what-password-should-i-use","link":"#what-password-should-i-use","children":[]},{"level":3,"title":"Where can I find the Wasabi data folder?","slug":"where-can-i-find-the-wasabi-data-folder","link":"#where-can-i-find-the-wasabi-data-folder","children":[]},{"level":3,"title":"Can I spend my bitcoin without the password?","slug":"can-i-spend-my-bitcoin-without-the-password","link":"#can-i-spend-my-bitcoin-without-the-password","children":[]},{"level":3,"title":"Why BIP 38?","slug":"why-bip-38","link":"#why-bip-38","children":[]},{"level":3,"title":"What are the terms and conditions?","slug":"what-are-the-terms-and-conditions","link":"#what-are-the-terms-and-conditions","children":[]},{"level":3,"title":"Can I import a watch-only extended public key?","slug":"can-i-import-a-watch-only-extended-public-key","link":"#can-i-import-a-watch-only-extended-public-key","children":[]},{"level":3,"title":"What does the privacy progress mean?","slug":"what-does-the-privacy-progress-mean","link":"#what-does-the-privacy-progress-mean","children":[]},{"level":3,"title":"Why does the privacy progress change if I select a different coinjoin strategy?","slug":"why-does-the-privacy-progress-change-if-i-select-a-different-coinjoin-strategy","link":"#why-does-the-privacy-progress-change-if-i-select-a-different-coinjoin-strategy","children":[]},{"level":3,"title":"What does the bar with the colored segments mean?","slug":"what-does-the-bar-with-the-colored-segments-mean","link":"#what-does-the-bar-with-the-colored-segments-mean","children":[]},{"level":3,"title":"How can I display the fee in sats?","slug":"how-can-i-display-the-fee-in-sats","link":"#how-can-i-display-the-fee-in-sats","children":[]},{"level":3,"title":"What is the box (music box) at the bottom of the wallet's main view?","slug":"what-is-the-box-music-box-at-the-bottom-of-the-wallet-s-main-view","link":"#what-is-the-box-music-box-at-the-bottom-of-the-wallet-s-main-view","children":[]},{"level":3,"title":"Does Wasabi support Taproot?","slug":"does-wasabi-support-taproot","link":"#does-wasabi-support-taproot","children":[]}]},{"level":2,"title":"Synchronization","slug":"synchronization","link":"#synchronization","children":[{"level":3,"title":"What are BIP-158 block filters?","slug":"what-are-bip-158-block-filters","link":"#what-are-bip-158-block-filters","children":[]},{"level":3,"title":"How does Wasabi download a relevant block?","slug":"how-does-wasabi-download-a-relevant-block","link":"#how-does-wasabi-download-a-relevant-block","children":[]},{"level":3,"title":"How do I know if the synchronization is finished?","slug":"how-do-i-know-if-the-synchronization-is-finished","link":"#how-do-i-know-if-the-synchronization-is-finished","children":[]},{"level":3,"title":"Why does the Tor status have a warning triangle icon?","slug":"why-does-the-tor-status-have-a-warning-triangle-icon","link":"#why-does-the-tor-status-have-a-warning-triangle-icon","children":[]},{"level":3,"title":"How long does the initial, and a subsequent synchronization take?","slug":"how-long-does-the-initial-and-a-subsequent-synchronization-take","link":"#how-long-does-the-initial-and-a-subsequent-synchronization-take","children":[]},{"level":3,"title":"Can I shutdown my computer while a wallet is synchronizing?","slug":"can-i-shutdown-my-computer-while-a-wallet-is-synchronizing","link":"#can-i-shutdown-my-computer-while-a-wallet-is-synchronizing","children":[]},{"level":3,"title":"How do I resync (rescan) my wallet?","slug":"how-do-i-resync-rescan-my-wallet","link":"#how-do-i-resync-rescan-my-wallet","children":[]},{"level":3,"title":"Can Wasabi work with a pruned bitcoin node?","slug":"can-wasabi-work-with-a-pruned-bitcoin-node","link":"#can-wasabi-work-with-a-pruned-bitcoin-node","children":[]},{"level":3,"title":"Can I run a Wasabi headless daemon?","slug":"can-i-run-a-wasabi-headless-daemon","link":"#can-i-run-a-wasabi-headless-daemon","children":[]}]},{"level":2,"title":"Receive","slug":"receive","link":"#receive","children":[{"level":3,"title":"Why is it bad to re-use addresses?","slug":"why-is-it-bad-to-re-use-addresses","link":"#why-is-it-bad-to-re-use-addresses","children":[]},{"level":3,"title":"How do I generate a new receiving address?","slug":"how-do-i-generate-a-new-receiving-address","link":"#how-do-i-generate-a-new-receiving-address","children":[]},{"level":3,"title":"Where can I find previously generated addresses?","slug":"where-can-i-find-previously-generated-addresses","link":"#where-can-i-find-previously-generated-addresses","children":[]},{"level":3,"title":"What is the gap limit?","slug":"what-is-the-gap-limit","link":"#what-is-the-gap-limit","children":[]},{"level":3,"title":"How do I change the gap limit of a wallet?","slug":"how-do-i-change-the-gap-limit-of-a-wallet","link":"#how-do-i-change-the-gap-limit-of-a-wallet","children":[]},{"level":3,"title":"Why do I have to label my address?","slug":"why-do-i-have-to-label-my-address","link":"#why-do-i-have-to-label-my-address","children":[]},{"level":3,"title":"How can I change the label of my receive address?","slug":"how-can-i-change-the-label-of-my-receive-address","link":"#how-can-i-change-the-label-of-my-receive-address","children":[]},{"level":3,"title":"How can I edit the labels of my address after a transaction has gone through?","slug":"how-can-i-edit-the-labels-of-my-address-after-a-transaction-has-gone-through","link":"#how-can-i-edit-the-labels-of-my-address-after-a-transaction-has-gone-through","children":[]},{"level":3,"title":"Are there privacy concerns regarding whom I send my address?","slug":"are-there-privacy-concerns-regarding-whom-i-send-my-address","link":"#are-there-privacy-concerns-regarding-whom-i-send-my-address","children":[]},{"level":3,"title":"Why does Wasabi only use SegWit bech32 addresses?","slug":"why-does-wasabi-only-use-segwit-bech32-addresses","link":"#why-does-wasabi-only-use-segwit-bech32-addresses","children":[]},{"level":3,"title":"Why do some third party services say the Wasabi address is invalid?","slug":"why-do-some-third-party-services-say-the-wasabi-address-is-invalid","link":"#why-do-some-third-party-services-say-the-wasabi-address-is-invalid","children":[]},{"level":3,"title":"Where can I find my address QR code?","slug":"where-can-i-find-my-address-qr-code","link":"#where-can-i-find-my-address-qr-code","children":[]},{"level":3,"title":"What derivation paths does Wasabi use?","slug":"what-derivation-paths-does-wasabi-use","link":"#what-derivation-paths-does-wasabi-use","children":[]},{"level":3,"title":"Can I generate a multi signature script?","slug":"can-i-generate-a-multi-signature-script","link":"#can-i-generate-a-multi-signature-script","children":[]},{"level":3,"title":"How does Wasabi know of incoming transactions to the mempool?","slug":"how-does-wasabi-know-of-incoming-transactions-to-the-mempool","link":"#how-does-wasabi-know-of-incoming-transactions-to-the-mempool","children":[]},{"level":3,"title":"Can I export all my receive addresses?","slug":"can-i-export-all-my-receive-addresses","link":"#can-i-export-all-my-receive-addresses","children":[]}]},{"level":2,"title":"Send","slug":"send","link":"#send","children":[{"level":3,"title":"How do I set a destination address?","slug":"how-do-i-set-a-destination-address","link":"#how-do-i-set-a-destination-address","children":[]},{"level":3,"title":"How do I set the payment amount?","slug":"how-do-i-set-the-payment-amount","link":"#how-do-i-set-the-payment-amount","children":[]},{"level":3,"title":"Can I pay to many addresses?","slug":"can-i-pay-to-many-addresses","link":"#can-i-pay-to-many-addresses","children":[]},{"level":3,"title":"Can I set a custom change address?","slug":"can-i-set-a-custom-change-address","link":"#can-i-set-a-custom-change-address","children":[]},{"level":3,"title":"Does Wasabi support sending RBF?","slug":"does-wasabi-support-sending-rbf","link":"#does-wasabi-support-sending-rbf","children":[]},{"level":3,"title":"Why does Wasabi choose a new random node every time I send a transaction?","slug":"why-does-wasabi-choose-a-new-random-node-every-time-i-send-a-transaction","link":"#why-does-wasabi-choose-a-new-random-node-every-time-i-send-a-transaction","children":[]},{"level":3,"title":"What fee should I select?","slug":"what-fee-should-i-select","link":"#what-fee-should-i-select","children":[]},{"level":3,"title":"How do I set custom fee rate?","slug":"how-do-i-set-custom-fee-rate","link":"#how-do-i-set-custom-fee-rate","children":[]},{"level":3,"title":"How does Wasabi select which coins to send?","slug":"how-does-wasabi-select-which-coins-to-send","link":"#how-does-wasabi-select-which-coins-to-send","children":[]},{"level":3,"title":"How is the transaction broadcast?","slug":"how-is-the-transaction-broadcast","link":"#how-is-the-transaction-broadcast","children":[]},{"level":3,"title":"What is the cluster history?","slug":"what-is-the-cluster-history","link":"#what-is-the-cluster-history","children":[]},{"level":3,"title":"Why Wasabi did not send some of my selected coins?","slug":"why-wasabi-did-not-send-some-of-my-selected-coins","link":"#why-wasabi-did-not-send-some-of-my-selected-coins","children":[]},{"level":3,"title":"How can I bump the transaction fee with child pays for parent (CPFP)?","slug":"how-can-i-bump-the-transaction-fee-with-child-pays-for-parent-cpfp","link":"#how-can-i-bump-the-transaction-fee-with-child-pays-for-parent-cpfp","children":[]},{"level":3,"title":"How can I speed up a pending/unconfirmed transaction (CPFP/RBF)?","slug":"how-can-i-speed-up-a-pending-unconfirmed-transaction-cpfp-rbf","link":"#how-can-i-speed-up-a-pending-unconfirmed-transaction-cpfp-rbf","children":[]},{"level":3,"title":"How can I cancel a pending/unconfirmed transaction?","slug":"how-can-i-cancel-a-pending-unconfirmed-transaction","link":"#how-can-i-cancel-a-pending-unconfirmed-transaction","children":[]},{"level":3,"title":"Why is there no Send button, only the Receive button is displayed?","slug":"why-is-there-no-send-button-only-the-receive-button-is-displayed","link":"#why-is-there-no-send-button-only-the-receive-button-is-displayed","children":[]},{"level":3,"title":"Can I send (privately) from my wallet when the privacy progress is below 100%?","slug":"can-i-send-privately-from-my-wallet-when-the-privacy-progress-is-below-100","link":"#can-i-send-privately-from-my-wallet-when-the-privacy-progress-is-below-100","children":[]}]},{"level":2,"title":"CoinJoin","slug":"coinjoin","link":"#coinjoin","children":[{"level":3,"title":"What's the legal status of Wasabi/CoinJoin?","slug":"what-s-the-legal-status-of-wasabi-coinjoin","link":"#what-s-the-legal-status-of-wasabi-coinjoin","children":[]},{"level":3,"title":"What is the minimum amount required to coinjoin?","slug":"what-is-the-minimum-amount-required-to-coinjoin","link":"#what-is-the-minimum-amount-required-to-coinjoin","children":[]},{"level":3,"title":"What is the maximum amount I can coinjoin?","slug":"what-is-the-maximum-amount-i-can-coinjoin","link":"#what-is-the-maximum-amount-i-can-coinjoin","children":[]},{"level":3,"title":"What are the fees for the coinjoin?","slug":"what-are-the-fees-for-the-coinjoin","link":"#what-are-the-fees-for-the-coinjoin","children":[]},{"level":3,"title":"What is the anonymity set?","slug":"what-is-the-anonymity-set","link":"#what-is-the-anonymity-set","children":[]},{"level":3,"title":"What is the anonymity score?","slug":"what-is-the-anonymity-score","link":"#what-is-the-anonymity-score","children":[]},{"level":3,"title":"What is the difference between anonymity set and anonymity score?","slug":"what-is-the-difference-between-anonymity-set-and-anonymity-score","link":"#what-is-the-difference-between-anonymity-set-and-anonymity-score","children":[]},{"level":3,"title":"What are the equal denominations created in a coinjoin round?","slug":"what-are-the-equal-denominations-created-in-a-coinjoin-round","link":"#what-are-the-equal-denominations-created-in-a-coinjoin-round","children":[]},{"level":3,"title":"What is happening in the input registration phase?","slug":"what-is-happening-in-the-input-registration-phase","link":"#what-is-happening-in-the-input-registration-phase","children":[]},{"level":3,"title":"What is happening in the connection confirmation phase?","slug":"what-is-happening-in-the-connection-confirmation-phase","link":"#what-is-happening-in-the-connection-confirmation-phase","children":[]},{"level":3,"title":"What is happening in the output registration phase?","slug":"what-is-happening-in-the-output-registration-phase","link":"#what-is-happening-in-the-output-registration-phase","children":[]},{"level":3,"title":"What is happening in the signing phase?","slug":"what-is-happening-in-the-signing-phase","link":"#what-is-happening-in-the-signing-phase","children":[]},{"level":3,"title":"What is happening during the blame round?","slug":"what-is-happening-during-the-blame-round","link":"#what-is-happening-during-the-blame-round","children":[]},{"level":3,"title":"What is happening in the broadcasting phase?","slug":"what-is-happening-in-the-broadcasting-phase","link":"#what-is-happening-in-the-broadcasting-phase","children":[]},{"level":3,"title":"Is there any additional anonymity using multiple wallets for CoinJoins?","slug":"is-there-any-additional-anonymity-using-multiple-wallets-for-coinjoins","link":"#is-there-any-additional-anonymity-using-multiple-wallets-for-coinjoins","children":[]},{"level":3,"title":"How is the anonymity set target determined for CoinJoins?","slug":"how-is-the-anonymity-set-target-determined-for-coinjoins","link":"#how-is-the-anonymity-set-target-determined-for-coinjoins","children":[]},{"level":3,"title":"I'd like to experience coinjoin but I'm not comfortable using real Bitcoin. What can I do?","slug":"i-d-like-to-experience-coinjoin-but-i-m-not-comfortable-using-real-bitcoin-what-can-i-do","link":"#i-d-like-to-experience-coinjoin-but-i-m-not-comfortable-using-real-bitcoin-what-can-i-do","children":[]},{"level":3,"title":"Does Wasabi have to stay on during coinjoin?","slug":"does-wasabi-have-to-stay-on-during-coinjoin","link":"#does-wasabi-have-to-stay-on-during-coinjoin","children":[]},{"level":3,"title":"What if there's a power outage during CoinJoin? Do I lose my coins?","slug":"what-if-there-s-a-power-outage-during-coinjoin-do-i-lose-my-coins","link":"#what-if-there-s-a-power-outage-during-coinjoin-do-i-lose-my-coins","children":[]},{"level":3,"title":"How much anonymity set do I need?","slug":"how-much-anonymity-set-do-i-need","link":"#how-much-anonymity-set-do-i-need","children":[]},{"level":3,"title":"How does my wallet communicate with the Wasabi coordinator server?","slug":"how-does-my-wallet-communicate-with-the-wasabi-coordinator-server","link":"#how-does-my-wallet-communicate-with-the-wasabi-coordinator-server","children":[]},{"level":3,"title":"What is the address of the coordinator?","slug":"what-is-the-address-of-the-coordinator","link":"#what-is-the-address-of-the-coordinator","children":[]},{"level":3,"title":"What is the maximum number of coins that can be registered in a coinjoin?","slug":"what-is-the-maximum-number-of-coins-that-can-be-registered-in-a-coinjoin","link":"#what-is-the-maximum-number-of-coins-that-can-be-registered-in-a-coinjoin","children":[]},{"level":3,"title":"How many coins/outputs do I get from a coinjoin?","slug":"how-many-coins-outputs-do-i-get-from-a-coinjoin","link":"#how-many-coins-outputs-do-i-get-from-a-coinjoin","children":[]},{"level":3,"title":"Can I manually select which coins to register for coinjoin?","slug":"can-i-manually-select-which-coins-to-register-for-coinjoin","link":"#can-i-manually-select-which-coins-to-register-for-coinjoin","children":[]},{"level":3,"title":"How to exclude/freeze coins from coinjoin?","slug":"how-to-exclude-freeze-coins-from-coinjoin","link":"#how-to-exclude-freeze-coins-from-coinjoin","children":[]},{"level":3,"title":"How long does it take to make my wallet 100% private?","slug":"how-long-does-it-take-to-make-my-wallet-100-private","link":"#how-long-does-it-take-to-make-my-wallet-100-private","children":[]},{"level":3,"title":"What coinjoin strategy should I select?","slug":"what-coinjoin-strategy-should-i-select","link":"#what-coinjoin-strategy-should-i-select","children":[]},{"level":3,"title":"What is the coinjoin strategy?","slug":"what-is-the-coinjoin-strategy","link":"#what-is-the-coinjoin-strategy","children":[]},{"level":3,"title":"What are the differences/settings per coinjoin strategy?","slug":"what-are-the-differences-settings-per-coinjoin-strategy","link":"#what-are-the-differences-settings-per-coinjoin-strategy","children":[]},{"level":3,"title":"What does the Auto-start coinjoin threshold mean in the coinjoin settings?","slug":"what-does-the-auto-start-coinjoin-threshold-mean-in-the-coinjoin-settings","link":"#what-does-the-auto-start-coinjoin-threshold-mean-in-the-coinjoin-settings","children":[]},{"level":3,"title":"What does the Red coin isolation mean in the coinjoin settings?","slug":"what-does-the-red-coin-isolation-mean-in-the-coinjoin-settings","link":"#what-does-the-red-coin-isolation-mean-in-the-coinjoin-settings","children":[]},{"level":3,"title":"Do coinjoin transactions signal RBF?","slug":"do-coinjoin-transactions-signal-rbf","link":"#do-coinjoin-transactions-signal-rbf","children":[]},{"level":3,"title":"Why do my coins occasionally get banned from participating in CoinJoin?","slug":"why-do-my-coins-occasionally-get-banned-from-participating-in-coinjoin","link":"#why-do-my-coins-occasionally-get-banned-from-participating-in-coinjoin","children":[]},{"level":3,"title":"How do I change the coordinator?","slug":"how-do-i-change-the-coordinator","link":"#how-do-i-change-the-coordinator","children":[]}]},{"level":2,"title":"Backup and Recovery","slug":"backup-and-recovery","link":"#backup-and-recovery","children":[{"level":3,"title":"How do I back up my mnemonic words?","slug":"how-do-i-back-up-my-mnemonic-words","link":"#how-do-i-back-up-my-mnemonic-words","children":[]},{"level":3,"title":"How do I back up my wallet file?","slug":"how-do-i-back-up-my-wallet-file","link":"#how-do-i-back-up-my-wallet-file","children":[]},{"level":3,"title":"What do I need to recover my wallet?","slug":"what-do-i-need-to-recover-my-wallet","link":"#what-do-i-need-to-recover-my-wallet","children":[]},{"level":3,"title":"Can I recover my wallet without the password?","slug":"can-i-recover-my-wallet-without-the-password","link":"#can-i-recover-my-wallet-without-the-password","children":[]},{"level":3,"title":"What should I do if I forget my password?","slug":"what-should-i-do-if-i-forget-my-password","link":"#what-should-i-do-if-i-forget-my-password","children":[]},{"level":3,"title":"I lost the recovery words but I still have the .json file and the password. Is my wallet still recoverable?","slug":"i-lost-the-recovery-words-but-i-still-have-the-json-file-and-the-password-is-my-wallet-still-recoverable","link":"#i-lost-the-recovery-words-but-i-still-have-the-json-file-and-the-password-is-my-wallet-still-recoverable","children":[]},{"level":3,"title":"Can I verify the Recovery Words of an existing wallet?","slug":"can-i-verify-the-recovery-words-of-an-existing-wallet","link":"#can-i-verify-the-recovery-words-of-an-existing-wallet","children":[]}]},{"level":2,"title":"Hardware Wallet","slug":"hardware-wallet","link":"#hardware-wallet","children":[{"level":3,"title":"What hardware wallets does Wasabi support?","slug":"what-hardware-wallets-does-wasabi-support","link":"#what-hardware-wallets-does-wasabi-support","children":[]},{"level":3,"title":"Why does Wasabi use the Hardware Wallet Interface?","slug":"why-does-wasabi-use-the-hardware-wallet-interface","link":"#why-does-wasabi-use-the-hardware-wallet-interface","children":[]},{"level":3,"title":"Does Wasabi support the hidden wallets of hardware wallets?","slug":"does-wasabi-support-the-hidden-wallets-of-hardware-wallets","link":"#does-wasabi-support-the-hidden-wallets-of-hardware-wallets","children":[]},{"level":3,"title":"How can I generate a Wasabi skeleton wallet file in ColdCard?","slug":"how-can-i-generate-a-wasabi-skeleton-wallet-file-in-coldcard","link":"#how-can-i-generate-a-wasabi-skeleton-wallet-file-in-coldcard","children":[]},{"level":3,"title":"How can I import the Wasabi skeleton wallet file?","slug":"how-can-i-import-the-wasabi-skeleton-wallet-file","link":"#how-can-i-import-the-wasabi-skeleton-wallet-file","children":[]},{"level":3,"title":"How can I generate a receiving address of my hardware wallet?","slug":"how-can-i-generate-a-receiving-address-of-my-hardware-wallet","link":"#how-can-i-generate-a-receiving-address-of-my-hardware-wallet","children":[]},{"level":3,"title":"How can I sign a transaction with a USB connected hardware wallet?","slug":"how-can-i-sign-a-transaction-with-a-usb-connected-hardware-wallet","link":"#how-can-i-sign-a-transaction-with-a-usb-connected-hardware-wallet","children":[]},{"level":3,"title":"How can I build and export a transaction to ColdCard?","slug":"how-can-i-build-and-export-a-transaction-to-coldcard","link":"#how-can-i-build-and-export-a-transaction-to-coldcard","children":[]},{"level":3,"title":"How can I sign a transaction on the ColdCard?","slug":"how-can-i-sign-a-transaction-on-the-coldcard","link":"#how-can-i-sign-a-transaction-on-the-coldcard","children":[]},{"level":3,"title":"How can I import and broadcast a final transaction from ColdCard?","slug":"how-can-i-import-and-broadcast-a-final-transaction-from-coldcard","link":"#how-can-i-import-and-broadcast-a-final-transaction-from-coldcard","children":[]},{"level":3,"title":"Can I coinjoin bitcoins on my hardware wallet?","slug":"can-i-coinjoin-bitcoins-on-my-hardware-wallet","link":"#can-i-coinjoin-bitcoins-on-my-hardware-wallet","children":[]},{"level":3,"title":"Does Ledger Live send my public keys and addresses to a third party server?","slug":"does-ledger-live-send-my-public-keys-and-addresses-to-a-third-party-server","link":"#does-ledger-live-send-my-public-keys-and-addresses-to-a-third-party-server","children":[]},{"level":3,"title":"After I coinjoined my coins and reached 100% privacy, I sent them to my hardware wallet and now the coins have anonscore 1. Why?","slug":"after-i-coinjoined-my-coins-and-reached-100-privacy-i-sent-them-to-my-hardware-wallet-and-now-the-coins-have-anonscore-1-why","link":"#after-i-coinjoined-my-coins-and-reached-100-privacy-i-sent-them-to-my-hardware-wallet-and-now-the-coins-have-anonscore-1-why","children":[]},{"level":3,"title":"Can I use Trezor One with Wasabi?","slug":"can-i-use-trezor-one-with-wasabi","link":"#can-i-use-trezor-one-with-wasabi","children":[]},{"level":3,"title":"Can I use BitBox with Wasabi?","slug":"can-i-use-bitbox-with-wasabi","link":"#can-i-use-bitbox-with-wasabi","children":[]},{"level":3,"title":"How can I type in the passphrase of my Trezor T?","slug":"how-can-i-type-in-the-passphrase-of-my-trezor-t","link":"#how-can-i-type-in-the-passphrase-of-my-trezor-t","children":[]},{"level":3,"title":"I have coinjoined with a Trezor device on Trezor Suite, but in Wasabi I cannot see my coins?","slug":"i-have-coinjoined-with-a-trezor-device-on-trezor-suite-but-in-wasabi-i-cannot-see-my-coins","link":"#i-have-coinjoined-with-a-trezor-device-on-trezor-suite-but-in-wasabi-i-cannot-see-my-coins","children":[]},{"level":3,"title":"How can I use Hardware Wallets on Linux (udev rules)?","slug":"how-can-i-use-hardware-wallets-on-linux-udev-rules","link":"#how-can-i-use-hardware-wallets-on-linux-udev-rules","children":[]}]},{"level":2,"title":"History","slug":"history","link":"#history","children":[{"level":3,"title":"How can I check the transactions history?","slug":"how-can-i-check-the-transactions-history","link":"#how-can-i-check-the-transactions-history","children":[]},{"level":3,"title":"How can I see coinjoins in the history list?","slug":"how-can-i-see-coinjoins-in-the-history-list","link":"#how-can-i-see-coinjoins-in-the-history-list","children":[]},{"level":3,"title":"Can I sort the history items?","slug":"can-i-sort-the-history-items","link":"#can-i-sort-the-history-items","children":[]},{"level":3,"title":"Can I search for a transaction ID in the history?","slug":"can-i-search-for-a-transaction-id-in-the-history","link":"#can-i-search-for-a-transaction-id-in-the-history","children":[]},{"level":3,"title":"Can I export a list of transactions?","slug":"can-i-export-a-list-of-transactions","link":"#can-i-export-a-list-of-transactions","children":[]}]},{"level":2,"title":"Settings","slug":"settings","link":"#settings","children":[{"level":3,"title":"How do I connect my own full node to Wasabi?","slug":"how-do-i-connect-my-own-full-node-to-wasabi","link":"#how-do-i-connect-my-own-full-node-to-wasabi","children":[]},{"level":3,"title":"How can I turn off Tor?","slug":"how-can-i-turn-off-tor","link":"#how-can-i-turn-off-tor","children":[]},{"level":3,"title":"How can I change the anonymity score target?","slug":"how-can-i-change-the-anonymity-score-target","link":"#how-can-i-change-the-anonymity-score-target","children":[]},{"level":3,"title":"What is the dust threshold?","slug":"what-is-the-dust-threshold","link":"#what-is-the-dust-threshold","children":[]},{"level":3,"title":"Where can I find the logs?","slug":"where-can-i-find-the-logs","link":"#where-can-i-find-the-logs","children":[]},{"level":3,"title":"How to activate/deactivate discreet mode?","slug":"how-to-activate-deactivate-discreet-mode","link":"#how-to-activate-deactivate-discreet-mode","children":[]},{"level":3,"title":"How can I change to the white theme?","slug":"how-can-i-change-to-the-white-theme","link":"#how-can-i-change-to-the-white-theme","children":[]}]},{"level":2,"title":"Coin Control Best Practices","slug":"coin-control-best-practices","link":"#coin-control-best-practices","children":[{"level":3,"title":"What are coins?","slug":"what-are-coins","link":"#what-are-coins","children":[]},{"level":3,"title":"How can I enable (manual) coin control?","slug":"how-can-i-enable-manual-coin-control","link":"#how-can-i-enable-manual-coin-control","children":[]},{"level":3,"title":"How do I select coins for spending?","slug":"how-do-i-select-coins-for-spending","link":"#how-do-i-select-coins-for-spending","children":[]},{"level":3,"title":"Can I consolidate anonset coins?","slug":"can-i-consolidate-anonset-coins","link":"#can-i-consolidate-anonset-coins","children":[]},{"level":3,"title":"How can I send my anonset coins to my hardware wallet?","slug":"how-can-i-send-my-anonset-coins-to-my-hardware-wallet","link":"#how-can-i-send-my-anonset-coins-to-my-hardware-wallet","children":[]},{"level":3,"title":"What can I do with small change?","slug":"what-can-i-do-with-small-change","link":"#what-can-i-do-with-small-change","children":[]}]},{"level":2,"title":"Music Box","slug":"music-box","link":"#music-box","children":[{"level":3,"title":"What does Awaiting cheaper coinjoins mean?","slug":"what-does-awaiting-cheaper-coinjoins-mean","link":"#what-does-awaiting-cheaper-coinjoins-mean","children":[]},{"level":3,"title":"What does Awaiting the blame round mean?","slug":"what-does-awaiting-the-blame-round-mean","link":"#what-does-awaiting-the-blame-round-mean","children":[]},{"level":3,"title":"What does Insufficient funds eligible for coinjoin mean?","slug":"what-does-insufficient-funds-eligible-for-coinjoin-mean","link":"#what-does-insufficient-funds-eligible-for-coinjoin-mean","children":[]},{"level":3,"title":"What does Some funds are rejected from coinjoining mean?","slug":"what-does-some-funds-are-rejected-from-coinjoining-mean","link":"#what-does-some-funds-are-rejected-from-coinjoining-mean","children":[]}]},{"level":2,"title":"Buy Anything Button","slug":"buy-anything-button","link":"#buy-anything-button","children":[{"level":3,"title":"What is the Buy Anything Button?","slug":"what-is-the-buy-anything-button","link":"#what-is-the-buy-anything-button","children":[]},{"level":3,"title":"How does the Buy Anything Button work?","slug":"how-does-the-buy-anything-button-work","link":"#how-does-the-buy-anything-button-work","children":[]},{"level":3,"title":"Does the Buy Anything Button hurt my privacy?","slug":"does-the-buy-anything-button-hurt-my-privacy","link":"#does-the-buy-anything-button-hurt-my-privacy","children":[]},{"level":3,"title":"What can I order and for whom is this available?","slug":"what-can-i-order-and-for-whom-is-this-available","link":"#what-can-i-order-and-for-whom-is-this-available","children":[]}]},{"level":2,"title":"Advanced Usage","slug":"advanced-usage","link":"#advanced-usage","children":[{"level":3,"title":"Can I change the default ports for the Wasabi's bundled Tor?","slug":"can-i-change-the-default-ports-for-the-wasabi-s-bundled-tor","link":"#can-i-change-the-default-ports-for-the-wasabi-s-bundled-tor","children":[]},{"level":3,"title":"Where does the BTC exchange rate come from?","slug":"where-does-the-btc-exchange-rate-come-from","link":"#where-does-the-btc-exchange-rate-come-from","children":[]}]}],"git":{"updatedTime":1720425980000},"filePathRelative":"FAQ/FAQ-UseWasabi.md"}`);export{Mi as comp,Ei as data}; diff --git a/assets/Glossary-GeneralBitcoin.html-B-_tRKqz.js b/assets/Glossary-GeneralBitcoin.html-ckdZxJsG.js similarity index 99% rename from assets/Glossary-GeneralBitcoin.html-B-_tRKqz.js rename to assets/Glossary-GeneralBitcoin.html-ckdZxJsG.js index 4e84d0910..b0a6185e8 100644 --- a/assets/Glossary-GeneralBitcoin.html-B-_tRKqz.js +++ b/assets/Glossary-GeneralBitcoin.html-ckdZxJsG.js @@ -1 +1 @@ -import{_ as l,r,o as c,c as h,a as e,b as t,d as a,w as n,e as s}from"./app-3S7gIoGc.js";const d={},p=e("h2",{id:"bitcoin-in-general",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#bitcoin-in-general"},[e("span",null,"Bitcoin in general")])],-1),u=e("h3",{id:"address",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#address"},[e("span",null,"Address")])],-1),f=e("h3",{id:"bitcoin",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#bitcoin"},[e("span",null,"Bitcoin")])],-1),b=e("p",null,"Bitcoin is a peer-to-peer electronic cash system. An innovative payment network and a new kind of money. It is a decentralized digital currency without a central bank or single administrator that can be sent from user to user on the peer-to-peer bitcoin blockchain network without the need for intermediaries.",-1),m=e("h3",{id:"bitcoin-core",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#bitcoin-core"},[e("span",null,"Bitcoin Core")])],-1),g=e("p",null,[t("Bitcoin Core is an open-source project which maintains and releases Bitcoin client software called "),e("code",null,"Bitcoin Core"),t(", considered to be Bitcoin's reference implementation. It is a direct descendant of the original Bitcoin software client released by Satoshi Nakamoto after he published the famous Bitcoin whitepaper.")],-1),y=e("code",null,"full-node",-1),k={href:"https://bitcoincore.org/",target:"_blank",rel:"noopener noreferrer"},w=e("h3",{id:"bitcoin-improvement-proposal-bip",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#bitcoin-improvement-proposal-bip"},[e("span",null,"Bitcoin Improvement Proposal (BIP)")])],-1),v=e("h3",{id:"bitcoin-knots",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#bitcoin-knots"},[e("span",null,"Bitcoin Knots")])],-1),x={href:"https://bitcoinknots.org/",target:"_blank",rel:"noopener noreferrer"},B=s('

    Block

    A block is a batch of valid Bitcoin transactions and its hash must be a value below a certain difficulty target to prove the work of the miner. Each block references the hash of the previous block, thus creating a hash chain of blocks. On average a new block is mined every 10 minutes.

    Blockchain

    The blockchain is the one chain of valid Bitcoin blocks with the most accumulated proof of work. It is an append-only data structure with new blocks being added on average every 10 minutes. Because of its uniquely verifiable and global consensus, it is a revolutionary standard for time, thus some call it timechain.

    Change

    ',5),_=s('

    Child Pays For Parent (CPFP)

    Child Pays For Parent (CPFP) is a fee bumping technique where a user spends an output from a low fee rate unconfirmed transaction in a child transaction with a high fee rate in order to encourage miners to include both transactions in a block.

    Coinbase

    A special field used as the sole input for coinbase transactions. The coinbase allows claiming the block reward and provides up to 100 bytes for arbitrary data.

    Coinbase Transaction

    The first transaction in a block. Always created by a miner, it includes a single coinbase.

    Cold Storage

    ',7),P=s('

    Confirmations

    Once a transaction is included in a block, it has one confirmation. As soon as another block is mined on the same blockchain, the transaction has two confirmations, and so on. Six or more confirmations is considered sufficient proof that a transaction cannot be reversed.

    Consensus

    When several nodes, usually most nodes on the network, all have the same blocks in their locally-validated best blockchain.

    Consensus Rules

    The block validation rules that full nodes follow to stay in consensus with other nodes.

    Custodial (Wallet or Mixer)

    A custodial wallet is any wallet where the private keys of your coins are in the hands of a third party. In essence, they operate similarly to traditional banks.

    A custodial mixer needs you to send your bitcoins to a central part before mixing. This means that you are at risk of being stolen from.

    Difficulty

    A network-wide setting that controls how much computation is required to produce a proof of work.

    Difficulty Retargeting (Difficulty Adjustment)

    A network-wide recalculation of the difficulty that occurs once every 2,016 blocks and considers the hashing power of the previous 2,016 blocks.

    Difficulty Target

    A difficulty at which all the computation in the network will find blocks approximately every 10 minutes. It specifies the numeric value the hash of a block must not be above to be considered a valid block.

    ECDSA

    ECDSA (Elliptic Curve Digital Signature Algorithm) is one of the digital signature algorithms used by Bitcoin to ensure that funds can only be spent by their rightful owners.

    Fork

    Fork, also known as accidental fork, occurs when two or more blocks have the same block height, forking the blockchain. Typically occurs when two or more miners find blocks at nearly the same time. Can also happen as part of an attack.

    Full node

    Any computer that connects to the Bitcoin network is called a node. Nodes that fully verify all of the rules of Bitcoin are called full nodes. Full nodes download every block and transaction and check them against Bitcoin's consensus rules.

    Fungibility

    ',22),T=s('

    Genesis Block

    The first block in the blockchain, used to initialize the cryptocurrency.

    Hard Fork

    Hard fork, also known as hard-forking change, is a permanent divergence in the blockchain, it occurs when non-upgraded nodes can not validate blocks created by upgraded nodes that follow newer consensus rules. The upgraded nodes break the rules of the legacy nodes. Not to be confused with fork, soft fork, software fork or Git fork.

    Hardware Wallet (HWW)

    ',5),S=s('

    Hash

    A cryptographic hash function takes any input of arbitrary size [the message] and computes a value of fixed size that is unique to the input, which is called a hash or a digest. If one bit of the input changes, the output will be completely different [avalanche effect]. And there are no two messages that result in the same hash [collision resistance]. The only way to get any given input, is by computing all possible inputs, it is a one-way function [pre-image resistance]. Bitcoin uses the SHA256 in many parts of the protocol.

    Hierarchical Deterministic (HD) Protocol

    The Hierarchical Deterministic key creation and transfer protocol (BIP32), which allows creating child keys from parent keys in a hierarchy.

    Hierarchical Deterministic (HD) Wallet

    Wallets using the Hierarchical Deterministic Protocol key creation and transfer protocol (BIP32).

    Hot Wallet

    A hot wallet is a software wallet that runs on a device which is connected to the Internet. Wasabi is a hot wallet by default.

    Input

    Input, transaction input, or TxIn is an input in a Bitcoin transaction which contains two fields: a unique transaction hash and an index number, which references one utxo of a previous transaction which is spent in this transaction.

    Lightning Network (LN)

    Lightning Network is a proposed implementation of Hashed Timelock Contracts (HTLCs) with bi-directional payment channels which allows payments to be securely routed across multiple peer-to-peer payment channels. This allows the formation of a network where any peer on the network can pay any other peer even if they don't directly have a channel open between each other.

    Mainnet

    The original and main network for Bitcoin transactions, where satoshis have real economic value.

    Mempool

    ',15),W=s('

    Merkle Root

    The root node of a merkle tree, a descendant of all the hashed pairs in the tree. Block headers must include a valid merkle root descended from all transactions in that block.

    Merkle Tree

    A tree constructed by hashing paired data (the leaves), then pairing and hashing the results until a single hash remains, the merkle root. In Bitcoin, the leaves are almost always transactions from a single block.

    Miner

    A Bitcoin user that attempts to find valid proof of work for new candidate blocks, by repeated hashing until the difficulty target is met.

    Mining Reward

    An amount of satoshis included in each new block as a reward by the network to the miner who found the proof of work solution. Initially it was 50 bitcoin per block, which is halved every 210 000 blocks, or roughly 4 years. This leads to a total money supply of just below 21 million bitcoin.

    Multisignature (multisig)

    ',9),A=e("code",null,"m",-1),C=e("code",null,"n",-1),H=s('

    Non-Custodial (Wallet or Mixer)

    A non-custodial wallet is any wallet where the private keys of your coins are in your hands. Non-custodial wallets give you full control over your bitcoins.

    A non-custodial mixer like Wasabi eliminates the risk that the coordinator can steal your bitcoin. Each participant verifies the proposed transaction, and signs it only if it is valid. This signature is only valid for this transaction, so any attempt to change the transaction after the fact is futile. The funds will always be in a Bitcoin address that you control.

    Nonce

    The nonce in a Bitcoin block is a 32-bit (4-byte) field whose value is set so that the hash of the block will contain a run of leading zeros. The rest of the fields may not be changed, as they have a defined meaning.

    Off-chain Transaction

    An off-chain transaction is the movement of value outside of the blockchain. While an on-chain transaction - usually referred to as simply a transaction - modifies the blockchain and depends on the blockchain to determine its validity. An off-chain transaction relies on other methods to record and validate the transaction.

    Output

    Output, transaction output, or TxOut is an output in a Bitcoin transaction which contains two fields: a value field for transferring zero or more satoshis and a pubkey script for indicating what conditions must be fulfilled for those satoshis to be further spent.

    P2PKH

    Many transactions processed on the Bitcoin network spend outputs locked with a Pay-to-Public-Key-Hash or P2PKH script. These outputs contain a locking script that locks the output to a public key hash, more commonly known as a Bitcoin address. An output locked by a P2PKH script can be unlocked (spent) by presenting a public key and a digital signature created by the corresponding private key.

    P2SH

    P2SH or Pay-to-Script-Hash is a type of transaction that simplifies the use of complex transaction scripts. With P2SH the complex script that details the spending conditions (redeem script) is committed to with a hash in the locking script.

    P2TR

    A pay-to-taproot (P2TR), also known as a Taproot or Bech32m address, is the most recent and advanced bitcoin address format. Taproot introduces more advanced security, privacy, flexibility and scaling to bitcoin.

    P2WPKH

    The signature of a P2WPKH (Pay-to-Witness-Public-Key-Hash) contains the same information as a P2PKH spending, but is located in the witness field instead of the scriptSig field.

    Paper Wallet

    In the most specific sense, a paper wallet is a document containing all the secrets to spend a Bitcoin UTXO. It is a way of storing bitcoin offline as a physical document.

    Partially Signed Bitcoin Transaction (PSBT)

    ',20),I={href:"https://github.com/bitcoin/bips/blob/master/bip-0174.mediawiki",target:"_blank",rel:"noopener noreferrer"},R=e("h3",{id:"pay-to-witness-public-key-hash-p2wpkh",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#pay-to-witness-public-key-hash-p2wpkh"},[e("span",null,"Pay-to-Witness-Public-Key-Hash (P2WPKH)")])],-1),F={href:"https://github.com/bitcoin/bips/blob/master/bip-0084.mediawiki",target:"_blank",rel:"noopener noreferrer"},K=s('

    Payment Channels

    A payment channel is class of techniques designed to allow users to make multiple Bitcoin transactions without committing all of the transactions to the Bitcoin blockchain. In a typical payment channel, only two transactions are added to the blockchain, one funding and one closing transaction, but a nearly unlimited number of payments can be made between the participants.

    Plausible deniability

    Plausible deniability is the ability to deny knowledge of or responsibility for any damnable actions committed by others in an organizational hierarchy because of a lack of evidence that can confirm their participation, even if they were personally involved in or at least willfully ignorant of the actions.

    Private Key

    ',5),D=e("h3",{id:"proof-of-work-pow",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#proof-of-work-pow"},[e("span",null,"Proof of Work (POW)")])],-1),M=e("p",null,"One of the requirements for a Bitcoin block to be valid is its hash should be below a certain difficulty target. In order to create a valid block, a miner must repeatedly hash a candidate block with a changing nonce until by sheer luck he finds a hash with low value. By providing this pre-image block, anyone can verify the amount of computational energy that a miner on average should have invested in order to find this block, and this is what is known as Proof of Work.",-1),N=e("h3",{id:"public-key",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#public-key"},[e("span",null,"Public Key")])],-1),O=s('

    Regtest

    A local testing environment in which developers can instantly generate blocks on demand for testing events, and can create private satoshis with no real-world value.

    Replace by Fee (RBF)

    Replacing one version of an unconfirmed transaction with a different version of the transaction that pays a higher transaction fee.

    satoshi (sat)

    A satoshi is the smallest denomination of bitcoin that can be recorded on the blockchain. It is the equivalent of 0.00000001 bitcoin and is named after the creator of Bitcoin, Satoshi Nakamoto.

    Satoshi Nakamoto

    Satoshi Nakamoto is the name used by the person or group of people who designed Bitcoin and created its original reference implementation. As a part of the implementation, they also devised the first blockchain database. In the process they were the first to solve the double-spending problem for digital currency in a decentralized and self verifying nature. Their real identity remains unknown.

    Schnorr Digital Signature Scheme

    Schnorr Digital Signature Scheme is one of the digital signature algorithms used by Bitcoin to ensure that funds can only be spent by their rightful owners. Schnorr signatures and public keys can be aggregated, meaning that multiple parties with unique private keys can sign the same message, which can be verified in batches instead of individually.

    Script

    Bitcoin uses a scripting system for transactions. Forth-like, Script is simple, stack-based and processed from left to right. It is purposefully not Turing-complete, with no loops.

    ScriptPubKey

    ScriptPubKey or pubkey script, is a script included in outputs which sets the conditions that must be fulfilled for those satoshis to be spent. Data for fulfilling the conditions can be provided in a signature script.

    ScriptSig

    ScriptSig or signature script, is the data generated by a spender which is almost always used as variables to satisfy a pubkey script.

    Segregated Witness (SegWit)

    ',17),U=s('

    Simplified Payment Verification (SPV)

    SPV is a method for verifying particular transactions were included in a block without downloading the entire block. The method is used by some lightweight Bitcoin clients.

    Soft Fork

    A soft fork is a change to the Bitcoin consensus rules that is backwards compatible. Users of this update do not break the rules of legacy users, but rather restrict themselves to a more narrow rule set.

    Taproot

    Taproot is an upgrade to Bitcoin which introduces several new features. Taproot integrates the Schnorr digital signature scheme into Bitcoin, upgrading Bitcoin’s core cryptography. Taproot builds on the SegWit upgrade to improve Bitcoin’s privacy and lower transaction fees. Taproot makes future Bitcoin upgrades easier by reforming Bitcoin’s scripting language.

    Testnet

    A testing environment in which users can obtain and spend satoshis that have no real-world value on a global network that is very similar to the Bitcoin mainnet.

    Timechain

    ',9),G=e("h3",{id:"transaction",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#transaction"},[e("span",null,"Transaction")])],-1),Q=e("p",null,"In simple terms, a transfer of bitcoin. More precisely, a transaction is a signed data structure expressing a transfer of value and consisting mainly of inputs and outputs. Transactions are transmitted over the Bitcoin network, collected by miners, and included into blocks, made permanent on the blockchain.",-1),j=e("h3",{id:"transaction-fees",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#transaction-fees"},[e("span",null,"Transaction Fees")])],-1),q=e("code",null,"inputs - outputs",-1),z=e("h3",{id:"unspent-transaction-output-utxo",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#unspent-transaction-output-utxo"},[e("span",null,"Unspent Transaction Output (UTXO)")])],-1),E=e("h3",{id:"wallet",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#wallet"},[e("span",null,"Wallet")])],-1),L=e("p",null,"Software that holds all your Bitcoin addresses and secret keys. Use it to send, receive, and store your bitcoin.",-1);function V(X,J){const i=r("RouteLink"),o=r("ExternalLinkIcon");return c(),h("div",null,[p,u,e("p",null,[t("A Bitcoin invoice address commits to a public key or script which defines who can spend the coin. It is specified in the output of a transaction, and it should only be used once. Wasabi uses the bech32 and bech32m format to encode native segregated witness addresses. Read more: "),a(i,{to:"/using-wasabi/Receive.html#bitcoin-public-keys-and-addresses"},{default:n(()=>[t("Bitcoin addresses")]),_:1})]),f,b,m,g,e("p",null,[t("Bitcoin Core consists of both "),y,t(" software for fully validating the blockchain as well as a Bitcoin wallet. The project also currently maintains related software such as the cryptography library libsecp256k1 and others located at GitHub. Read more: "),e("a",k,[t("Bitcoin Core Website"),a(o)])]),w,e("p",null,[t("Bitcoin Improvement Proposal. A design document for introducing features or information to Bitcoin. Read more: "),a(i,{to:"/using-wasabi/BIPs.html"},{default:n(()=>[t("Wasabi Supported BIPs")]),_:1})]),v,e("p",null,[t("Bitcoin Knots is a derivative of Bitcoin Core with a collection of improvements backported from and sometimes maintained outside of Core's master git tree. Since version 1.1.11, Wasabi has partial Bitcoin Knots integration. This means that it is possible (but not mandatory) to start Bitcoin Knots during the launch of Wasabi, without having to install or configure anything. Read more: "),e("a",x,[t("Bitcoin Knots Website"),a(o)])]),B,e("p",null,[t("In a transaction where the provided input coins are larger than the value sent to the destination address, then the leftover change is sent to a new address of the same wallet. Read more: "),a(i,{to:"/using-wasabi/ChangeCoins.html"},{default:n(()=>[t("Change coins")]),_:1})]),_,e("p",null,[t("Refers to keeping a reserve of important Bitcoin secrets offline. Cold storage is achieved when Bitcoin private keys are created and stored in a secure offline environment. Cold storage is important for anyone with bitcoin holdings. Online computers are vulnerable to hackers and should not be used to store a significant amount of bitcoin. Read more: "),a(i,{to:"/using-wasabi/ColdWasabi.html"},{default:n(()=>[t("Cold Wasabi Protocol")]),_:1})]),P,e("p",null,[t("Fungibility is a desirable property of Bitcoin UTXOs that are indistinguishable from each other. Read more: "),a(i,{to:"/why-wasabi/TransactionSurveillanceCompanies.html#attempt-to-destroy-fungibility"},{default:n(()=>[t("Transaction surveillance companies attempting to destroy fungibility")]),_:1})]),T,e("p",null,[t("A hardware wallet is a special type of Bitcoin wallet which generates and stores the user's private keys on a dedicated hardware device. Read more: "),a(i,{to:"/FAQ/FAQ-UseWasabi.html#hardware-wallet"},{default:n(()=>[t("Hardware Wallet FAQs")]),_:1})]),S,e("p",null,[t("The Bitcoin Mempool (memory pool) is a collection of all transaction data in a block that have been verified by Bitcoin nodes, but are not yet confirmed. Read more: "),a(i,{to:"/FAQ/FAQ-UseWasabi.html#how-does-wasabi-know-of-incoming-transactions-to-the-mempool"},{default:n(()=>[t("How does Wasabi know of incoming transactions to the mempool?")]),_:1})]),W,e("p",null,[t("Multisignature (m-of-n multisig) refers to requiring more than one key to authorize a Bitcoin transaction. Only with "),A,t(" signatures of "),C,t(" public keys can the bitcoin be spent. Read more: "),a(i,{to:"/FAQ/FAQ-UseWasabi.html#can-i-generate-a-multi-signature-script"},{default:n(()=>[t("Can I generate a multi signature script?")]),_:1})]),H,e("p",null,[t("PSBT is a binary transaction format which contains the information necessary for a signer to produce signatures for the transaction and holds the signatures for an input while the input does not have a complete set of signatures. The signer can be offline as all necessary information will be provided in the transaction. Read more: "),e("a",I,[t("BIP 174 Partially Signed Bitcoin Transaction Format"),a(o)])]),R,e("p",null,[t("The signature of a P2WPKH contains the same information as a Pay-to-Public-Key-Hash (P2PKH) spending, but is located in the witness field instead of the scriptSig field. The scriptPubKey is also modified. Read more: "),e("a",F,[t("BIP 84 derivation scheme for P2WPKH based accounts"),a(o)])]),K,e("p",null,[t("A private key is a large number that must be chosen at random, it is thus a very secure password and should be kept secret. With knowledge of this number, anyone can easily compute the public key, and a signature over any message. It can also be used to decrypt any message that was encrypted to the public key corresponding to the private key. In Bitcoin, a signature over a valid transaction message gives the right to spend a coin, thus knowledge of the private key corresponds to ownership of the bitcoin. Read more: "),a(i,{to:"/using-wasabi/Receive.html#bitcoin-public-keys-and-addresses"},{default:n(()=>[t("Bitcoin private keys")]),_:1})]),D,M,N,e("p",null,[t("A public key is calculated by multiplying the private key to the generator point of an elliptic curve. Given only the public key, the private key cannot be calculated. Anyone can encrypt a message using a public key. This encrypted message (cyphertext) can only be decrypted through the related private key. Given a public key and a signature over a message, anyone can verify that the signer had the private key and the message. In Bitcoin, the public key is the pseudonymous identity of the owner of a coin. Read more: "),a(i,{to:"/using-wasabi/Receive.html#bitcoin-public-keys-and-addresses"},{default:n(()=>[t("Bitcoin private keys")]),_:1})]),O,e("p",null,[t("Segregated Witness is a structure where the witness [signature or redeem script] is stored separately from the transaction Merkle tree. This is separated because the witness contains only data concerning transaction validity, but not about transaction effect. Read more: "),a(i,{to:"/FAQ/FAQ-UseWasabi.html#why-does-wasabi-only-use-segwit-bech32-addresses"},{default:n(()=>[t("Why Wasabi uses only SegWit")]),_:1})]),U,e("p",null,[t("Timechain is a synonym of "),a(i,{to:"/glossary/Glossary-GeneralBitcoin.html#blockchain"},{default:n(()=>[t("blockchain")]),_:1}),t(". It emphasizes the achievement of the Bitcoin protocol to establish consensus on the temporal order of transactions so to prevent double-spends.")]),G,Q,j,e("p",null,[t("A transaction has a fee payment to the miner who includes the transaction in a valid block. It is implied by the difference of "),q,t(". Read more: "),a(i,{to:"/FAQ/FAQ-UseWasabi.html#what-fee-should-i-select"},{default:n(()=>[t("What fee should I select?")]),_:1})]),z,e("p",null,[t("UTXO is an unspent transaction output that can be spent as an input in a new transaction. Read more: "),a(i,{to:"/FAQ/FAQ-UseWasabi.html#how-can-i-select-utxos-for-coinjoin"},{default:n(()=>[t("How can I select UTXOs for CoinJoin?")]),_:1})]),E,L])}const Z=l(d,[["render",V],["__file","Glossary-GeneralBitcoin.html.vue"]]),$=JSON.parse('{"path":"/glossary/Glossary-GeneralBitcoin.html","title":"Bitcoin in general","lang":"en-US","frontmatter":{"title":"Bitcoin in general","description":"Explanations of common words used in Wasabi and regarding Bitcoin privacy with links to the docs for more details. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Bitcoin in general","slug":"bitcoin-in-general","link":"#bitcoin-in-general","children":[{"level":3,"title":"Address","slug":"address","link":"#address","children":[]},{"level":3,"title":"Bitcoin","slug":"bitcoin","link":"#bitcoin","children":[]},{"level":3,"title":"Bitcoin Core","slug":"bitcoin-core","link":"#bitcoin-core","children":[]},{"level":3,"title":"Bitcoin Improvement Proposal (BIP)","slug":"bitcoin-improvement-proposal-bip","link":"#bitcoin-improvement-proposal-bip","children":[]},{"level":3,"title":"Bitcoin Knots","slug":"bitcoin-knots","link":"#bitcoin-knots","children":[]},{"level":3,"title":"Block","slug":"block","link":"#block","children":[]},{"level":3,"title":"Blockchain","slug":"blockchain","link":"#blockchain","children":[]},{"level":3,"title":"Change","slug":"change","link":"#change","children":[]},{"level":3,"title":"Child Pays For Parent (CPFP)","slug":"child-pays-for-parent-cpfp","link":"#child-pays-for-parent-cpfp","children":[]},{"level":3,"title":"Coinbase","slug":"coinbase","link":"#coinbase","children":[]},{"level":3,"title":"Coinbase Transaction","slug":"coinbase-transaction","link":"#coinbase-transaction","children":[]},{"level":3,"title":"Cold Storage","slug":"cold-storage","link":"#cold-storage","children":[]},{"level":3,"title":"Confirmations","slug":"confirmations","link":"#confirmations","children":[]},{"level":3,"title":"Consensus","slug":"consensus","link":"#consensus","children":[]},{"level":3,"title":"Consensus Rules","slug":"consensus-rules","link":"#consensus-rules","children":[]},{"level":3,"title":"Custodial (Wallet or Mixer)","slug":"custodial-wallet-or-mixer","link":"#custodial-wallet-or-mixer","children":[]},{"level":3,"title":"Difficulty","slug":"difficulty","link":"#difficulty","children":[]},{"level":3,"title":"Difficulty Retargeting (Difficulty Adjustment)","slug":"difficulty-retargeting-difficulty-adjustment","link":"#difficulty-retargeting-difficulty-adjustment","children":[]},{"level":3,"title":"Difficulty Target","slug":"difficulty-target","link":"#difficulty-target","children":[]},{"level":3,"title":"ECDSA","slug":"ecdsa","link":"#ecdsa","children":[]},{"level":3,"title":"Fork","slug":"fork","link":"#fork","children":[]},{"level":3,"title":"Full node","slug":"full-node","link":"#full-node","children":[]},{"level":3,"title":"Fungibility","slug":"fungibility","link":"#fungibility","children":[]},{"level":3,"title":"Genesis Block","slug":"genesis-block","link":"#genesis-block","children":[]},{"level":3,"title":"Hard Fork","slug":"hard-fork","link":"#hard-fork","children":[]},{"level":3,"title":"Hardware Wallet (HWW)","slug":"hardware-wallet-hww","link":"#hardware-wallet-hww","children":[]},{"level":3,"title":"Hash","slug":"hash","link":"#hash","children":[]},{"level":3,"title":"Hierarchical Deterministic (HD) Protocol","slug":"hierarchical-deterministic-hd-protocol","link":"#hierarchical-deterministic-hd-protocol","children":[]},{"level":3,"title":"Hierarchical Deterministic (HD) Wallet","slug":"hierarchical-deterministic-hd-wallet","link":"#hierarchical-deterministic-hd-wallet","children":[]},{"level":3,"title":"Hot Wallet","slug":"hot-wallet","link":"#hot-wallet","children":[]},{"level":3,"title":"Input","slug":"input","link":"#input","children":[]},{"level":3,"title":"Lightning Network (LN)","slug":"lightning-network-ln","link":"#lightning-network-ln","children":[]},{"level":3,"title":"Mainnet","slug":"mainnet","link":"#mainnet","children":[]},{"level":3,"title":"Mempool","slug":"mempool","link":"#mempool","children":[]},{"level":3,"title":"Merkle Root","slug":"merkle-root","link":"#merkle-root","children":[]},{"level":3,"title":"Merkle Tree","slug":"merkle-tree","link":"#merkle-tree","children":[]},{"level":3,"title":"Miner","slug":"miner","link":"#miner","children":[]},{"level":3,"title":"Mining Reward","slug":"mining-reward","link":"#mining-reward","children":[]},{"level":3,"title":"Multisignature (multisig)","slug":"multisignature-multisig","link":"#multisignature-multisig","children":[]},{"level":3,"title":"Non-Custodial (Wallet or Mixer)","slug":"non-custodial-wallet-or-mixer","link":"#non-custodial-wallet-or-mixer","children":[]},{"level":3,"title":"Nonce","slug":"nonce","link":"#nonce","children":[]},{"level":3,"title":"Off-chain Transaction","slug":"off-chain-transaction","link":"#off-chain-transaction","children":[]},{"level":3,"title":"Output","slug":"output","link":"#output","children":[]},{"level":3,"title":"P2PKH","slug":"p2pkh","link":"#p2pkh","children":[]},{"level":3,"title":"P2SH","slug":"p2sh","link":"#p2sh","children":[]},{"level":3,"title":"P2TR","slug":"p2tr","link":"#p2tr","children":[]},{"level":3,"title":"P2WPKH","slug":"p2wpkh","link":"#p2wpkh","children":[]},{"level":3,"title":"Paper Wallet","slug":"paper-wallet","link":"#paper-wallet","children":[]},{"level":3,"title":"Partially Signed Bitcoin Transaction (PSBT)","slug":"partially-signed-bitcoin-transaction-psbt","link":"#partially-signed-bitcoin-transaction-psbt","children":[]},{"level":3,"title":"Pay-to-Witness-Public-Key-Hash (P2WPKH)","slug":"pay-to-witness-public-key-hash-p2wpkh","link":"#pay-to-witness-public-key-hash-p2wpkh","children":[]},{"level":3,"title":"Payment Channels","slug":"payment-channels","link":"#payment-channels","children":[]},{"level":3,"title":"Plausible deniability","slug":"plausible-deniability","link":"#plausible-deniability","children":[]},{"level":3,"title":"Private Key","slug":"private-key","link":"#private-key","children":[]},{"level":3,"title":"Proof of Work (POW)","slug":"proof-of-work-pow","link":"#proof-of-work-pow","children":[]},{"level":3,"title":"Public Key","slug":"public-key","link":"#public-key","children":[]},{"level":3,"title":"Regtest","slug":"regtest","link":"#regtest","children":[]},{"level":3,"title":"Replace by Fee (RBF)","slug":"replace-by-fee-rbf","link":"#replace-by-fee-rbf","children":[]},{"level":3,"title":"satoshi (sat)","slug":"satoshi-sat","link":"#satoshi-sat","children":[]},{"level":3,"title":"Satoshi Nakamoto","slug":"satoshi-nakamoto","link":"#satoshi-nakamoto","children":[]},{"level":3,"title":"Schnorr Digital Signature Scheme","slug":"schnorr-digital-signature-scheme","link":"#schnorr-digital-signature-scheme","children":[]},{"level":3,"title":"Script","slug":"script","link":"#script","children":[]},{"level":3,"title":"ScriptPubKey","slug":"scriptpubkey","link":"#scriptpubkey","children":[]},{"level":3,"title":"ScriptSig","slug":"scriptsig","link":"#scriptsig","children":[]},{"level":3,"title":"Segregated Witness (SegWit)","slug":"segregated-witness-segwit","link":"#segregated-witness-segwit","children":[]},{"level":3,"title":"Simplified Payment Verification (SPV)","slug":"simplified-payment-verification-spv","link":"#simplified-payment-verification-spv","children":[]},{"level":3,"title":"Soft Fork","slug":"soft-fork","link":"#soft-fork","children":[]},{"level":3,"title":"Taproot","slug":"taproot","link":"#taproot","children":[]},{"level":3,"title":"Testnet","slug":"testnet","link":"#testnet","children":[]},{"level":3,"title":"Timechain","slug":"timechain","link":"#timechain","children":[]},{"level":3,"title":"Transaction","slug":"transaction","link":"#transaction","children":[]},{"level":3,"title":"Transaction Fees","slug":"transaction-fees","link":"#transaction-fees","children":[]},{"level":3,"title":"Unspent Transaction Output (UTXO)","slug":"unspent-transaction-output-utxo","link":"#unspent-transaction-output-utxo","children":[]},{"level":3,"title":"Wallet","slug":"wallet","link":"#wallet","children":[]}]}],"git":{"updatedTime":1720425186000},"filePathRelative":"glossary/Glossary-GeneralBitcoin.md"}');export{Z as comp,$ as data}; +import{_ as l,r,o as c,c as h,a as e,b as t,d as a,w as n,e as s}from"./app-CwImt2bI.js";const d={},p=e("h2",{id:"bitcoin-in-general",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#bitcoin-in-general"},[e("span",null,"Bitcoin in general")])],-1),u=e("h3",{id:"address",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#address"},[e("span",null,"Address")])],-1),f=e("h3",{id:"bitcoin",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#bitcoin"},[e("span",null,"Bitcoin")])],-1),b=e("p",null,"Bitcoin is a peer-to-peer electronic cash system. An innovative payment network and a new kind of money. It is a decentralized digital currency without a central bank or single administrator that can be sent from user to user on the peer-to-peer bitcoin blockchain network without the need for intermediaries.",-1),m=e("h3",{id:"bitcoin-core",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#bitcoin-core"},[e("span",null,"Bitcoin Core")])],-1),g=e("p",null,[t("Bitcoin Core is an open-source project which maintains and releases Bitcoin client software called "),e("code",null,"Bitcoin Core"),t(", considered to be Bitcoin's reference implementation. It is a direct descendant of the original Bitcoin software client released by Satoshi Nakamoto after he published the famous Bitcoin whitepaper.")],-1),y=e("code",null,"full-node",-1),k={href:"https://bitcoincore.org/",target:"_blank",rel:"noopener noreferrer"},w=e("h3",{id:"bitcoin-improvement-proposal-bip",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#bitcoin-improvement-proposal-bip"},[e("span",null,"Bitcoin Improvement Proposal (BIP)")])],-1),v=e("h3",{id:"bitcoin-knots",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#bitcoin-knots"},[e("span",null,"Bitcoin Knots")])],-1),x={href:"https://bitcoinknots.org/",target:"_blank",rel:"noopener noreferrer"},B=s('

    Block

    A block is a batch of valid Bitcoin transactions and its hash must be a value below a certain difficulty target to prove the work of the miner. Each block references the hash of the previous block, thus creating a hash chain of blocks. On average a new block is mined every 10 minutes.

    Blockchain

    The blockchain is the one chain of valid Bitcoin blocks with the most accumulated proof of work. It is an append-only data structure with new blocks being added on average every 10 minutes. Because of its uniquely verifiable and global consensus, it is a revolutionary standard for time, thus some call it timechain.

    Change

    ',5),_=s('

    Child Pays For Parent (CPFP)

    Child Pays For Parent (CPFP) is a fee bumping technique where a user spends an output from a low fee rate unconfirmed transaction in a child transaction with a high fee rate in order to encourage miners to include both transactions in a block.

    Coinbase

    A special field used as the sole input for coinbase transactions. The coinbase allows claiming the block reward and provides up to 100 bytes for arbitrary data.

    Coinbase Transaction

    The first transaction in a block. Always created by a miner, it includes a single coinbase.

    Cold Storage

    ',7),P=s('

    Confirmations

    Once a transaction is included in a block, it has one confirmation. As soon as another block is mined on the same blockchain, the transaction has two confirmations, and so on. Six or more confirmations is considered sufficient proof that a transaction cannot be reversed.

    Consensus

    When several nodes, usually most nodes on the network, all have the same blocks in their locally-validated best blockchain.

    Consensus Rules

    The block validation rules that full nodes follow to stay in consensus with other nodes.

    Custodial (Wallet or Mixer)

    A custodial wallet is any wallet where the private keys of your coins are in the hands of a third party. In essence, they operate similarly to traditional banks.

    A custodial mixer needs you to send your bitcoins to a central part before mixing. This means that you are at risk of being stolen from.

    Difficulty

    A network-wide setting that controls how much computation is required to produce a proof of work.

    Difficulty Retargeting (Difficulty Adjustment)

    A network-wide recalculation of the difficulty that occurs once every 2,016 blocks and considers the hashing power of the previous 2,016 blocks.

    Difficulty Target

    A difficulty at which all the computation in the network will find blocks approximately every 10 minutes. It specifies the numeric value the hash of a block must not be above to be considered a valid block.

    ECDSA

    ECDSA (Elliptic Curve Digital Signature Algorithm) is one of the digital signature algorithms used by Bitcoin to ensure that funds can only be spent by their rightful owners.

    Fork

    Fork, also known as accidental fork, occurs when two or more blocks have the same block height, forking the blockchain. Typically occurs when two or more miners find blocks at nearly the same time. Can also happen as part of an attack.

    Full node

    Any computer that connects to the Bitcoin network is called a node. Nodes that fully verify all of the rules of Bitcoin are called full nodes. Full nodes download every block and transaction and check them against Bitcoin's consensus rules.

    Fungibility

    ',22),T=s('

    Genesis Block

    The first block in the blockchain, used to initialize the cryptocurrency.

    Hard Fork

    Hard fork, also known as hard-forking change, is a permanent divergence in the blockchain, it occurs when non-upgraded nodes can not validate blocks created by upgraded nodes that follow newer consensus rules. The upgraded nodes break the rules of the legacy nodes. Not to be confused with fork, soft fork, software fork or Git fork.

    Hardware Wallet (HWW)

    ',5),S=s('

    Hash

    A cryptographic hash function takes any input of arbitrary size [the message] and computes a value of fixed size that is unique to the input, which is called a hash or a digest. If one bit of the input changes, the output will be completely different [avalanche effect]. And there are no two messages that result in the same hash [collision resistance]. The only way to get any given input, is by computing all possible inputs, it is a one-way function [pre-image resistance]. Bitcoin uses the SHA256 in many parts of the protocol.

    Hierarchical Deterministic (HD) Protocol

    The Hierarchical Deterministic key creation and transfer protocol (BIP32), which allows creating child keys from parent keys in a hierarchy.

    Hierarchical Deterministic (HD) Wallet

    Wallets using the Hierarchical Deterministic Protocol key creation and transfer protocol (BIP32).

    Hot Wallet

    A hot wallet is a software wallet that runs on a device which is connected to the Internet. Wasabi is a hot wallet by default.

    Input

    Input, transaction input, or TxIn is an input in a Bitcoin transaction which contains two fields: a unique transaction hash and an index number, which references one utxo of a previous transaction which is spent in this transaction.

    Lightning Network (LN)

    Lightning Network is a proposed implementation of Hashed Timelock Contracts (HTLCs) with bi-directional payment channels which allows payments to be securely routed across multiple peer-to-peer payment channels. This allows the formation of a network where any peer on the network can pay any other peer even if they don't directly have a channel open between each other.

    Mainnet

    The original and main network for Bitcoin transactions, where satoshis have real economic value.

    Mempool

    ',15),W=s('

    Merkle Root

    The root node of a merkle tree, a descendant of all the hashed pairs in the tree. Block headers must include a valid merkle root descended from all transactions in that block.

    Merkle Tree

    A tree constructed by hashing paired data (the leaves), then pairing and hashing the results until a single hash remains, the merkle root. In Bitcoin, the leaves are almost always transactions from a single block.

    Miner

    A Bitcoin user that attempts to find valid proof of work for new candidate blocks, by repeated hashing until the difficulty target is met.

    Mining Reward

    An amount of satoshis included in each new block as a reward by the network to the miner who found the proof of work solution. Initially it was 50 bitcoin per block, which is halved every 210 000 blocks, or roughly 4 years. This leads to a total money supply of just below 21 million bitcoin.

    Multisignature (multisig)

    ',9),A=e("code",null,"m",-1),C=e("code",null,"n",-1),H=s('

    Non-Custodial (Wallet or Mixer)

    A non-custodial wallet is any wallet where the private keys of your coins are in your hands. Non-custodial wallets give you full control over your bitcoins.

    A non-custodial mixer like Wasabi eliminates the risk that the coordinator can steal your bitcoin. Each participant verifies the proposed transaction, and signs it only if it is valid. This signature is only valid for this transaction, so any attempt to change the transaction after the fact is futile. The funds will always be in a Bitcoin address that you control.

    Nonce

    The nonce in a Bitcoin block is a 32-bit (4-byte) field whose value is set so that the hash of the block will contain a run of leading zeros. The rest of the fields may not be changed, as they have a defined meaning.

    Off-chain Transaction

    An off-chain transaction is the movement of value outside of the blockchain. While an on-chain transaction - usually referred to as simply a transaction - modifies the blockchain and depends on the blockchain to determine its validity. An off-chain transaction relies on other methods to record and validate the transaction.

    Output

    Output, transaction output, or TxOut is an output in a Bitcoin transaction which contains two fields: a value field for transferring zero or more satoshis and a pubkey script for indicating what conditions must be fulfilled for those satoshis to be further spent.

    P2PKH

    Many transactions processed on the Bitcoin network spend outputs locked with a Pay-to-Public-Key-Hash or P2PKH script. These outputs contain a locking script that locks the output to a public key hash, more commonly known as a Bitcoin address. An output locked by a P2PKH script can be unlocked (spent) by presenting a public key and a digital signature created by the corresponding private key.

    P2SH

    P2SH or Pay-to-Script-Hash is a type of transaction that simplifies the use of complex transaction scripts. With P2SH the complex script that details the spending conditions (redeem script) is committed to with a hash in the locking script.

    P2TR

    A pay-to-taproot (P2TR), also known as a Taproot or Bech32m address, is the most recent and advanced bitcoin address format. Taproot introduces more advanced security, privacy, flexibility and scaling to bitcoin.

    P2WPKH

    The signature of a P2WPKH (Pay-to-Witness-Public-Key-Hash) contains the same information as a P2PKH spending, but is located in the witness field instead of the scriptSig field.

    Paper Wallet

    In the most specific sense, a paper wallet is a document containing all the secrets to spend a Bitcoin UTXO. It is a way of storing bitcoin offline as a physical document.

    Partially Signed Bitcoin Transaction (PSBT)

    ',20),I={href:"https://github.com/bitcoin/bips/blob/master/bip-0174.mediawiki",target:"_blank",rel:"noopener noreferrer"},R=e("h3",{id:"pay-to-witness-public-key-hash-p2wpkh",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#pay-to-witness-public-key-hash-p2wpkh"},[e("span",null,"Pay-to-Witness-Public-Key-Hash (P2WPKH)")])],-1),F={href:"https://github.com/bitcoin/bips/blob/master/bip-0084.mediawiki",target:"_blank",rel:"noopener noreferrer"},K=s('

    Payment Channels

    A payment channel is class of techniques designed to allow users to make multiple Bitcoin transactions without committing all of the transactions to the Bitcoin blockchain. In a typical payment channel, only two transactions are added to the blockchain, one funding and one closing transaction, but a nearly unlimited number of payments can be made between the participants.

    Plausible deniability

    Plausible deniability is the ability to deny knowledge of or responsibility for any damnable actions committed by others in an organizational hierarchy because of a lack of evidence that can confirm their participation, even if they were personally involved in or at least willfully ignorant of the actions.

    Private Key

    ',5),D=e("h3",{id:"proof-of-work-pow",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#proof-of-work-pow"},[e("span",null,"Proof of Work (POW)")])],-1),M=e("p",null,"One of the requirements for a Bitcoin block to be valid is its hash should be below a certain difficulty target. In order to create a valid block, a miner must repeatedly hash a candidate block with a changing nonce until by sheer luck he finds a hash with low value. By providing this pre-image block, anyone can verify the amount of computational energy that a miner on average should have invested in order to find this block, and this is what is known as Proof of Work.",-1),N=e("h3",{id:"public-key",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#public-key"},[e("span",null,"Public Key")])],-1),O=s('

    Regtest

    A local testing environment in which developers can instantly generate blocks on demand for testing events, and can create private satoshis with no real-world value.

    Replace by Fee (RBF)

    Replacing one version of an unconfirmed transaction with a different version of the transaction that pays a higher transaction fee.

    satoshi (sat)

    A satoshi is the smallest denomination of bitcoin that can be recorded on the blockchain. It is the equivalent of 0.00000001 bitcoin and is named after the creator of Bitcoin, Satoshi Nakamoto.

    Satoshi Nakamoto

    Satoshi Nakamoto is the name used by the person or group of people who designed Bitcoin and created its original reference implementation. As a part of the implementation, they also devised the first blockchain database. In the process they were the first to solve the double-spending problem for digital currency in a decentralized and self verifying nature. Their real identity remains unknown.

    Schnorr Digital Signature Scheme

    Schnorr Digital Signature Scheme is one of the digital signature algorithms used by Bitcoin to ensure that funds can only be spent by their rightful owners. Schnorr signatures and public keys can be aggregated, meaning that multiple parties with unique private keys can sign the same message, which can be verified in batches instead of individually.

    Script

    Bitcoin uses a scripting system for transactions. Forth-like, Script is simple, stack-based and processed from left to right. It is purposefully not Turing-complete, with no loops.

    ScriptPubKey

    ScriptPubKey or pubkey script, is a script included in outputs which sets the conditions that must be fulfilled for those satoshis to be spent. Data for fulfilling the conditions can be provided in a signature script.

    ScriptSig

    ScriptSig or signature script, is the data generated by a spender which is almost always used as variables to satisfy a pubkey script.

    Segregated Witness (SegWit)

    ',17),U=s('

    Simplified Payment Verification (SPV)

    SPV is a method for verifying particular transactions were included in a block without downloading the entire block. The method is used by some lightweight Bitcoin clients.

    Soft Fork

    A soft fork is a change to the Bitcoin consensus rules that is backwards compatible. Users of this update do not break the rules of legacy users, but rather restrict themselves to a more narrow rule set.

    Taproot

    Taproot is an upgrade to Bitcoin which introduces several new features. Taproot integrates the Schnorr digital signature scheme into Bitcoin, upgrading Bitcoin’s core cryptography. Taproot builds on the SegWit upgrade to improve Bitcoin’s privacy and lower transaction fees. Taproot makes future Bitcoin upgrades easier by reforming Bitcoin’s scripting language.

    Testnet

    A testing environment in which users can obtain and spend satoshis that have no real-world value on a global network that is very similar to the Bitcoin mainnet.

    Timechain

    ',9),G=e("h3",{id:"transaction",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#transaction"},[e("span",null,"Transaction")])],-1),Q=e("p",null,"In simple terms, a transfer of bitcoin. More precisely, a transaction is a signed data structure expressing a transfer of value and consisting mainly of inputs and outputs. Transactions are transmitted over the Bitcoin network, collected by miners, and included into blocks, made permanent on the blockchain.",-1),j=e("h3",{id:"transaction-fees",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#transaction-fees"},[e("span",null,"Transaction Fees")])],-1),q=e("code",null,"inputs - outputs",-1),z=e("h3",{id:"unspent-transaction-output-utxo",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#unspent-transaction-output-utxo"},[e("span",null,"Unspent Transaction Output (UTXO)")])],-1),E=e("h3",{id:"wallet",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#wallet"},[e("span",null,"Wallet")])],-1),L=e("p",null,"Software that holds all your Bitcoin addresses and secret keys. Use it to send, receive, and store your bitcoin.",-1);function V(X,J){const i=r("RouteLink"),o=r("ExternalLinkIcon");return c(),h("div",null,[p,u,e("p",null,[t("A Bitcoin invoice address commits to a public key or script which defines who can spend the coin. It is specified in the output of a transaction, and it should only be used once. Wasabi uses the bech32 and bech32m format to encode native segregated witness addresses. Read more: "),a(i,{to:"/using-wasabi/Receive.html#bitcoin-public-keys-and-addresses"},{default:n(()=>[t("Bitcoin addresses")]),_:1})]),f,b,m,g,e("p",null,[t("Bitcoin Core consists of both "),y,t(" software for fully validating the blockchain as well as a Bitcoin wallet. The project also currently maintains related software such as the cryptography library libsecp256k1 and others located at GitHub. Read more: "),e("a",k,[t("Bitcoin Core Website"),a(o)])]),w,e("p",null,[t("Bitcoin Improvement Proposal. A design document for introducing features or information to Bitcoin. Read more: "),a(i,{to:"/using-wasabi/BIPs.html"},{default:n(()=>[t("Wasabi Supported BIPs")]),_:1})]),v,e("p",null,[t("Bitcoin Knots is a derivative of Bitcoin Core with a collection of improvements backported from and sometimes maintained outside of Core's master git tree. Since version 1.1.11, Wasabi has partial Bitcoin Knots integration. This means that it is possible (but not mandatory) to start Bitcoin Knots during the launch of Wasabi, without having to install or configure anything. Read more: "),e("a",x,[t("Bitcoin Knots Website"),a(o)])]),B,e("p",null,[t("In a transaction where the provided input coins are larger than the value sent to the destination address, then the leftover change is sent to a new address of the same wallet. Read more: "),a(i,{to:"/using-wasabi/ChangeCoins.html"},{default:n(()=>[t("Change coins")]),_:1})]),_,e("p",null,[t("Refers to keeping a reserve of important Bitcoin secrets offline. Cold storage is achieved when Bitcoin private keys are created and stored in a secure offline environment. Cold storage is important for anyone with bitcoin holdings. Online computers are vulnerable to hackers and should not be used to store a significant amount of bitcoin. Read more: "),a(i,{to:"/using-wasabi/ColdWasabi.html"},{default:n(()=>[t("Cold Wasabi Protocol")]),_:1})]),P,e("p",null,[t("Fungibility is a desirable property of Bitcoin UTXOs that are indistinguishable from each other. Read more: "),a(i,{to:"/why-wasabi/TransactionSurveillanceCompanies.html#attempt-to-destroy-fungibility"},{default:n(()=>[t("Transaction surveillance companies attempting to destroy fungibility")]),_:1})]),T,e("p",null,[t("A hardware wallet is a special type of Bitcoin wallet which generates and stores the user's private keys on a dedicated hardware device. Read more: "),a(i,{to:"/FAQ/FAQ-UseWasabi.html#hardware-wallet"},{default:n(()=>[t("Hardware Wallet FAQs")]),_:1})]),S,e("p",null,[t("The Bitcoin Mempool (memory pool) is a collection of all transaction data in a block that have been verified by Bitcoin nodes, but are not yet confirmed. Read more: "),a(i,{to:"/FAQ/FAQ-UseWasabi.html#how-does-wasabi-know-of-incoming-transactions-to-the-mempool"},{default:n(()=>[t("How does Wasabi know of incoming transactions to the mempool?")]),_:1})]),W,e("p",null,[t("Multisignature (m-of-n multisig) refers to requiring more than one key to authorize a Bitcoin transaction. Only with "),A,t(" signatures of "),C,t(" public keys can the bitcoin be spent. Read more: "),a(i,{to:"/FAQ/FAQ-UseWasabi.html#can-i-generate-a-multi-signature-script"},{default:n(()=>[t("Can I generate a multi signature script?")]),_:1})]),H,e("p",null,[t("PSBT is a binary transaction format which contains the information necessary for a signer to produce signatures for the transaction and holds the signatures for an input while the input does not have a complete set of signatures. The signer can be offline as all necessary information will be provided in the transaction. Read more: "),e("a",I,[t("BIP 174 Partially Signed Bitcoin Transaction Format"),a(o)])]),R,e("p",null,[t("The signature of a P2WPKH contains the same information as a Pay-to-Public-Key-Hash (P2PKH) spending, but is located in the witness field instead of the scriptSig field. The scriptPubKey is also modified. Read more: "),e("a",F,[t("BIP 84 derivation scheme for P2WPKH based accounts"),a(o)])]),K,e("p",null,[t("A private key is a large number that must be chosen at random, it is thus a very secure password and should be kept secret. With knowledge of this number, anyone can easily compute the public key, and a signature over any message. It can also be used to decrypt any message that was encrypted to the public key corresponding to the private key. In Bitcoin, a signature over a valid transaction message gives the right to spend a coin, thus knowledge of the private key corresponds to ownership of the bitcoin. Read more: "),a(i,{to:"/using-wasabi/Receive.html#bitcoin-public-keys-and-addresses"},{default:n(()=>[t("Bitcoin private keys")]),_:1})]),D,M,N,e("p",null,[t("A public key is calculated by multiplying the private key to the generator point of an elliptic curve. Given only the public key, the private key cannot be calculated. Anyone can encrypt a message using a public key. This encrypted message (cyphertext) can only be decrypted through the related private key. Given a public key and a signature over a message, anyone can verify that the signer had the private key and the message. In Bitcoin, the public key is the pseudonymous identity of the owner of a coin. Read more: "),a(i,{to:"/using-wasabi/Receive.html#bitcoin-public-keys-and-addresses"},{default:n(()=>[t("Bitcoin private keys")]),_:1})]),O,e("p",null,[t("Segregated Witness is a structure where the witness [signature or redeem script] is stored separately from the transaction Merkle tree. This is separated because the witness contains only data concerning transaction validity, but not about transaction effect. Read more: "),a(i,{to:"/FAQ/FAQ-UseWasabi.html#why-does-wasabi-only-use-segwit-bech32-addresses"},{default:n(()=>[t("Why Wasabi uses only SegWit")]),_:1})]),U,e("p",null,[t("Timechain is a synonym of "),a(i,{to:"/glossary/Glossary-GeneralBitcoin.html#blockchain"},{default:n(()=>[t("blockchain")]),_:1}),t(". It emphasizes the achievement of the Bitcoin protocol to establish consensus on the temporal order of transactions so to prevent double-spends.")]),G,Q,j,e("p",null,[t("A transaction has a fee payment to the miner who includes the transaction in a valid block. It is implied by the difference of "),q,t(". Read more: "),a(i,{to:"/FAQ/FAQ-UseWasabi.html#what-fee-should-i-select"},{default:n(()=>[t("What fee should I select?")]),_:1})]),z,e("p",null,[t("UTXO is an unspent transaction output that can be spent as an input in a new transaction. Read more: "),a(i,{to:"/FAQ/FAQ-UseWasabi.html#how-can-i-select-utxos-for-coinjoin"},{default:n(()=>[t("How can I select UTXOs for CoinJoin?")]),_:1})]),E,L])}const Z=l(d,[["render",V],["__file","Glossary-GeneralBitcoin.html.vue"]]),$=JSON.parse('{"path":"/glossary/Glossary-GeneralBitcoin.html","title":"Bitcoin in general","lang":"en-US","frontmatter":{"title":"Bitcoin in general","description":"Explanations of common words used in Wasabi and regarding Bitcoin privacy with links to the docs for more details. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Bitcoin in general","slug":"bitcoin-in-general","link":"#bitcoin-in-general","children":[{"level":3,"title":"Address","slug":"address","link":"#address","children":[]},{"level":3,"title":"Bitcoin","slug":"bitcoin","link":"#bitcoin","children":[]},{"level":3,"title":"Bitcoin Core","slug":"bitcoin-core","link":"#bitcoin-core","children":[]},{"level":3,"title":"Bitcoin Improvement Proposal (BIP)","slug":"bitcoin-improvement-proposal-bip","link":"#bitcoin-improvement-proposal-bip","children":[]},{"level":3,"title":"Bitcoin Knots","slug":"bitcoin-knots","link":"#bitcoin-knots","children":[]},{"level":3,"title":"Block","slug":"block","link":"#block","children":[]},{"level":3,"title":"Blockchain","slug":"blockchain","link":"#blockchain","children":[]},{"level":3,"title":"Change","slug":"change","link":"#change","children":[]},{"level":3,"title":"Child Pays For Parent (CPFP)","slug":"child-pays-for-parent-cpfp","link":"#child-pays-for-parent-cpfp","children":[]},{"level":3,"title":"Coinbase","slug":"coinbase","link":"#coinbase","children":[]},{"level":3,"title":"Coinbase Transaction","slug":"coinbase-transaction","link":"#coinbase-transaction","children":[]},{"level":3,"title":"Cold Storage","slug":"cold-storage","link":"#cold-storage","children":[]},{"level":3,"title":"Confirmations","slug":"confirmations","link":"#confirmations","children":[]},{"level":3,"title":"Consensus","slug":"consensus","link":"#consensus","children":[]},{"level":3,"title":"Consensus Rules","slug":"consensus-rules","link":"#consensus-rules","children":[]},{"level":3,"title":"Custodial (Wallet or Mixer)","slug":"custodial-wallet-or-mixer","link":"#custodial-wallet-or-mixer","children":[]},{"level":3,"title":"Difficulty","slug":"difficulty","link":"#difficulty","children":[]},{"level":3,"title":"Difficulty Retargeting (Difficulty Adjustment)","slug":"difficulty-retargeting-difficulty-adjustment","link":"#difficulty-retargeting-difficulty-adjustment","children":[]},{"level":3,"title":"Difficulty Target","slug":"difficulty-target","link":"#difficulty-target","children":[]},{"level":3,"title":"ECDSA","slug":"ecdsa","link":"#ecdsa","children":[]},{"level":3,"title":"Fork","slug":"fork","link":"#fork","children":[]},{"level":3,"title":"Full node","slug":"full-node","link":"#full-node","children":[]},{"level":3,"title":"Fungibility","slug":"fungibility","link":"#fungibility","children":[]},{"level":3,"title":"Genesis Block","slug":"genesis-block","link":"#genesis-block","children":[]},{"level":3,"title":"Hard Fork","slug":"hard-fork","link":"#hard-fork","children":[]},{"level":3,"title":"Hardware Wallet (HWW)","slug":"hardware-wallet-hww","link":"#hardware-wallet-hww","children":[]},{"level":3,"title":"Hash","slug":"hash","link":"#hash","children":[]},{"level":3,"title":"Hierarchical Deterministic (HD) Protocol","slug":"hierarchical-deterministic-hd-protocol","link":"#hierarchical-deterministic-hd-protocol","children":[]},{"level":3,"title":"Hierarchical Deterministic (HD) Wallet","slug":"hierarchical-deterministic-hd-wallet","link":"#hierarchical-deterministic-hd-wallet","children":[]},{"level":3,"title":"Hot Wallet","slug":"hot-wallet","link":"#hot-wallet","children":[]},{"level":3,"title":"Input","slug":"input","link":"#input","children":[]},{"level":3,"title":"Lightning Network (LN)","slug":"lightning-network-ln","link":"#lightning-network-ln","children":[]},{"level":3,"title":"Mainnet","slug":"mainnet","link":"#mainnet","children":[]},{"level":3,"title":"Mempool","slug":"mempool","link":"#mempool","children":[]},{"level":3,"title":"Merkle Root","slug":"merkle-root","link":"#merkle-root","children":[]},{"level":3,"title":"Merkle Tree","slug":"merkle-tree","link":"#merkle-tree","children":[]},{"level":3,"title":"Miner","slug":"miner","link":"#miner","children":[]},{"level":3,"title":"Mining Reward","slug":"mining-reward","link":"#mining-reward","children":[]},{"level":3,"title":"Multisignature (multisig)","slug":"multisignature-multisig","link":"#multisignature-multisig","children":[]},{"level":3,"title":"Non-Custodial (Wallet or Mixer)","slug":"non-custodial-wallet-or-mixer","link":"#non-custodial-wallet-or-mixer","children":[]},{"level":3,"title":"Nonce","slug":"nonce","link":"#nonce","children":[]},{"level":3,"title":"Off-chain Transaction","slug":"off-chain-transaction","link":"#off-chain-transaction","children":[]},{"level":3,"title":"Output","slug":"output","link":"#output","children":[]},{"level":3,"title":"P2PKH","slug":"p2pkh","link":"#p2pkh","children":[]},{"level":3,"title":"P2SH","slug":"p2sh","link":"#p2sh","children":[]},{"level":3,"title":"P2TR","slug":"p2tr","link":"#p2tr","children":[]},{"level":3,"title":"P2WPKH","slug":"p2wpkh","link":"#p2wpkh","children":[]},{"level":3,"title":"Paper Wallet","slug":"paper-wallet","link":"#paper-wallet","children":[]},{"level":3,"title":"Partially Signed Bitcoin Transaction (PSBT)","slug":"partially-signed-bitcoin-transaction-psbt","link":"#partially-signed-bitcoin-transaction-psbt","children":[]},{"level":3,"title":"Pay-to-Witness-Public-Key-Hash (P2WPKH)","slug":"pay-to-witness-public-key-hash-p2wpkh","link":"#pay-to-witness-public-key-hash-p2wpkh","children":[]},{"level":3,"title":"Payment Channels","slug":"payment-channels","link":"#payment-channels","children":[]},{"level":3,"title":"Plausible deniability","slug":"plausible-deniability","link":"#plausible-deniability","children":[]},{"level":3,"title":"Private Key","slug":"private-key","link":"#private-key","children":[]},{"level":3,"title":"Proof of Work (POW)","slug":"proof-of-work-pow","link":"#proof-of-work-pow","children":[]},{"level":3,"title":"Public Key","slug":"public-key","link":"#public-key","children":[]},{"level":3,"title":"Regtest","slug":"regtest","link":"#regtest","children":[]},{"level":3,"title":"Replace by Fee (RBF)","slug":"replace-by-fee-rbf","link":"#replace-by-fee-rbf","children":[]},{"level":3,"title":"satoshi (sat)","slug":"satoshi-sat","link":"#satoshi-sat","children":[]},{"level":3,"title":"Satoshi Nakamoto","slug":"satoshi-nakamoto","link":"#satoshi-nakamoto","children":[]},{"level":3,"title":"Schnorr Digital Signature Scheme","slug":"schnorr-digital-signature-scheme","link":"#schnorr-digital-signature-scheme","children":[]},{"level":3,"title":"Script","slug":"script","link":"#script","children":[]},{"level":3,"title":"ScriptPubKey","slug":"scriptpubkey","link":"#scriptpubkey","children":[]},{"level":3,"title":"ScriptSig","slug":"scriptsig","link":"#scriptsig","children":[]},{"level":3,"title":"Segregated Witness (SegWit)","slug":"segregated-witness-segwit","link":"#segregated-witness-segwit","children":[]},{"level":3,"title":"Simplified Payment Verification (SPV)","slug":"simplified-payment-verification-spv","link":"#simplified-payment-verification-spv","children":[]},{"level":3,"title":"Soft Fork","slug":"soft-fork","link":"#soft-fork","children":[]},{"level":3,"title":"Taproot","slug":"taproot","link":"#taproot","children":[]},{"level":3,"title":"Testnet","slug":"testnet","link":"#testnet","children":[]},{"level":3,"title":"Timechain","slug":"timechain","link":"#timechain","children":[]},{"level":3,"title":"Transaction","slug":"transaction","link":"#transaction","children":[]},{"level":3,"title":"Transaction Fees","slug":"transaction-fees","link":"#transaction-fees","children":[]},{"level":3,"title":"Unspent Transaction Output (UTXO)","slug":"unspent-transaction-output-utxo","link":"#unspent-transaction-output-utxo","children":[]},{"level":3,"title":"Wallet","slug":"wallet","link":"#wallet","children":[]}]}],"git":{"updatedTime":1720425980000},"filePathRelative":"glossary/Glossary-GeneralBitcoin.md"}');export{Z as comp,$ as data}; diff --git a/assets/Glossary-PrivacyWasabi.html-BiXCt2At.js b/assets/Glossary-PrivacyWasabi.html-DqfNKkbh.js similarity index 99% rename from assets/Glossary-PrivacyWasabi.html-BiXCt2At.js rename to assets/Glossary-PrivacyWasabi.html-DqfNKkbh.js index cd87653a4..447ca8547 100644 --- a/assets/Glossary-PrivacyWasabi.html-BiXCt2At.js +++ b/assets/Glossary-PrivacyWasabi.html-DqfNKkbh.js @@ -1 +1 @@ -import{_ as r,r as l,o as c,c as h,a as e,b as n,d as i,w as a,e as s}from"./app-3S7gIoGc.js";const d={},u=s('

    Privacy and Wasabi

    #twoweeks

    The #twoweeks is a fun inside joke often used in the Wasabi documentation and, more generally, in the Internet community. In the case of Wasabi documentation, it usually indicates the arrival of a new function or update, to which the future date is still uncertain.

    E.g. "Lightning Network is coming to Wasabi in #twoweeks"

    Absolute min input count

    The client will refuse to participate in coinjoin rounds with a minimum input count lower than this value. The default value is 21.

    Address Reuse

    ',7),p=e("h3",{id:"anonymity-score-anonscore",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#anonymity-score-anonscore"},[e("span",null,"Anonymity Score (anonscore)")])],-1),m=e("h3",{id:"anonymity-set-anonset",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#anonymity-set-anonset"},[e("span",null,"Anonymity Set (anonset)")])],-1),b=e("h3",{id:"auto-start-coinjoin-pleb-stop-threshold",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#auto-start-coinjoin-pleb-stop-threshold"},[e("span",null,"Auto-start coinjoin (Pleb Stop) threshold")])],-1),f=e("p",null,[n("The auto-start coinjoin threshold, a.k.a Pleb Stop, is the minimum wallet balance at which coinjoin will automatically start/continue. The amount can be changed in the "),e("em",null,"Coinjoin Settings"),n(" ("),e("em",null,"Auto-start coinjoin threshold"),n(" setting), the default is 0.01 BTC.")],-1),y=e("h3",{id:"backend",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#backend"},[e("span",null,"Backend")])],-1),w={href:"https://www.merriam-webster.com/dictionary/back%20end",target:"_blank",rel:"noopener noreferrer"},g=e("h3",{id:"block-filters",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#block-filters"},[e("span",null,"Block filters")])],-1),k={href:"https://github.com/bitcoin/bips/blob/master/bip-0158.mediawiki",target:"_blank",rel:"noopener noreferrer"},v=e("h3",{id:"blockchain-analysis",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#blockchain-analysis"},[e("span",null,"Blockchain Analysis")])],-1),_=e("h3",{id:"bloom-filter",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#bloom-filter"},[e("span",null,"Bloom Filter")])],-1),x={href:"https://github.com/bitcoin/bips/blob/master/bip-0037.mediawiki",target:"_blank",rel:"noopener noreferrer"},C=e("h3",{id:"change-address-detection",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#change-address-detection"},[e("span",null,"Change Address Detection")])],-1),j=e("h3",{id:"chaumian-coinjoin",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#chaumian-coinjoin"},[e("span",null,"Chaumian CoinJoin")])],-1),T=e("h3",{id:"client",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#client"},[e("span",null,"Client")])],-1),W={href:"https://www.merriam-webster.com/dictionary/client",target:"_blank",rel:"noopener noreferrer"},A=e("h3",{id:"cluster",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#cluster"},[e("span",null,"Cluster")])],-1),R=e("h3",{id:"coin-control",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#coin-control"},[e("span",null,"Coin Control")])],-1),P=e("h3",{id:"coinjoin-cj",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#coinjoin-cj"},[e("span",null,"CoinJoin (CJ)")])],-1),S=e("h3",{id:"coinjoin-strategy",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#coinjoin-strategy"},[e("span",null,"Coinjoin Strategy")])],-1),B=e("em",null,"Coinjoin Strategy",-1),F=e("h3",{id:"coinjoin-time-preference",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#coinjoin-time-preference"},[e("span",null,"Coinjoin Time Preference")])],-1),I=e("p",null,"The wallet will only participate in coinjoin when the fee rate is below the median of the chosen time frame (Hours, Days, Weeks, or Months).",-1),J=e("p",null,[n("("),e("em",null,"FeeRateMedianTimeFrameHours"),n(" in the wallet file)")],-1),Q=e("h3",{id:"coinjoined-coins",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#coinjoined-coins"},[e("span",null,"CoinJoined coins")])],-1),U=e("h3",{id:"common-input-ownership-heuristic",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#common-input-ownership-heuristic"},[e("span",null,"Common-Input-Ownership heuristic")])],-1),M=e("p",null,"This is a heuristic or assumption which says that if a transaction has more than one input then all those inputs are owned by the same entity.",-1),D=e("h3",{id:"coordinator",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#coordinator"},[e("span",null,"Coordinator")])],-1),L=e("h3",{id:"daemon",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#daemon"},[e("span",null,"Daemon")])],-1),E=e("h3",{id:"discreet-mode",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#discreet-mode"},[e("span",null,"Discreet Mode")])],-1),O=e("h3",{id:"dust",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#dust"},[e("span",null,"Dust")])],-1),z=e("code",null,"forced address reuse attack",-1),K=e("h3",{id:"know-your-customer-kyc",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#know-your-customer-kyc"},[e("span",null,"Know Your Customer (KYC)")])],-1),G=e("h3",{id:"label",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#label"},[e("span",null,"Label")])],-1),q=s('

    Max Coordination Fee Rate

    The maximum coordination fee rate the client is willing to accept to participate into a round. The default value is 0.

    Max Coinjoin Mining Fee Rate

    The maximum mining fee rate in sat/vByte the client is willing to pay to participate into a round. The default value is 150.

    Observers

    ',5),N=s('

    Pay to EndPoint (P2EP)

    Pay to EndPoint is when the receiver is reachable over the internet and the sender communicates with the receiver to coordinate a more advanced transaction. The Tor onion service, IP address or domain of the receiver is included in a BIP21 Bitcoin URI payment link.

    Peers

    Peers in our documentation refers mainly to Bitcoin and Wasabi Wallet users, but it also means people. They are literally peers in the network, or in the CoinJoin.

    RPC

    ',5),Y=e("h3",{id:"safety-coinjoin",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#safety-coinjoin"},[e("span",null,"Safety coinjoin")])],-1),X=e("p",null,[n("Safety coinjoin is a concept for doing an extra coinjoin after a user registers only "),e("em",null,"anonymity score"),n(" 1 (non-private) coins in their first round.")],-1),H={href:"https://github.com/WalletWasabi/WalletWasabi/releases/tag/v2.0.6",target:"_blank",rel:"noopener noreferrer"},V=e("h3",{id:"taint",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#taint"},[e("span",null,"Taint")])],-1),Z=e("h3",{id:"the-onion-router-tor",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#the-onion-router-tor"},[e("span",null,"The Onion Router (Tor)")])],-1),$=e("h3",{id:"transaction-surveillance-company",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#transaction-surveillance-company"},[e("span",null,"Transaction Surveillance Company")])],-1),ee=e("h3",{id:"tumbling-tumbler",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#tumbling-tumbler"},[e("span",null,"Tumbling / Tumbler")])],-1),ne=e("p",null,"Tumbling is a synonym of 'Mixing'. Similarly, Tumbler is the synonym of 'Mixer'.",-1),ie=e("h3",{id:"turbosync",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#turbosync"},[e("span",null,"TurboSync")])],-1),te=e("h3",{id:"wabisabi",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#wabisabi"},[e("span",null,"WabiSabi")])],-1),ae={href:"https://github.com/zkSNACKs/WabiSabi/releases/latest/download/WabiSabi.pdf",target:"_blank",rel:"noopener noreferrer"},oe=s('

    Wallet fingerprinting

    A careful analyst sometimes deduces which software created a certain transaction, because many different wallet softwares don't always create transactions in exactly the same way.

    Wasabika

    Wasabikas are builders, users and supporters of Wasabi in general.

    XPUB (Extended Public Key)

    An xpub, also known as Extended Public Key, is a part of BIP-32 that will allow you to observe your wallet without the private key (xpriv).

    ',7);function se(le,re){const t=l("RouteLink"),o=l("ExternalLinkIcon");return c(),h("div",null,[u,e("p",null,[n("Address reuse refers to the use of the same address for multiple transactions, this is very bad for privacy. Read more: "),i(t,{to:"/why-wasabi/AddressReuse.html"},{default:a(()=>[n("Address reuse")]),_:1})]),p,e("p",null,[n("Anonymity score is a new way to estimate the entropy level of a UTXO in an unequal-but-highly-composable output value coinjoin. The anonymity score is a metric to help the wallet decide when it's time to stop the coinjoining process. Read more: "),i(t,{to:"/FAQ/FAQ-UseWasabi.html#what-is-the-anonymity-score"},{default:a(()=>[n("What is the anonymity score?")]),_:1})]),m,e("p",null,[n("The anonymity set is effectively the size of the group you are hiding in during a CoinJoin. It's the quantity of equal value outputs of one CoinJoin transaction. Read more: "),i(t,{to:"/FAQ/FAQ-UseWasabi.html#what-is-the-anonymity-set"},{default:a(()=>[n("What is the anonymity set?")]),_:1})]),b,f,y,e("p",null,[e("a",w,[n("The part of a software system that is not usually visible or accessible to a user of that system"),i(o)]),n(". In the case of Wasabi, the backend functions as the coinjoin coordinator and provides data to the "),i(t,{to:"/glossary/Glossary-PrivacyWasabi.html#Client"},{default:a(()=>[n("client")]),_:1}),n(" (user) like block filters, exchange rate, and network estimations (mempool).")]),g,e("p",null,[n("A filter representing a compact list of addresses in one block. Wasabi checks locally if any block filter contains transactions with addresses of the wallet. No public keys are sent to any third party server, thus it is very private. Read more: "),e("a",k,[n("BIP 158: Compact Block Filters for Light Clients"),i(o)])]),v,e("p",null,[n("Blockchain analysis is used by transaction surveillance companies to follow the transaction history of coins. Techniques like the common-input-ownership heuristic or change detection are used to create a cluster of transactions belonging to one user. Read more: "),i(t,{to:"/why-wasabi/TransactionSurveillanceCompanies.html#blockchain-analysis"},{default:a(()=>[n("Blockchain Analysis")]),_:1})]),_,e("p",null,[n("A filter used primarily by SPV clients to request only block headers and merkle proofs of a given transaction from full nodes. This is very bad for privacy, as third party servers learn about which addresses you are interested in. Read more: "),e("a",x,[n("BIP 37: Connection Bloom Filtering"),i(o)])]),C,e("p",null,[n("Many Bitcoin transactions have change outputs. It would be a serious privacy leak if the change address can be somehow found, as it would link the ownership of the (now spent) inputs with a new output. Read more: "),i(t,{to:"/using-wasabi/ChangeCoins.html"},{default:a(()=>[n("Change coins")]),_:1})]),j,e("p",null,[n("A Chaumian CoinJoin is a special type of CoinJoin that utilizes Chaumian [or Schnorr] blind signatures to prevent the central coordinator from spying on the linkage between inputs and outputs. Read more: "),i(t,{to:"/using-wasabi/CoinJoin.html#zerolink-protocol-step-by-step"},{default:a(()=>[n("Use of blind signatures in CoinJoin")]),_:1})]),T,e("p",null,[e("a",W,[n("A software that allows a computer to function as a client in a network"),i(o)]),n(". In the case of Wasabi, the client is a Wasabi Wallet software version which a user has on his own local machine. The client can communicate with the "),i(t,{to:"/glossary/Glossary-PrivacyWasabi.html#Backend"},{default:a(()=>[n("backend")]),_:1}),n(".")]),A,e("p",null,[n("Which entities know about which coins. For example, this coin belongs to a cluster that is known by a KYC exchange and Alice. Read more: "),i(t,{to:"/FAQ/FAQ-UseWasabi.html#what-is-the-cluster-history"},{default:a(()=>[n("What is the cluster history?")]),_:1})]),R,e("p",null,[n("The possiblity for the user to manually select UTXO's. It is mostly used for sending, so the user can select which UTXO's should be used as the inputs of the transaction. Read more: "),i(t,{to:"/FAQ/FAQ-UseWasabi.html#coin-control-best-practices"},{default:a(()=>[n("Coin Control Best Practices")]),_:1})]),P,e("p",null,[n("CoinJoin is a trustless method for combining multiple Bitcoin payments from multiple spenders into a single transaction to make it more difficult for outside parties to determine which spender paid which recipient. Read more: "),i(t,{to:"/FAQ/FAQ-Introduction.html#what-is-a-coinjoin"},{default:a(()=>[n("What is a CoinJoin?")]),_:1})]),S,e("p",null,[n("A "),B,n(' contains instructions for the automatic "coinjoin robot" about configurations like when and how much to coinjoin. Read more: '),i(t,{to:"/Using-Wasabi/CoinJoin.html#coinjoin-strategy"},{default:a(()=>[n("Coinjoin Strategy")]),_:1})]),F,I,J,Q,e("p",null,[n("Coins that have successfully participated in a CoinJoin (with the exception of the change) and thus lose their association to a previous cluster. Read more: "),i(t,{to:"/FAQ/FAQ-Introduction.html#what-is-the-privacy-i-get-after-mixing-with-wasabi"},{default:a(()=>[n("What is the privacy I get after mixing with Wasabi?")]),_:1})]),U,M,D,e("p",null,[n("The coordinator is a server which creates CoinJoins and accepts UTXOs in the mix. Read more: "),i(t,{to:"/FAQ/FAQ-UseWasabi.html#how-does-my-wallet-communicate-with-the-wasabi-coordinator-server"},{default:a(()=>[n("How does my wallet communicate with the Wasabi coordinator server?")]),_:1})]),L,e("p",null,[n("A daemon is a command line interface to run Wasabi without the GUI (Graphical User Interface). Read more: "),i(t,{to:"/using-wasabi/Daemon.html"},{default:a(()=>[n("Headless Wasabi Daemon")]),_:1})]),E,e("p",null,[n("Discreet Mode is a Wasabi feature that hides sensitive and critical information on the wallet itself, which is useful for screenshots. Read more: "),i(t,{to:"/using-wasabi/DiscreetMode.html"},{default:a(()=>[n("Discreet Mode")]),_:1})]),O,e("p",null,[n("Dust is an UTXO that is uneconomical to spend. Also, small portions of bitcoin can lead to serious consequences for one's privacy, for example the so called "),z,n(". Read more: "),i(t,{to:"/FAQ/FAQ-UseWasabi.html#what-is-the-dust-threshold"},{default:a(()=>[n("What is the dust threshold")]),_:1})]),K,e("p",null,[n("KYC (Know Your Customer) is the process of a business being forced to identify and verify the identity of its clients, and to share this information with a government. The term is also used to refer to the bank regulation which governs these activities. Read more: "),i(t,{to:"/why-wasabi/TransactionSurveillanceCompanies.html#aml-kyc-information"},{default:a(()=>[n("AML/KYC Information")]),_:1})]),G,e("p",null,[n("A label can be added to a coin, as a small note on who knows this coin belongs to you. Good labelling can help the user and the wallet to make better privacy conscious decisions later on when spending. Read more: "),i(t,{to:"/FAQ/FAQ-UseWasabi.html#why-do-i-have-to-label-my-address"},{default:a(()=>[n("Why do I have to label my address")]),_:1})]),q,e("p",null,[n("A way to track who knows about the ownership of your coins. Not to be confused with a description of a transaction. Read more: "),i(t,{to:"/using-wasabi/Receive.html#the-importance-of-labeling"},{default:a(()=>[n("The importance of labeling")]),_:1})]),N,e("p",null,[n("RPC, or Remote Procedure Call, is an interface to interact with Wasabi Wallet programmatically. Read more: "),i(t,{to:"/using-wasabi/RPC.html"},{default:a(()=>[n("RPC Interface")]),_:1})]),Y,X,e("p",null,[n("This was added in Wasabi "),e("a",H,[n("2.0.6 version"),i(o)]),n(" to increase privacy for people who generate a new wallet -> receive a coin -> do one coinjoin -> send all the money out. It aims to prevent targeted analysis that compares the value of consolidated coinjoin outputs with the value of one of the coinjoin's inputs.")]),V,e("p",null,[n("Taint is equivalent to the 'trail' that a Bitcoin transaction leaves during the course of its journey. The taint analysis of a Bitcoin transaction evaluates the association between an address involved in the chain of transactions. Read more: "),i(t,{to:"/why-wasabi/TransactionSurveillanceCompanies.html#blockchain-analysis"},{default:a(()=>[n("Blockchain Analysis")]),_:1})]),Z,e("p",null,[n("Tor (The Onion Router) is free and open-source software for enabling anonymous communication. It is widely used by Wasabi. Read more: "),i(t,{to:"/FAQ/FAQ-GeneralBitcoinPrivacy.html#how-does-tor-protect-my-network-level-privacy"},{default:a(()=>[n("How does Tor protect my network level privacy?")]),_:1})]),$,e("p",null,[n("A transaction surveillance company is one which attempts to spy on all Bitcoin users. Their business model is usually to sell the data to any government, corporation or individual willing to pay for their services. Read more: "),i(t,{to:"/why-wasabi/TransactionSurveillanceCompanies.html"},{default:a(()=>[n("Transaction Surveillance Companies")]),_:1})]),ee,ne,ie,e("p",null,[n("A feature in Wasabi to reduce wallet loading time. With TurboSync, some addresses (internal keys only) are skipped and tested in the background. Read more: "),i(t,{to:"/using-wasabi/WalletLoad.html#turbosync"},{default:a(()=>[n("TurboSync")]),_:1})]),te,e("p",null,[n("WabiSabi is a protocol for constructing coinjoin transactions with the aid of a centralized coordinator. It utilizes keyed-verification anonymous credentials, homomorphic value commitments, and zero knowledge proofs to achieve privacy and flexibility. Read more: "),e("a",ae,[n("WabiSabi"),i(o)])]),oe,e("p",null,[n("ZeroLink is a framework to holistically design a privacy and fungibility setup for Bitcoin. This encompasses more than just a single CoinJoin transaction, but also includes network level privacy defense against third party spying. Read more: "),i(t,{to:"/using-wasabi/CoinJoin.html#zerolink-protocol-step-by-step"},{default:a(()=>[n("ZeroLink: the Bitcoin Fungibility Framework")]),_:1})])])}const he=r(d,[["render",se],["__file","Glossary-PrivacyWasabi.html.vue"]]),de=JSON.parse('{"path":"/glossary/Glossary-PrivacyWasabi.html","title":"Privacy and Wasabi","lang":"en-US","frontmatter":{"title":"Privacy and Wasabi","description":"Explanations of common words used in Wasabi and regarding Bitcoin privacy with links to the docs for more details. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Privacy and Wasabi","slug":"privacy-and-wasabi","link":"#privacy-and-wasabi","children":[{"level":3,"title":"#twoweeks","slug":"twoweeks","link":"#twoweeks","children":[]},{"level":3,"title":"Absolute min input count","slug":"absolute-min-input-count","link":"#absolute-min-input-count","children":[]},{"level":3,"title":"Address Reuse","slug":"address-reuse","link":"#address-reuse","children":[]},{"level":3,"title":"Anonymity Score (anonscore)","slug":"anonymity-score-anonscore","link":"#anonymity-score-anonscore","children":[]},{"level":3,"title":"Anonymity Set (anonset)","slug":"anonymity-set-anonset","link":"#anonymity-set-anonset","children":[]},{"level":3,"title":"Auto-start coinjoin (Pleb Stop) threshold","slug":"auto-start-coinjoin-pleb-stop-threshold","link":"#auto-start-coinjoin-pleb-stop-threshold","children":[]},{"level":3,"title":"Backend","slug":"backend","link":"#backend","children":[]},{"level":3,"title":"Block filters","slug":"block-filters","link":"#block-filters","children":[]},{"level":3,"title":"Blockchain Analysis","slug":"blockchain-analysis","link":"#blockchain-analysis","children":[]},{"level":3,"title":"Bloom Filter","slug":"bloom-filter","link":"#bloom-filter","children":[]},{"level":3,"title":"Change Address Detection","slug":"change-address-detection","link":"#change-address-detection","children":[]},{"level":3,"title":"Chaumian CoinJoin","slug":"chaumian-coinjoin","link":"#chaumian-coinjoin","children":[]},{"level":3,"title":"Client","slug":"client","link":"#client","children":[]},{"level":3,"title":"Cluster","slug":"cluster","link":"#cluster","children":[]},{"level":3,"title":"Coin Control","slug":"coin-control","link":"#coin-control","children":[]},{"level":3,"title":"CoinJoin (CJ)","slug":"coinjoin-cj","link":"#coinjoin-cj","children":[]},{"level":3,"title":"Coinjoin Strategy","slug":"coinjoin-strategy","link":"#coinjoin-strategy","children":[]},{"level":3,"title":"Coinjoin Time Preference","slug":"coinjoin-time-preference","link":"#coinjoin-time-preference","children":[]},{"level":3,"title":"CoinJoined coins","slug":"coinjoined-coins","link":"#coinjoined-coins","children":[]},{"level":3,"title":"Common-Input-Ownership heuristic","slug":"common-input-ownership-heuristic","link":"#common-input-ownership-heuristic","children":[]},{"level":3,"title":"Coordinator","slug":"coordinator","link":"#coordinator","children":[]},{"level":3,"title":"Daemon","slug":"daemon","link":"#daemon","children":[]},{"level":3,"title":"Discreet Mode","slug":"discreet-mode","link":"#discreet-mode","children":[]},{"level":3,"title":"Dust","slug":"dust","link":"#dust","children":[]},{"level":3,"title":"Know Your Customer (KYC)","slug":"know-your-customer-kyc","link":"#know-your-customer-kyc","children":[]},{"level":3,"title":"Label","slug":"label","link":"#label","children":[]},{"level":3,"title":"Max Coordination Fee Rate","slug":"max-coordination-fee-rate","link":"#max-coordination-fee-rate","children":[]},{"level":3,"title":"Max Coinjoin Mining Fee Rate","slug":"max-coinjoin-mining-fee-rate","link":"#max-coinjoin-mining-fee-rate","children":[]},{"level":3,"title":"Observers","slug":"observers","link":"#observers","children":[]},{"level":3,"title":"Pay to EndPoint (P2EP)","slug":"pay-to-endpoint-p2ep","link":"#pay-to-endpoint-p2ep","children":[]},{"level":3,"title":"Peers","slug":"peers","link":"#peers","children":[]},{"level":3,"title":"RPC","slug":"rpc","link":"#rpc","children":[]},{"level":3,"title":"Safety coinjoin","slug":"safety-coinjoin","link":"#safety-coinjoin","children":[]},{"level":3,"title":"Taint","slug":"taint","link":"#taint","children":[]},{"level":3,"title":"The Onion Router (Tor)","slug":"the-onion-router-tor","link":"#the-onion-router-tor","children":[]},{"level":3,"title":"Transaction Surveillance Company","slug":"transaction-surveillance-company","link":"#transaction-surveillance-company","children":[]},{"level":3,"title":"Tumbling / Tumbler","slug":"tumbling-tumbler","link":"#tumbling-tumbler","children":[]},{"level":3,"title":"TurboSync","slug":"turbosync","link":"#turbosync","children":[]},{"level":3,"title":"WabiSabi","slug":"wabisabi","link":"#wabisabi","children":[]},{"level":3,"title":"Wallet fingerprinting","slug":"wallet-fingerprinting","link":"#wallet-fingerprinting","children":[]},{"level":3,"title":"Wasabika","slug":"wasabika","link":"#wasabika","children":[]},{"level":3,"title":"XPUB (Extended Public Key)","slug":"xpub-extended-public-key","link":"#xpub-extended-public-key","children":[]},{"level":3,"title":"ZeroLink","slug":"zerolink","link":"#zerolink","children":[]}]}],"git":{"updatedTime":1720425186000},"filePathRelative":"glossary/Glossary-PrivacyWasabi.md"}');export{he as comp,de as data}; +import{_ as r,r as l,o as c,c as h,a as e,b as n,d as i,w as a,e as s}from"./app-CwImt2bI.js";const d={},u=s('

    Privacy and Wasabi

    #twoweeks

    The #twoweeks is a fun inside joke often used in the Wasabi documentation and, more generally, in the Internet community. In the case of Wasabi documentation, it usually indicates the arrival of a new function or update, to which the future date is still uncertain.

    E.g. "Lightning Network is coming to Wasabi in #twoweeks"

    Absolute min input count

    The client will refuse to participate in coinjoin rounds with a minimum input count lower than this value. The default value is 21.

    Address Reuse

    ',7),p=e("h3",{id:"anonymity-score-anonscore",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#anonymity-score-anonscore"},[e("span",null,"Anonymity Score (anonscore)")])],-1),m=e("h3",{id:"anonymity-set-anonset",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#anonymity-set-anonset"},[e("span",null,"Anonymity Set (anonset)")])],-1),b=e("h3",{id:"auto-start-coinjoin-pleb-stop-threshold",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#auto-start-coinjoin-pleb-stop-threshold"},[e("span",null,"Auto-start coinjoin (Pleb Stop) threshold")])],-1),f=e("p",null,[n("The auto-start coinjoin threshold, a.k.a Pleb Stop, is the minimum wallet balance at which coinjoin will automatically start/continue. The amount can be changed in the "),e("em",null,"Coinjoin Settings"),n(" ("),e("em",null,"Auto-start coinjoin threshold"),n(" setting), the default is 0.01 BTC.")],-1),y=e("h3",{id:"backend",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#backend"},[e("span",null,"Backend")])],-1),w={href:"https://www.merriam-webster.com/dictionary/back%20end",target:"_blank",rel:"noopener noreferrer"},g=e("h3",{id:"block-filters",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#block-filters"},[e("span",null,"Block filters")])],-1),k={href:"https://github.com/bitcoin/bips/blob/master/bip-0158.mediawiki",target:"_blank",rel:"noopener noreferrer"},v=e("h3",{id:"blockchain-analysis",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#blockchain-analysis"},[e("span",null,"Blockchain Analysis")])],-1),_=e("h3",{id:"bloom-filter",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#bloom-filter"},[e("span",null,"Bloom Filter")])],-1),x={href:"https://github.com/bitcoin/bips/blob/master/bip-0037.mediawiki",target:"_blank",rel:"noopener noreferrer"},C=e("h3",{id:"change-address-detection",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#change-address-detection"},[e("span",null,"Change Address Detection")])],-1),j=e("h3",{id:"chaumian-coinjoin",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#chaumian-coinjoin"},[e("span",null,"Chaumian CoinJoin")])],-1),T=e("h3",{id:"client",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#client"},[e("span",null,"Client")])],-1),W={href:"https://www.merriam-webster.com/dictionary/client",target:"_blank",rel:"noopener noreferrer"},A=e("h3",{id:"cluster",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#cluster"},[e("span",null,"Cluster")])],-1),R=e("h3",{id:"coin-control",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#coin-control"},[e("span",null,"Coin Control")])],-1),P=e("h3",{id:"coinjoin-cj",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#coinjoin-cj"},[e("span",null,"CoinJoin (CJ)")])],-1),S=e("h3",{id:"coinjoin-strategy",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#coinjoin-strategy"},[e("span",null,"Coinjoin Strategy")])],-1),B=e("em",null,"Coinjoin Strategy",-1),F=e("h3",{id:"coinjoin-time-preference",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#coinjoin-time-preference"},[e("span",null,"Coinjoin Time Preference")])],-1),I=e("p",null,"The wallet will only participate in coinjoin when the fee rate is below the median of the chosen time frame (Hours, Days, Weeks, or Months).",-1),J=e("p",null,[n("("),e("em",null,"FeeRateMedianTimeFrameHours"),n(" in the wallet file)")],-1),Q=e("h3",{id:"coinjoined-coins",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#coinjoined-coins"},[e("span",null,"CoinJoined coins")])],-1),U=e("h3",{id:"common-input-ownership-heuristic",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#common-input-ownership-heuristic"},[e("span",null,"Common-Input-Ownership heuristic")])],-1),M=e("p",null,"This is a heuristic or assumption which says that if a transaction has more than one input then all those inputs are owned by the same entity.",-1),D=e("h3",{id:"coordinator",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#coordinator"},[e("span",null,"Coordinator")])],-1),L=e("h3",{id:"daemon",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#daemon"},[e("span",null,"Daemon")])],-1),E=e("h3",{id:"discreet-mode",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#discreet-mode"},[e("span",null,"Discreet Mode")])],-1),O=e("h3",{id:"dust",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#dust"},[e("span",null,"Dust")])],-1),z=e("code",null,"forced address reuse attack",-1),K=e("h3",{id:"know-your-customer-kyc",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#know-your-customer-kyc"},[e("span",null,"Know Your Customer (KYC)")])],-1),G=e("h3",{id:"label",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#label"},[e("span",null,"Label")])],-1),q=s('

    Max Coordination Fee Rate

    The maximum coordination fee rate the client is willing to accept to participate into a round. The default value is 0.

    Max Coinjoin Mining Fee Rate

    The maximum mining fee rate in sat/vByte the client is willing to pay to participate into a round. The default value is 150.

    Observers

    ',5),N=s('

    Pay to EndPoint (P2EP)

    Pay to EndPoint is when the receiver is reachable over the internet and the sender communicates with the receiver to coordinate a more advanced transaction. The Tor onion service, IP address or domain of the receiver is included in a BIP21 Bitcoin URI payment link.

    Peers

    Peers in our documentation refers mainly to Bitcoin and Wasabi Wallet users, but it also means people. They are literally peers in the network, or in the CoinJoin.

    RPC

    ',5),Y=e("h3",{id:"safety-coinjoin",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#safety-coinjoin"},[e("span",null,"Safety coinjoin")])],-1),X=e("p",null,[n("Safety coinjoin is a concept for doing an extra coinjoin after a user registers only "),e("em",null,"anonymity score"),n(" 1 (non-private) coins in their first round.")],-1),H={href:"https://github.com/WalletWasabi/WalletWasabi/releases/tag/v2.0.6",target:"_blank",rel:"noopener noreferrer"},V=e("h3",{id:"taint",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#taint"},[e("span",null,"Taint")])],-1),Z=e("h3",{id:"the-onion-router-tor",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#the-onion-router-tor"},[e("span",null,"The Onion Router (Tor)")])],-1),$=e("h3",{id:"transaction-surveillance-company",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#transaction-surveillance-company"},[e("span",null,"Transaction Surveillance Company")])],-1),ee=e("h3",{id:"tumbling-tumbler",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#tumbling-tumbler"},[e("span",null,"Tumbling / Tumbler")])],-1),ne=e("p",null,"Tumbling is a synonym of 'Mixing'. Similarly, Tumbler is the synonym of 'Mixer'.",-1),ie=e("h3",{id:"turbosync",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#turbosync"},[e("span",null,"TurboSync")])],-1),te=e("h3",{id:"wabisabi",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#wabisabi"},[e("span",null,"WabiSabi")])],-1),ae={href:"https://github.com/zkSNACKs/WabiSabi/releases/latest/download/WabiSabi.pdf",target:"_blank",rel:"noopener noreferrer"},oe=s('

    Wallet fingerprinting

    A careful analyst sometimes deduces which software created a certain transaction, because many different wallet softwares don't always create transactions in exactly the same way.

    Wasabika

    Wasabikas are builders, users and supporters of Wasabi in general.

    XPUB (Extended Public Key)

    An xpub, also known as Extended Public Key, is a part of BIP-32 that will allow you to observe your wallet without the private key (xpriv).

    ',7);function se(le,re){const t=l("RouteLink"),o=l("ExternalLinkIcon");return c(),h("div",null,[u,e("p",null,[n("Address reuse refers to the use of the same address for multiple transactions, this is very bad for privacy. Read more: "),i(t,{to:"/why-wasabi/AddressReuse.html"},{default:a(()=>[n("Address reuse")]),_:1})]),p,e("p",null,[n("Anonymity score is a new way to estimate the entropy level of a UTXO in an unequal-but-highly-composable output value coinjoin. The anonymity score is a metric to help the wallet decide when it's time to stop the coinjoining process. Read more: "),i(t,{to:"/FAQ/FAQ-UseWasabi.html#what-is-the-anonymity-score"},{default:a(()=>[n("What is the anonymity score?")]),_:1})]),m,e("p",null,[n("The anonymity set is effectively the size of the group you are hiding in during a CoinJoin. It's the quantity of equal value outputs of one CoinJoin transaction. Read more: "),i(t,{to:"/FAQ/FAQ-UseWasabi.html#what-is-the-anonymity-set"},{default:a(()=>[n("What is the anonymity set?")]),_:1})]),b,f,y,e("p",null,[e("a",w,[n("The part of a software system that is not usually visible or accessible to a user of that system"),i(o)]),n(". In the case of Wasabi, the backend functions as the coinjoin coordinator and provides data to the "),i(t,{to:"/glossary/Glossary-PrivacyWasabi.html#Client"},{default:a(()=>[n("client")]),_:1}),n(" (user) like block filters, exchange rate, and network estimations (mempool).")]),g,e("p",null,[n("A filter representing a compact list of addresses in one block. Wasabi checks locally if any block filter contains transactions with addresses of the wallet. No public keys are sent to any third party server, thus it is very private. Read more: "),e("a",k,[n("BIP 158: Compact Block Filters for Light Clients"),i(o)])]),v,e("p",null,[n("Blockchain analysis is used by transaction surveillance companies to follow the transaction history of coins. Techniques like the common-input-ownership heuristic or change detection are used to create a cluster of transactions belonging to one user. Read more: "),i(t,{to:"/why-wasabi/TransactionSurveillanceCompanies.html#blockchain-analysis"},{default:a(()=>[n("Blockchain Analysis")]),_:1})]),_,e("p",null,[n("A filter used primarily by SPV clients to request only block headers and merkle proofs of a given transaction from full nodes. This is very bad for privacy, as third party servers learn about which addresses you are interested in. Read more: "),e("a",x,[n("BIP 37: Connection Bloom Filtering"),i(o)])]),C,e("p",null,[n("Many Bitcoin transactions have change outputs. It would be a serious privacy leak if the change address can be somehow found, as it would link the ownership of the (now spent) inputs with a new output. Read more: "),i(t,{to:"/using-wasabi/ChangeCoins.html"},{default:a(()=>[n("Change coins")]),_:1})]),j,e("p",null,[n("A Chaumian CoinJoin is a special type of CoinJoin that utilizes Chaumian [or Schnorr] blind signatures to prevent the central coordinator from spying on the linkage between inputs and outputs. Read more: "),i(t,{to:"/using-wasabi/CoinJoin.html#zerolink-protocol-step-by-step"},{default:a(()=>[n("Use of blind signatures in CoinJoin")]),_:1})]),T,e("p",null,[e("a",W,[n("A software that allows a computer to function as a client in a network"),i(o)]),n(". In the case of Wasabi, the client is a Wasabi Wallet software version which a user has on his own local machine. The client can communicate with the "),i(t,{to:"/glossary/Glossary-PrivacyWasabi.html#Backend"},{default:a(()=>[n("backend")]),_:1}),n(".")]),A,e("p",null,[n("Which entities know about which coins. For example, this coin belongs to a cluster that is known by a KYC exchange and Alice. Read more: "),i(t,{to:"/FAQ/FAQ-UseWasabi.html#what-is-the-cluster-history"},{default:a(()=>[n("What is the cluster history?")]),_:1})]),R,e("p",null,[n("The possiblity for the user to manually select UTXO's. It is mostly used for sending, so the user can select which UTXO's should be used as the inputs of the transaction. Read more: "),i(t,{to:"/FAQ/FAQ-UseWasabi.html#coin-control-best-practices"},{default:a(()=>[n("Coin Control Best Practices")]),_:1})]),P,e("p",null,[n("CoinJoin is a trustless method for combining multiple Bitcoin payments from multiple spenders into a single transaction to make it more difficult for outside parties to determine which spender paid which recipient. Read more: "),i(t,{to:"/FAQ/FAQ-Introduction.html#what-is-a-coinjoin"},{default:a(()=>[n("What is a CoinJoin?")]),_:1})]),S,e("p",null,[n("A "),B,n(' contains instructions for the automatic "coinjoin robot" about configurations like when and how much to coinjoin. Read more: '),i(t,{to:"/Using-Wasabi/CoinJoin.html#coinjoin-strategy"},{default:a(()=>[n("Coinjoin Strategy")]),_:1})]),F,I,J,Q,e("p",null,[n("Coins that have successfully participated in a CoinJoin (with the exception of the change) and thus lose their association to a previous cluster. Read more: "),i(t,{to:"/FAQ/FAQ-Introduction.html#what-is-the-privacy-i-get-after-mixing-with-wasabi"},{default:a(()=>[n("What is the privacy I get after mixing with Wasabi?")]),_:1})]),U,M,D,e("p",null,[n("The coordinator is a server which creates CoinJoins and accepts UTXOs in the mix. Read more: "),i(t,{to:"/FAQ/FAQ-UseWasabi.html#how-does-my-wallet-communicate-with-the-wasabi-coordinator-server"},{default:a(()=>[n("How does my wallet communicate with the Wasabi coordinator server?")]),_:1})]),L,e("p",null,[n("A daemon is a command line interface to run Wasabi without the GUI (Graphical User Interface). Read more: "),i(t,{to:"/using-wasabi/Daemon.html"},{default:a(()=>[n("Headless Wasabi Daemon")]),_:1})]),E,e("p",null,[n("Discreet Mode is a Wasabi feature that hides sensitive and critical information on the wallet itself, which is useful for screenshots. Read more: "),i(t,{to:"/using-wasabi/DiscreetMode.html"},{default:a(()=>[n("Discreet Mode")]),_:1})]),O,e("p",null,[n("Dust is an UTXO that is uneconomical to spend. Also, small portions of bitcoin can lead to serious consequences for one's privacy, for example the so called "),z,n(". Read more: "),i(t,{to:"/FAQ/FAQ-UseWasabi.html#what-is-the-dust-threshold"},{default:a(()=>[n("What is the dust threshold")]),_:1})]),K,e("p",null,[n("KYC (Know Your Customer) is the process of a business being forced to identify and verify the identity of its clients, and to share this information with a government. The term is also used to refer to the bank regulation which governs these activities. Read more: "),i(t,{to:"/why-wasabi/TransactionSurveillanceCompanies.html#aml-kyc-information"},{default:a(()=>[n("AML/KYC Information")]),_:1})]),G,e("p",null,[n("A label can be added to a coin, as a small note on who knows this coin belongs to you. Good labelling can help the user and the wallet to make better privacy conscious decisions later on when spending. Read more: "),i(t,{to:"/FAQ/FAQ-UseWasabi.html#why-do-i-have-to-label-my-address"},{default:a(()=>[n("Why do I have to label my address")]),_:1})]),q,e("p",null,[n("A way to track who knows about the ownership of your coins. Not to be confused with a description of a transaction. Read more: "),i(t,{to:"/using-wasabi/Receive.html#the-importance-of-labeling"},{default:a(()=>[n("The importance of labeling")]),_:1})]),N,e("p",null,[n("RPC, or Remote Procedure Call, is an interface to interact with Wasabi Wallet programmatically. Read more: "),i(t,{to:"/using-wasabi/RPC.html"},{default:a(()=>[n("RPC Interface")]),_:1})]),Y,X,e("p",null,[n("This was added in Wasabi "),e("a",H,[n("2.0.6 version"),i(o)]),n(" to increase privacy for people who generate a new wallet -> receive a coin -> do one coinjoin -> send all the money out. It aims to prevent targeted analysis that compares the value of consolidated coinjoin outputs with the value of one of the coinjoin's inputs.")]),V,e("p",null,[n("Taint is equivalent to the 'trail' that a Bitcoin transaction leaves during the course of its journey. The taint analysis of a Bitcoin transaction evaluates the association between an address involved in the chain of transactions. Read more: "),i(t,{to:"/why-wasabi/TransactionSurveillanceCompanies.html#blockchain-analysis"},{default:a(()=>[n("Blockchain Analysis")]),_:1})]),Z,e("p",null,[n("Tor (The Onion Router) is free and open-source software for enabling anonymous communication. It is widely used by Wasabi. Read more: "),i(t,{to:"/FAQ/FAQ-GeneralBitcoinPrivacy.html#how-does-tor-protect-my-network-level-privacy"},{default:a(()=>[n("How does Tor protect my network level privacy?")]),_:1})]),$,e("p",null,[n("A transaction surveillance company is one which attempts to spy on all Bitcoin users. Their business model is usually to sell the data to any government, corporation or individual willing to pay for their services. Read more: "),i(t,{to:"/why-wasabi/TransactionSurveillanceCompanies.html"},{default:a(()=>[n("Transaction Surveillance Companies")]),_:1})]),ee,ne,ie,e("p",null,[n("A feature in Wasabi to reduce wallet loading time. With TurboSync, some addresses (internal keys only) are skipped and tested in the background. Read more: "),i(t,{to:"/using-wasabi/WalletLoad.html#turbosync"},{default:a(()=>[n("TurboSync")]),_:1})]),te,e("p",null,[n("WabiSabi is a protocol for constructing coinjoin transactions with the aid of a centralized coordinator. It utilizes keyed-verification anonymous credentials, homomorphic value commitments, and zero knowledge proofs to achieve privacy and flexibility. Read more: "),e("a",ae,[n("WabiSabi"),i(o)])]),oe,e("p",null,[n("ZeroLink is a framework to holistically design a privacy and fungibility setup for Bitcoin. This encompasses more than just a single CoinJoin transaction, but also includes network level privacy defense against third party spying. Read more: "),i(t,{to:"/using-wasabi/CoinJoin.html#zerolink-protocol-step-by-step"},{default:a(()=>[n("ZeroLink: the Bitcoin Fungibility Framework")]),_:1})])])}const he=r(d,[["render",se],["__file","Glossary-PrivacyWasabi.html.vue"]]),de=JSON.parse('{"path":"/glossary/Glossary-PrivacyWasabi.html","title":"Privacy and Wasabi","lang":"en-US","frontmatter":{"title":"Privacy and Wasabi","description":"Explanations of common words used in Wasabi and regarding Bitcoin privacy with links to the docs for more details. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Privacy and Wasabi","slug":"privacy-and-wasabi","link":"#privacy-and-wasabi","children":[{"level":3,"title":"#twoweeks","slug":"twoweeks","link":"#twoweeks","children":[]},{"level":3,"title":"Absolute min input count","slug":"absolute-min-input-count","link":"#absolute-min-input-count","children":[]},{"level":3,"title":"Address Reuse","slug":"address-reuse","link":"#address-reuse","children":[]},{"level":3,"title":"Anonymity Score (anonscore)","slug":"anonymity-score-anonscore","link":"#anonymity-score-anonscore","children":[]},{"level":3,"title":"Anonymity Set (anonset)","slug":"anonymity-set-anonset","link":"#anonymity-set-anonset","children":[]},{"level":3,"title":"Auto-start coinjoin (Pleb Stop) threshold","slug":"auto-start-coinjoin-pleb-stop-threshold","link":"#auto-start-coinjoin-pleb-stop-threshold","children":[]},{"level":3,"title":"Backend","slug":"backend","link":"#backend","children":[]},{"level":3,"title":"Block filters","slug":"block-filters","link":"#block-filters","children":[]},{"level":3,"title":"Blockchain Analysis","slug":"blockchain-analysis","link":"#blockchain-analysis","children":[]},{"level":3,"title":"Bloom Filter","slug":"bloom-filter","link":"#bloom-filter","children":[]},{"level":3,"title":"Change Address Detection","slug":"change-address-detection","link":"#change-address-detection","children":[]},{"level":3,"title":"Chaumian CoinJoin","slug":"chaumian-coinjoin","link":"#chaumian-coinjoin","children":[]},{"level":3,"title":"Client","slug":"client","link":"#client","children":[]},{"level":3,"title":"Cluster","slug":"cluster","link":"#cluster","children":[]},{"level":3,"title":"Coin Control","slug":"coin-control","link":"#coin-control","children":[]},{"level":3,"title":"CoinJoin (CJ)","slug":"coinjoin-cj","link":"#coinjoin-cj","children":[]},{"level":3,"title":"Coinjoin Strategy","slug":"coinjoin-strategy","link":"#coinjoin-strategy","children":[]},{"level":3,"title":"Coinjoin Time Preference","slug":"coinjoin-time-preference","link":"#coinjoin-time-preference","children":[]},{"level":3,"title":"CoinJoined coins","slug":"coinjoined-coins","link":"#coinjoined-coins","children":[]},{"level":3,"title":"Common-Input-Ownership heuristic","slug":"common-input-ownership-heuristic","link":"#common-input-ownership-heuristic","children":[]},{"level":3,"title":"Coordinator","slug":"coordinator","link":"#coordinator","children":[]},{"level":3,"title":"Daemon","slug":"daemon","link":"#daemon","children":[]},{"level":3,"title":"Discreet Mode","slug":"discreet-mode","link":"#discreet-mode","children":[]},{"level":3,"title":"Dust","slug":"dust","link":"#dust","children":[]},{"level":3,"title":"Know Your Customer (KYC)","slug":"know-your-customer-kyc","link":"#know-your-customer-kyc","children":[]},{"level":3,"title":"Label","slug":"label","link":"#label","children":[]},{"level":3,"title":"Max Coordination Fee Rate","slug":"max-coordination-fee-rate","link":"#max-coordination-fee-rate","children":[]},{"level":3,"title":"Max Coinjoin Mining Fee Rate","slug":"max-coinjoin-mining-fee-rate","link":"#max-coinjoin-mining-fee-rate","children":[]},{"level":3,"title":"Observers","slug":"observers","link":"#observers","children":[]},{"level":3,"title":"Pay to EndPoint (P2EP)","slug":"pay-to-endpoint-p2ep","link":"#pay-to-endpoint-p2ep","children":[]},{"level":3,"title":"Peers","slug":"peers","link":"#peers","children":[]},{"level":3,"title":"RPC","slug":"rpc","link":"#rpc","children":[]},{"level":3,"title":"Safety coinjoin","slug":"safety-coinjoin","link":"#safety-coinjoin","children":[]},{"level":3,"title":"Taint","slug":"taint","link":"#taint","children":[]},{"level":3,"title":"The Onion Router (Tor)","slug":"the-onion-router-tor","link":"#the-onion-router-tor","children":[]},{"level":3,"title":"Transaction Surveillance Company","slug":"transaction-surveillance-company","link":"#transaction-surveillance-company","children":[]},{"level":3,"title":"Tumbling / Tumbler","slug":"tumbling-tumbler","link":"#tumbling-tumbler","children":[]},{"level":3,"title":"TurboSync","slug":"turbosync","link":"#turbosync","children":[]},{"level":3,"title":"WabiSabi","slug":"wabisabi","link":"#wabisabi","children":[]},{"level":3,"title":"Wallet fingerprinting","slug":"wallet-fingerprinting","link":"#wallet-fingerprinting","children":[]},{"level":3,"title":"Wasabika","slug":"wasabika","link":"#wasabika","children":[]},{"level":3,"title":"XPUB (Extended Public Key)","slug":"xpub-extended-public-key","link":"#xpub-extended-public-key","children":[]},{"level":3,"title":"ZeroLink","slug":"zerolink","link":"#zerolink","children":[]}]}],"git":{"updatedTime":1720425980000},"filePathRelative":"glossary/Glossary-PrivacyWasabi.md"}');export{he as comp,de as data}; diff --git a/assets/InstallPackage.html-D4f2GNqt.js b/assets/InstallPackage.html-B2XMhgob.js similarity index 99% rename from assets/InstallPackage.html-D4f2GNqt.js rename to assets/InstallPackage.html-B2XMhgob.js index 1f88e8ddb..ae88b5dd2 100644 --- a/assets/InstallPackage.html-D4f2GNqt.js +++ b/assets/InstallPackage.html-B2XMhgob.js @@ -1 +1 @@ -import{b as h,c as u,d,_ as p,a as f}from"./DownloadMac-DUSPDgNE.js";import{_ as c}from"./Logo_without_text_with_bg_dark_with_yt-D8lqXhN0.js";import{_ as b,r,o as g,c as _,a as e,d as o,w as n,b as t,e as s}from"./app-3S7gIoGc.js";const w="/DownloadAll.png",m={},y=e("h1",{id:"install-package",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#install-package"},[e("span",null,"Install package")])],-1),k={class:"table-of-contents"},W=e("h2",{id:"introduction",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#introduction"},[e("span",null,"Introduction")])],-1),v={href:"https://wasabiwallet.io",target:"_blank",rel:"noopener noreferrer"},P={href:"http://wasabiukrxmkdgve5kynjztuovbg43uxcbcxn6y2okcrsg7gb6jdmbad.onion",target:"_blank",rel:"noopener noreferrer"},x=e("p",null,[e("img",{src:w,alt:"Operating systems supported by Wasabi Wallet",title:"Operating systems supported by Wasabi Wallet"})],-1),A=e("strong",null,"VERIFY PGP SIGNATURES",-1),I={href:"https://github.com/WalletWasabi/WalletWasabi/blob/master/PGP.txt",target:"_blank",rel:"noopener noreferrer"},D={href:"https://github.com/WalletWasabi/WalletWasabi/blob/master/PGP.txt",target:"_blank",rel:"noopener noreferrer"},S={href:"https://security.stackexchange.com/questions/147447/gpg-why-is-my-trusted-key-not-certified-with-a-trusted-signature",target:"_blank",rel:"noopener noreferrer"},G={href:"https://www.gnupg.org/gph/en/manual/x334.html",target:"_blank",rel:"noopener noreferrer"},N=e("div",{class:"custom-container tip"},[e("p",{class:"custom-container-title"},"Always"),e("p",null,"Don't trust - Verify!")],-1),z=e("h2",{id:"install-wasabi-step-by-step",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#install-wasabi-step-by-step"},[e("span",null,"Install Wasabi step-by-step")])],-1),F={href:"https://wasabiwallet.io",target:"_blank",rel:"noopener noreferrer"},C=e("li",null,"Verify the PGP signatures of the download.",-1),T=e("li",null,"Install Wasabi package as you would do any other software on your operating system.",-1),K=e("hr",null,null,-1),B=e("h2",{id:"windows",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#windows"},[e("span",null,"Windows")])],-1),E={href:"https://wasabiwallet.io/#download",target:"_blank",rel:"noopener noreferrer"},O=e("code",null,".msi",-1),V=e("p",null,[e("img",{src:h,alt:"Download Wasabi Wallet for Windows",title:"Download Wasabi Wallet for Windows"})],-1),L=e("ol",{start:"2"},[e("li",null,[e("p",null,[t("Install Wasabi by double-clicking the "),e("code",null,".msi"),t(" and following the GUI instructions.")])]),e("li",null,[e("p",null,"Make sure that you see this window that verifies the installer was signed by zkSNACKs Limited. Manual PGP verification is optional, as the package is signed and verified automatically on Windows.")])],-1),Q=e("p",null,[e("img",{src:u,alt:"Wasabi Wallet Windows signature verification",title:"Wasabi Wallet Windows signature verification"})],-1),U=e("code",null,"C:\\Program Files\\WasabiWallet\\",-1),R=e("h2",{id:"debian-and-ubuntu",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#debian-and-ubuntu"},[e("span",null,"Debian and Ubuntu")])],-1),j=e("p",null,"If you have already imported zkSNACKs' PGP public key, then jump to step 2.",-1),Y={href:"https://github.com/WalletWasabi/WalletWasabi/blob/master/PGP.txt",target:"_blank",rel:"noopener noreferrer"},M=e("code",null,"gpg --import PGP.txt",-1),q=e("p",null,[t("Verify that the fingerprint is "),e("code",null,"6FB3 872B 5D42 292F 5992 0797 8563 4832 8949 861E"),t(" by running this command "),e("code",null,"gpg --list-keys zkSNACKs"),t(".")],-1),H={href:"https://wasabiwallet.io/#download",target:"_blank",rel:"noopener noreferrer"},J=e("code",null,".deb",-1),$=e("code",null,".asc",-1),X=s('

    Download Wasabi Wallet for Debian

    1. Verify the signature in the Download repository with gpg --verify Wasabi-2.0.8.1.deb.asc Wasabi-2.0.8.1.deb. If the message returned says Good signature from zkSNACKs and that it was signed with Primary key fingerprint: 6FB3 872B 5D42 292F 5992 0797 8563 4832 8949 861E, then the software was not tampered with since the developer signed it.

      TIP

      The output from the verify command may contain WARNING: This key is not certified with a trusted signature!. You can ignore this, but if you want to fully verify your download, you need to ask people you trust to confirm that the key fingerprint belongs to zkSNACKs.

    2. [GUI] Install by double-clicking and follow the GUI Instruction.
      [CLI] In the Download repository, execute the command sudo apt install ./Wasabi-2.0.8.1.deb to install Wasabi and after that run Wasabi by executing wassabee.

    ',2),Z=e("h2",{id:"other-linux",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#other-linux"},[e("span",null,"Other Linux")])],-1),ee=e("p",null,"If you have already imported zkSNACKs' PGP public key, then jump to step 2.",-1),te={href:"https://github.com/WalletWasabi/WalletWasabi/blob/master/PGP.txt",target:"_blank",rel:"noopener noreferrer"},oe=e("code",null,"gpg --import PGP.txt",-1),ae=e("p",null,[t("Verify that the fingerprint is "),e("code",null,"6FB3 872B 5D42 292F 5992 0797 8563 4832 8949 861E"),t(" by running this command "),e("code",null,"gpg --list-keys zkSNACKs"),t(".")],-1),ne={href:"https://wasabiwallet.io/#download",target:"_blank",rel:"noopener noreferrer"},ie=e("code",null,".tar.gz",-1),le=e("code",null,".asc",-1),se=s('

    Download Wasabi Wallet for Linux

    1. In the Download folder, run gpg --verify Wasabi-2.0.8.1.tar.gz.asc Wasabi-2.0.8.1.tar.gz.

      If the message returned says Good signature from zkSNACKs and that it was signed with Primary key fingerprint: 6FB3 872B 5D42 292F 5992 0797 8563 4832 8949 861E, then the software was not tampered with since the developer signed it.

      TIP

      The output from the verify command may contain WARNING: This key is not certified with a trusted signature!. You can ignore this, but if you want to fully verify your download, you need to ask people you trust to confirm that the key fingerprint belongs to zkSNACKs.

    2. Extract the archive while keeping the file permissions: tar -pxzf Wasabi-2.0.8.1.tar.gz.

    3. Run Wasabi by executing ./wassabee.

    ',2),re=e("h2",{id:"macos",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#macos"},[e("span",null,"macOS")])],-1),de={href:"https://wasabiwallet.io/#download",target:"_blank",rel:"noopener noreferrer"},ce=e("code",null,".dmg",-1),he={href:"https://www.howtogeek.com/706226/how-to-check-if-your-mac-is-using-an-intel-or-apple-silicon-processor/",target:"_blank",rel:"noopener noreferrer"},ue=s('

    Download Wasabi Wallet for macOS

    1. Double-click .dmg to open it.

    2. Install Wasabi by dragging it into your Applications folder.

    3. At first startup, there will be a pop-up that Wasabi was downloaded from the internet. Click on Open and restart Wasabi.

    ',2),pe=e("h3",{id:"optional-pgp-verification",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#optional-pgp-verification"},[e("span",null,"Optional PGP Verification")])],-1),fe=e("p",null,"If you have already imported zkSNACKs' PGP public key, then jump to step 4.",-1),be={href:"https://www.gnupg.org/download/index.html",target:"_blank",rel:"noopener noreferrer"},ge={href:"https://github.com/WalletWasabi/WalletWasabi/blob/master/PGP.txt",target:"_blank",rel:"noopener noreferrer"},_e=e("code",null,"TextEdit",-1),we=e("code",null,"zkSNACKsPubKey.txt",-1),me=e("code",null,"Format / Make Plain Text",-1),ye=e("li",null,[e("p",null,[t("Open Terminal and go to the folder in which you saved the "),e("code",null,"zkSNACKsPubKey.txt"),t(" file and import the PGP public key with "),e("code",null,"sudo gpg --import zkSNACKsPubKey.txt"),t(". This should return the output: "),e("code",null,'key 856348328949861E: public key "zkSNACKs " imported'),t(".")])],-1),ke={href:"https://wasabiwallet.io/#download",target:"_blank",rel:"noopener noreferrer"},We=e("code",null,".dmg",-1),ve=e("code",null,".asc",-1),Pe=e("p",null,[e("img",{src:d,alt:""})],-1),xe=s('
  • In the Download folder, run sudo gpg --verify Wasabi-2.0.8.1.dmg.asc Wasabi-2.0.8.1.dmg. If the message returned says Good signature from zkSNACKs and that it was signed with Primary key fingerprint: 6FB3 872B 5D42 292F 5992 0797 8563 4832 8949 861E, then the software was not tampered with since the developer signed it.

    TIP

    The output from the verify command may contain WARNING: This key is not certified with a trusted signature!. You can ignore this, but if you want to fully verify your download, you need to ask people you trust to confirm that the key fingerprint belongs to zkSNACKs.

  • ',1),Ae={href:"https://youtu.be/ry6qIyQmzRE",target:"_blank",rel:"noopener noreferrer"},Ie=e("img",{src:c,alt:"Watch the video"},null,-1),De={href:"https://youtu.be/QHIpEYYqddE",target:"_blank",rel:"noopener noreferrer"},Se=e("img",{src:c,alt:"Watch the video"},null,-1);function Ge(Ne,ze){const i=r("router-link"),l=r("RouteLink"),a=r("ExternalLinkIcon");return g(),_("div",null,[y,e("nav",k,[e("ul",null,[e("li",null,[o(i,{to:"#introduction"},{default:n(()=>[t("Introduction")]),_:1})]),e("li",null,[o(i,{to:"#install-wasabi-step-by-step"},{default:n(()=>[t("Install Wasabi step-by-step")]),_:1})]),e("li",null,[o(i,{to:"#windows"},{default:n(()=>[t("Windows")]),_:1})]),e("li",null,[o(i,{to:"#debian-and-ubuntu"},{default:n(()=>[t("Debian and Ubuntu")]),_:1})]),e("li",null,[o(i,{to:"#other-linux"},{default:n(()=>[t("Other Linux")]),_:1})]),e("li",null,[o(i,{to:"#macos"},{default:n(()=>[t("macOS")]),_:1}),e("ul",null,[e("li",null,[o(i,{to:"#optional-pgp-verification"},{default:n(()=>[t("Optional PGP Verification")]),_:1})])])])])]),W,e("p",null,[t("The easiest way to start with Wasabi is to download, verify and install the released package. This is a version of the software that is thoroughly reviewed by the contributors. The package has the binary code that is needed to run the Wasabi Wallet client including the graphical user interface. For compiling the open-source code with cutting edge development features, also including the backend server, see this "),o(l,{to:"/using-wasabi/BuildSource.html"},{default:n(()=>[t("tutorial here")]),_:1}),t(".")]),e("p",null,[t("Download the packages either from the official "),e("a",v,[t("WasabiWallet.io"),o(a)]),t(" clearnet website or for your privacy's sake, from the official Tor onion service "),e("a",P,[t("http://wasabiukrxmkdgve5kynjztuovbg43uxcbcxn6y2okcrsg7gb6jdmbad.onion"),o(a)]),t(".")]),x,e("p",null,[t("Although there is automatic signature verification on Windows and macOS, it is still recommended to manually "),A,t(" of the downloaded package with zkSNACKs' PGP public key "),e("a",I,[t("6FB3 872B 5D42 292F 5992 0797 8563 4832 8949 861E"),o(a)]),t(" before installing Wasabi. This protects you against malicious phishing sites giving you back-doored wallet software. If you have personally verified zkSNACKs' PGP public key "),e("a",D,[t("6FB3 872B 5D42 292F 5992 0797 8563 4832 8949 861E"),o(a)]),t(" and you are familiar with the "),e("a",S,[t("Web Of Trust"),o(a)]),t(", please consider also "),e("a",G,[t("signing it"),o(a)]),t(".")]),N,z,e("ol",null,[e("li",null,[t("Download the Wasabi package relevant to your operating system from "),e("a",F,[t("wasabiwallet.io"),o(a)]),t(".")]),C,T]),K,B,e("ol",null,[e("li",null,[e("a",E,[t("Download"),o(a)]),t(" the "),O,t(" installer of the latest Wasabi release.")])]),V,L,Q,e("p",null,[t("Wasabi will be installed to your "),U,t(" folder. You will also have an icon in your Start Menu and on your Desktop. After the first run, a "),o(l,{to:"/FAQ/FAQ-UseWasabi.html#where-can-i-find-the-wasabi-data-folder"},{default:n(()=>[t("data folder")]),_:1}),t(" will be created. Among others, here is where your wallet files and your logs reside.")]),R,j,e("ol",null,[e("li",null,[e("p",null,[t("Download zkSNACKs' PGP public key "),e("a",Y,[t("here"),o(a)]),t(", and then import it with "),M,t(".")]),q]),e("li",null,[e("p",null,[e("a",H,[t("Download"),o(a)]),t(" the latest Wasabi release, both the "),J,t(" package and the corresponding "),$,t(" signature file.")])])]),X,e("p",null,[t("After the first run, a "),o(l,{to:"/FAQ/FAQ-UseWasabi.html#where-can-i-find-the-wasabi-data-folder"},{default:n(()=>[t("data folder")]),_:1}),t(" will be created. Among others, here is where your wallet files and your logs reside.")]),Z,ee,e("ol",null,[e("li",null,[e("p",null,[t("Download zkSNACKs' PGP public key "),e("a",te,[t("here"),o(a)]),t(", and then import it with "),oe,t(".")]),ae]),e("li",null,[e("p",null,[e("a",ne,[t("Download"),o(a)]),t(" the latest Wasabi release, both the "),ie,t(" archive and the corresponding "),le,t(" signature file.")])])]),se,e("p",null,[t("After the first run, a "),o(l,{to:"/FAQ/FAQ-UseWasabi.html#where-can-i-find-the-wasabi-data-folder"},{default:n(()=>[t("data folder")]),_:1}),t(" will be created. Among others, here is where your wallet files and your logs reside.")]),re,e("ol",null,[e("li",null,[e("a",de,[t("Download"),o(a)]),t(" the "),ce,t(" package of Wasabi 2.0.8.1 for your machine's processor. "),o(l,{to:"/FAQ/FAQ-Installation.html#why-are-there-two-different-packages-for-macos-intel-and-apple-silicon"},{default:n(()=>[t("There are two types of packages for macOS")]),_:1}),t(", one for Intel and one for the Apple Silicon chip. If you're not sure what processor your device has, you can "),e("a",he,[t("check it"),o(a)]),t(".")])]),ue,e("p",null,[t("After the first run, a "),o(l,{to:"/FAQ/FAQ-UseWasabi.html#where-can-i-find-the-wasabi-data-folder"},{default:n(()=>[t("data folder")]),_:1}),t(" will be created. Among others, here is where your wallet files and your logs reside.")]),pe,fe,e("ol",null,[e("li",null,[e("p",null,[e("a",be,[t("Get GnuPG"),o(a)]),t(".")])]),e("li",null,[e("p",null,[t("Copy "),e("a",ge,[t("zkSNACKs' PGP public key"),o(a)]),t(" into a new "),_e,t(" document and saving it as "),we,t(". Before saving, you need to go to "),me,t(" (otherwise TextEdit will not be able to save it as a .txt file).")])]),ye,e("li",null,[e("p",null,[e("a",ke,[t("Download"),o(a)]),t(" the latest Wasabi release, both the "),We,t(" package and the corresponding "),ve,t(" signature file.")]),Pe]),xe]),e("p",null,[e("a",Ae,[Ie,o(a)])]),e("p",null,[e("a",De,[Se,o(a)])])])}const Ke=b(m,[["render",Ge],["__file","InstallPackage.html.vue"]]),Be=JSON.parse('{"path":"/using-wasabi/InstallPackage.html","title":"Install-package","lang":"en-US","frontmatter":{"title":"Install-package","description":"A step by step guide on how to securely download, verify and install the software packages of Wasabi for Linux, Windows and Mac. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Introduction","slug":"introduction","link":"#introduction","children":[]},{"level":2,"title":"Install Wasabi step-by-step","slug":"install-wasabi-step-by-step","link":"#install-wasabi-step-by-step","children":[]},{"level":2,"title":"Windows","slug":"windows","link":"#windows","children":[]},{"level":2,"title":"Debian and Ubuntu","slug":"debian-and-ubuntu","link":"#debian-and-ubuntu","children":[]},{"level":2,"title":"Other Linux","slug":"other-linux","link":"#other-linux","children":[]},{"level":2,"title":"macOS","slug":"macos","link":"#macos","children":[{"level":3,"title":"Optional PGP Verification","slug":"optional-pgp-verification","link":"#optional-pgp-verification","children":[]}]}],"git":{"updatedTime":1720425186000},"filePathRelative":"using-wasabi/InstallPackage.md"}');export{Ke as comp,Be as data}; +import{b as h,c as u,d,_ as p,a as f}from"./DownloadMac-DUSPDgNE.js";import{_ as c}from"./Logo_without_text_with_bg_dark_with_yt-D8lqXhN0.js";import{_ as b,r,o as g,c as _,a as e,d as o,w as n,b as t,e as s}from"./app-CwImt2bI.js";const w="/DownloadAll.png",m={},y=e("h1",{id:"install-package",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#install-package"},[e("span",null,"Install package")])],-1),k={class:"table-of-contents"},W=e("h2",{id:"introduction",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#introduction"},[e("span",null,"Introduction")])],-1),v={href:"https://wasabiwallet.io",target:"_blank",rel:"noopener noreferrer"},P={href:"http://wasabiukrxmkdgve5kynjztuovbg43uxcbcxn6y2okcrsg7gb6jdmbad.onion",target:"_blank",rel:"noopener noreferrer"},x=e("p",null,[e("img",{src:w,alt:"Operating systems supported by Wasabi Wallet",title:"Operating systems supported by Wasabi Wallet"})],-1),A=e("strong",null,"VERIFY PGP SIGNATURES",-1),I={href:"https://github.com/WalletWasabi/WalletWasabi/blob/master/PGP.txt",target:"_blank",rel:"noopener noreferrer"},D={href:"https://github.com/WalletWasabi/WalletWasabi/blob/master/PGP.txt",target:"_blank",rel:"noopener noreferrer"},S={href:"https://security.stackexchange.com/questions/147447/gpg-why-is-my-trusted-key-not-certified-with-a-trusted-signature",target:"_blank",rel:"noopener noreferrer"},G={href:"https://www.gnupg.org/gph/en/manual/x334.html",target:"_blank",rel:"noopener noreferrer"},N=e("div",{class:"custom-container tip"},[e("p",{class:"custom-container-title"},"Always"),e("p",null,"Don't trust - Verify!")],-1),z=e("h2",{id:"install-wasabi-step-by-step",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#install-wasabi-step-by-step"},[e("span",null,"Install Wasabi step-by-step")])],-1),F={href:"https://wasabiwallet.io",target:"_blank",rel:"noopener noreferrer"},C=e("li",null,"Verify the PGP signatures of the download.",-1),T=e("li",null,"Install Wasabi package as you would do any other software on your operating system.",-1),K=e("hr",null,null,-1),B=e("h2",{id:"windows",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#windows"},[e("span",null,"Windows")])],-1),E={href:"https://wasabiwallet.io/#download",target:"_blank",rel:"noopener noreferrer"},O=e("code",null,".msi",-1),V=e("p",null,[e("img",{src:h,alt:"Download Wasabi Wallet for Windows",title:"Download Wasabi Wallet for Windows"})],-1),L=e("ol",{start:"2"},[e("li",null,[e("p",null,[t("Install Wasabi by double-clicking the "),e("code",null,".msi"),t(" and following the GUI instructions.")])]),e("li",null,[e("p",null,"Make sure that you see this window that verifies the installer was signed by zkSNACKs Limited. Manual PGP verification is optional, as the package is signed and verified automatically on Windows.")])],-1),Q=e("p",null,[e("img",{src:u,alt:"Wasabi Wallet Windows signature verification",title:"Wasabi Wallet Windows signature verification"})],-1),U=e("code",null,"C:\\Program Files\\WasabiWallet\\",-1),R=e("h2",{id:"debian-and-ubuntu",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#debian-and-ubuntu"},[e("span",null,"Debian and Ubuntu")])],-1),j=e("p",null,"If you have already imported zkSNACKs' PGP public key, then jump to step 2.",-1),Y={href:"https://github.com/WalletWasabi/WalletWasabi/blob/master/PGP.txt",target:"_blank",rel:"noopener noreferrer"},M=e("code",null,"gpg --import PGP.txt",-1),q=e("p",null,[t("Verify that the fingerprint is "),e("code",null,"6FB3 872B 5D42 292F 5992 0797 8563 4832 8949 861E"),t(" by running this command "),e("code",null,"gpg --list-keys zkSNACKs"),t(".")],-1),H={href:"https://wasabiwallet.io/#download",target:"_blank",rel:"noopener noreferrer"},J=e("code",null,".deb",-1),$=e("code",null,".asc",-1),X=s('

    Download Wasabi Wallet for Debian

    1. Verify the signature in the Download repository with gpg --verify Wasabi-2.0.8.1.deb.asc Wasabi-2.0.8.1.deb. If the message returned says Good signature from zkSNACKs and that it was signed with Primary key fingerprint: 6FB3 872B 5D42 292F 5992 0797 8563 4832 8949 861E, then the software was not tampered with since the developer signed it.

      TIP

      The output from the verify command may contain WARNING: This key is not certified with a trusted signature!. You can ignore this, but if you want to fully verify your download, you need to ask people you trust to confirm that the key fingerprint belongs to zkSNACKs.

    2. [GUI] Install by double-clicking and follow the GUI Instruction.
      [CLI] In the Download repository, execute the command sudo apt install ./Wasabi-2.0.8.1.deb to install Wasabi and after that run Wasabi by executing wassabee.

    ',2),Z=e("h2",{id:"other-linux",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#other-linux"},[e("span",null,"Other Linux")])],-1),ee=e("p",null,"If you have already imported zkSNACKs' PGP public key, then jump to step 2.",-1),te={href:"https://github.com/WalletWasabi/WalletWasabi/blob/master/PGP.txt",target:"_blank",rel:"noopener noreferrer"},oe=e("code",null,"gpg --import PGP.txt",-1),ae=e("p",null,[t("Verify that the fingerprint is "),e("code",null,"6FB3 872B 5D42 292F 5992 0797 8563 4832 8949 861E"),t(" by running this command "),e("code",null,"gpg --list-keys zkSNACKs"),t(".")],-1),ne={href:"https://wasabiwallet.io/#download",target:"_blank",rel:"noopener noreferrer"},ie=e("code",null,".tar.gz",-1),le=e("code",null,".asc",-1),se=s('

    Download Wasabi Wallet for Linux

    1. In the Download folder, run gpg --verify Wasabi-2.0.8.1.tar.gz.asc Wasabi-2.0.8.1.tar.gz.

      If the message returned says Good signature from zkSNACKs and that it was signed with Primary key fingerprint: 6FB3 872B 5D42 292F 5992 0797 8563 4832 8949 861E, then the software was not tampered with since the developer signed it.

      TIP

      The output from the verify command may contain WARNING: This key is not certified with a trusted signature!. You can ignore this, but if you want to fully verify your download, you need to ask people you trust to confirm that the key fingerprint belongs to zkSNACKs.

    2. Extract the archive while keeping the file permissions: tar -pxzf Wasabi-2.0.8.1.tar.gz.

    3. Run Wasabi by executing ./wassabee.

    ',2),re=e("h2",{id:"macos",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#macos"},[e("span",null,"macOS")])],-1),de={href:"https://wasabiwallet.io/#download",target:"_blank",rel:"noopener noreferrer"},ce=e("code",null,".dmg",-1),he={href:"https://www.howtogeek.com/706226/how-to-check-if-your-mac-is-using-an-intel-or-apple-silicon-processor/",target:"_blank",rel:"noopener noreferrer"},ue=s('

    Download Wasabi Wallet for macOS

    1. Double-click .dmg to open it.

    2. Install Wasabi by dragging it into your Applications folder.

    3. At first startup, there will be a pop-up that Wasabi was downloaded from the internet. Click on Open and restart Wasabi.

    ',2),pe=e("h3",{id:"optional-pgp-verification",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#optional-pgp-verification"},[e("span",null,"Optional PGP Verification")])],-1),fe=e("p",null,"If you have already imported zkSNACKs' PGP public key, then jump to step 4.",-1),be={href:"https://www.gnupg.org/download/index.html",target:"_blank",rel:"noopener noreferrer"},ge={href:"https://github.com/WalletWasabi/WalletWasabi/blob/master/PGP.txt",target:"_blank",rel:"noopener noreferrer"},_e=e("code",null,"TextEdit",-1),we=e("code",null,"zkSNACKsPubKey.txt",-1),me=e("code",null,"Format / Make Plain Text",-1),ye=e("li",null,[e("p",null,[t("Open Terminal and go to the folder in which you saved the "),e("code",null,"zkSNACKsPubKey.txt"),t(" file and import the PGP public key with "),e("code",null,"sudo gpg --import zkSNACKsPubKey.txt"),t(". This should return the output: "),e("code",null,'key 856348328949861E: public key "zkSNACKs " imported'),t(".")])],-1),ke={href:"https://wasabiwallet.io/#download",target:"_blank",rel:"noopener noreferrer"},We=e("code",null,".dmg",-1),ve=e("code",null,".asc",-1),Pe=e("p",null,[e("img",{src:d,alt:""})],-1),xe=s('
  • In the Download folder, run sudo gpg --verify Wasabi-2.0.8.1.dmg.asc Wasabi-2.0.8.1.dmg. If the message returned says Good signature from zkSNACKs and that it was signed with Primary key fingerprint: 6FB3 872B 5D42 292F 5992 0797 8563 4832 8949 861E, then the software was not tampered with since the developer signed it.

    TIP

    The output from the verify command may contain WARNING: This key is not certified with a trusted signature!. You can ignore this, but if you want to fully verify your download, you need to ask people you trust to confirm that the key fingerprint belongs to zkSNACKs.

  • ',1),Ae={href:"https://youtu.be/ry6qIyQmzRE",target:"_blank",rel:"noopener noreferrer"},Ie=e("img",{src:c,alt:"Watch the video"},null,-1),De={href:"https://youtu.be/QHIpEYYqddE",target:"_blank",rel:"noopener noreferrer"},Se=e("img",{src:c,alt:"Watch the video"},null,-1);function Ge(Ne,ze){const i=r("router-link"),l=r("RouteLink"),a=r("ExternalLinkIcon");return g(),_("div",null,[y,e("nav",k,[e("ul",null,[e("li",null,[o(i,{to:"#introduction"},{default:n(()=>[t("Introduction")]),_:1})]),e("li",null,[o(i,{to:"#install-wasabi-step-by-step"},{default:n(()=>[t("Install Wasabi step-by-step")]),_:1})]),e("li",null,[o(i,{to:"#windows"},{default:n(()=>[t("Windows")]),_:1})]),e("li",null,[o(i,{to:"#debian-and-ubuntu"},{default:n(()=>[t("Debian and Ubuntu")]),_:1})]),e("li",null,[o(i,{to:"#other-linux"},{default:n(()=>[t("Other Linux")]),_:1})]),e("li",null,[o(i,{to:"#macos"},{default:n(()=>[t("macOS")]),_:1}),e("ul",null,[e("li",null,[o(i,{to:"#optional-pgp-verification"},{default:n(()=>[t("Optional PGP Verification")]),_:1})])])])])]),W,e("p",null,[t("The easiest way to start with Wasabi is to download, verify and install the released package. This is a version of the software that is thoroughly reviewed by the contributors. The package has the binary code that is needed to run the Wasabi Wallet client including the graphical user interface. For compiling the open-source code with cutting edge development features, also including the backend server, see this "),o(l,{to:"/using-wasabi/BuildSource.html"},{default:n(()=>[t("tutorial here")]),_:1}),t(".")]),e("p",null,[t("Download the packages either from the official "),e("a",v,[t("WasabiWallet.io"),o(a)]),t(" clearnet website or for your privacy's sake, from the official Tor onion service "),e("a",P,[t("http://wasabiukrxmkdgve5kynjztuovbg43uxcbcxn6y2okcrsg7gb6jdmbad.onion"),o(a)]),t(".")]),x,e("p",null,[t("Although there is automatic signature verification on Windows and macOS, it is still recommended to manually "),A,t(" of the downloaded package with zkSNACKs' PGP public key "),e("a",I,[t("6FB3 872B 5D42 292F 5992 0797 8563 4832 8949 861E"),o(a)]),t(" before installing Wasabi. This protects you against malicious phishing sites giving you back-doored wallet software. If you have personally verified zkSNACKs' PGP public key "),e("a",D,[t("6FB3 872B 5D42 292F 5992 0797 8563 4832 8949 861E"),o(a)]),t(" and you are familiar with the "),e("a",S,[t("Web Of Trust"),o(a)]),t(", please consider also "),e("a",G,[t("signing it"),o(a)]),t(".")]),N,z,e("ol",null,[e("li",null,[t("Download the Wasabi package relevant to your operating system from "),e("a",F,[t("wasabiwallet.io"),o(a)]),t(".")]),C,T]),K,B,e("ol",null,[e("li",null,[e("a",E,[t("Download"),o(a)]),t(" the "),O,t(" installer of the latest Wasabi release.")])]),V,L,Q,e("p",null,[t("Wasabi will be installed to your "),U,t(" folder. You will also have an icon in your Start Menu and on your Desktop. After the first run, a "),o(l,{to:"/FAQ/FAQ-UseWasabi.html#where-can-i-find-the-wasabi-data-folder"},{default:n(()=>[t("data folder")]),_:1}),t(" will be created. Among others, here is where your wallet files and your logs reside.")]),R,j,e("ol",null,[e("li",null,[e("p",null,[t("Download zkSNACKs' PGP public key "),e("a",Y,[t("here"),o(a)]),t(", and then import it with "),M,t(".")]),q]),e("li",null,[e("p",null,[e("a",H,[t("Download"),o(a)]),t(" the latest Wasabi release, both the "),J,t(" package and the corresponding "),$,t(" signature file.")])])]),X,e("p",null,[t("After the first run, a "),o(l,{to:"/FAQ/FAQ-UseWasabi.html#where-can-i-find-the-wasabi-data-folder"},{default:n(()=>[t("data folder")]),_:1}),t(" will be created. Among others, here is where your wallet files and your logs reside.")]),Z,ee,e("ol",null,[e("li",null,[e("p",null,[t("Download zkSNACKs' PGP public key "),e("a",te,[t("here"),o(a)]),t(", and then import it with "),oe,t(".")]),ae]),e("li",null,[e("p",null,[e("a",ne,[t("Download"),o(a)]),t(" the latest Wasabi release, both the "),ie,t(" archive and the corresponding "),le,t(" signature file.")])])]),se,e("p",null,[t("After the first run, a "),o(l,{to:"/FAQ/FAQ-UseWasabi.html#where-can-i-find-the-wasabi-data-folder"},{default:n(()=>[t("data folder")]),_:1}),t(" will be created. Among others, here is where your wallet files and your logs reside.")]),re,e("ol",null,[e("li",null,[e("a",de,[t("Download"),o(a)]),t(" the "),ce,t(" package of Wasabi 2.0.8.1 for your machine's processor. "),o(l,{to:"/FAQ/FAQ-Installation.html#why-are-there-two-different-packages-for-macos-intel-and-apple-silicon"},{default:n(()=>[t("There are two types of packages for macOS")]),_:1}),t(", one for Intel and one for the Apple Silicon chip. If you're not sure what processor your device has, you can "),e("a",he,[t("check it"),o(a)]),t(".")])]),ue,e("p",null,[t("After the first run, a "),o(l,{to:"/FAQ/FAQ-UseWasabi.html#where-can-i-find-the-wasabi-data-folder"},{default:n(()=>[t("data folder")]),_:1}),t(" will be created. Among others, here is where your wallet files and your logs reside.")]),pe,fe,e("ol",null,[e("li",null,[e("p",null,[e("a",be,[t("Get GnuPG"),o(a)]),t(".")])]),e("li",null,[e("p",null,[t("Copy "),e("a",ge,[t("zkSNACKs' PGP public key"),o(a)]),t(" into a new "),_e,t(" document and saving it as "),we,t(". Before saving, you need to go to "),me,t(" (otherwise TextEdit will not be able to save it as a .txt file).")])]),ye,e("li",null,[e("p",null,[e("a",ke,[t("Download"),o(a)]),t(" the latest Wasabi release, both the "),We,t(" package and the corresponding "),ve,t(" signature file.")]),Pe]),xe]),e("p",null,[e("a",Ae,[Ie,o(a)])]),e("p",null,[e("a",De,[Se,o(a)])])])}const Ke=b(m,[["render",Ge],["__file","InstallPackage.html.vue"]]),Be=JSON.parse('{"path":"/using-wasabi/InstallPackage.html","title":"Install-package","lang":"en-US","frontmatter":{"title":"Install-package","description":"A step by step guide on how to securely download, verify and install the software packages of Wasabi for Linux, Windows and Mac. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Introduction","slug":"introduction","link":"#introduction","children":[]},{"level":2,"title":"Install Wasabi step-by-step","slug":"install-wasabi-step-by-step","link":"#install-wasabi-step-by-step","children":[]},{"level":2,"title":"Windows","slug":"windows","link":"#windows","children":[]},{"level":2,"title":"Debian and Ubuntu","slug":"debian-and-ubuntu","link":"#debian-and-ubuntu","children":[]},{"level":2,"title":"Other Linux","slug":"other-linux","link":"#other-linux","children":[]},{"level":2,"title":"macOS","slug":"macos","link":"#macos","children":[{"level":3,"title":"Optional PGP Verification","slug":"optional-pgp-verification","link":"#optional-pgp-verification","children":[]}]}],"git":{"updatedTime":1720425980000},"filePathRelative":"using-wasabi/InstallPackage.md"}');export{Ke as comp,Be as data}; diff --git a/assets/LICENSE.html-CcYHu7n7.js b/assets/LICENSE.html-tEi9Cyzl.js similarity index 92% rename from assets/LICENSE.html-CcYHu7n7.js rename to assets/LICENSE.html-tEi9Cyzl.js index d07f80b4e..274a875b6 100644 --- a/assets/LICENSE.html-CcYHu7n7.js +++ b/assets/LICENSE.html-tEi9Cyzl.js @@ -1 +1 @@ -import{_ as n,r as a,o,c as s,a as t,b as e,d,e as r}from"./app-3S7gIoGc.js";const c={},l=r('

    MIT License

    Wasabi Wallet and Wasabi documentation is licensed under the MIT License.

    A short and simple permissive license with conditions only requiring preservation of copyright and license notices. Licensed works, modifications, and larger works may be distributed under different terms and without source code.

    PermissionsLimitationsConditions
    Commercial useLiabilityLicense and copyright notice
    ModificationWarranty
    Distribution
    Private use
    ',4),h={href:"https://github.com/WalletWasabi/WasabiDoc/blob/master/LICENSE",target:"_blank",rel:"noopener noreferrer"};function m(p,u){const i=a("ExternalLinkIcon");return o(),s("div",null,[l,t("p",null,[e("You can check the license "),t("a",h,[e("here"),d(i)]),e(".")])])}const f=n(c,[["render",m],["__file","LICENSE.html.vue"]]),_=JSON.parse('{"path":"/building-wasabi/LICENSE.html","title":"MIT License","lang":"en-US","frontmatter":{"title":"MIT License","description":"Every line of code in Wasabi wallet and documentation is libre and open source under the MIT license. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[],"git":{"updatedTime":1720425186000},"filePathRelative":"building-wasabi/LICENSE.md"}');export{f as comp,_ as data}; +import{_ as n,r as a,o,c as s,a as t,b as e,d,e as r}from"./app-CwImt2bI.js";const c={},l=r('

    MIT License

    Wasabi Wallet and Wasabi documentation is licensed under the MIT License.

    A short and simple permissive license with conditions only requiring preservation of copyright and license notices. Licensed works, modifications, and larger works may be distributed under different terms and without source code.

    PermissionsLimitationsConditions
    Commercial useLiabilityLicense and copyright notice
    ModificationWarranty
    Distribution
    Private use
    ',4),h={href:"https://github.com/WalletWasabi/WasabiDoc/blob/master/LICENSE",target:"_blank",rel:"noopener noreferrer"};function m(p,u){const i=a("ExternalLinkIcon");return o(),s("div",null,[l,t("p",null,[e("You can check the license "),t("a",h,[e("here"),d(i)]),e(".")])])}const f=n(c,[["render",m],["__file","LICENSE.html.vue"]]),_=JSON.parse('{"path":"/building-wasabi/LICENSE.html","title":"MIT License","lang":"en-US","frontmatter":{"title":"MIT License","description":"Every line of code in Wasabi wallet and documentation is libre and open source under the MIT license. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[],"git":{"updatedTime":1720425980000},"filePathRelative":"building-wasabi/LICENSE.md"}');export{f as comp,_ as data}; diff --git a/assets/LegalConcern.html-CCv43Rfj.js b/assets/LegalConcern.html-p1dtNiIf.js similarity index 99% rename from assets/LegalConcern.html-CCv43Rfj.js rename to assets/LegalConcern.html-p1dtNiIf.js index aaa8ff45d..a6dbe69eb 100644 --- a/assets/LegalConcern.html-CCv43Rfj.js +++ b/assets/LegalConcern.html-p1dtNiIf.js @@ -1 +1 @@ -import{_ as c,r as s,o as l,c as h,a as e,d as n,w as a,b as i,e as o}from"./app-3S7gIoGc.js";const d="/AddressDistribution.png",p={},u=e("h1",{id:"coinjoin-legal-concern",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#coinjoin-legal-concern"},[e("span",null,"CoinJoin Legal Concern")])],-1),f={class:"table-of-contents"},v=o('

    Using Bitcoin and other cryptocurrencies in the everyday course of businesses is becoming more and more popular. Digital money has a lot of advantages, from unstoppable transactions to relatively low fees, and quick final settlement of international payments. But all come at a price: the blockchain stores sensitive information like the amount and involved addresses of a transaction, giving away too much business-related information to the public. However, this does not necessarily need to be the case.

    Overview

    A CoinJoin transaction obfuscates the history of a given coin, making it hard to trace the coin back to the originator of the funds. The implementation of Wasabi Wallet CoinJoin allows the original user to get back his funds with an obfuscated history.

    It is often assumed that the main problem with an obfuscated transaction history is that financial regulators may have concerns about money laundering. However, this is only the first impression, if we go into the details it can become more transparent why institutions should not worry about violating AML rules and why companies could have a direct competitive advantage using CoinJoin transactions.

    With a transparent financial track record, companies paying with cryptocurrencies may find themselves in a squeezing situation, where their suppliers, clients, and competitors are aware of all of their payment steps and prices. For institutional investors, each step would be scrutinized by the market causing intentional or unintentional price manipulation.

    While the Bitcoin blockchain does not store personal information about the owners of the specific Bitcoin addresses, using metadata makes it possible to link Bitcoin addresses to certain companies and individuals. If such a link can be established, all past and future transactions can be traced.

    CoinJoin transactions

    Difference between ordinary banking and blockchain

    The ordinary banking system is closed, a very non-transparent system, where the data inside this system is hidden from outside observers. “Only” the bank and the user know the transactions made inside the system. In opposition, the blockchain is transparent and open to everyone. This means not only the “bank” (custodial service provider) but also outsider 3rd party observers are capable of tracking these transactions.

    Service providers' obligations regarding privacy

    There is no question a service provider who keeps a record of personal information needs to deal with the different privacy regulations and act according to them. In the ordinary banking system personal financial information is handled as a secret thus preserving individual privacy from third parties. Whereas in the open blockchain system this information by the nature of the technology cannot be kept secret, so there is a large risk of a privacy leak of sensitive financial information. This is obviously not intentional and even though the personal information might be protected, the financial information is nevertheless leaked due to the pseudonym nature of the system. This information has similar sensitivity as name, address, gender, etc. so it should be handled with great care.

    CoinJoin as a privacy-preserving tool

    Since the Bitcoin blockchain is transparent, transactions cannot be kept secret. Currently, one prevalent solution in Bitcoin to gain privacy is to CoinJoin the different coins to obfuscate their history. By the use of this tool, a custodial service provider can at least start to protect its users' financial privacy.

    Privacy perspective from the companies' point of view

    The essence of competitive advantages is to keep and hold business secrets. Each and every successful company has developed its own mechanism to deliver the best products and services to its customers. To reach this, they usually use a secret sauce, called the business secret to deliver the results. If anything, when a financial payment becomes fully transparent this business secret is evaporating Let’s look a bit deeper into what exactly this means for companies, who would like to use Bitcoin as the payment method, where all transactions are recorded on the blockchain.

    Suppliers

    Companies use suppliers to acquire products and services they use in their own production stages. For these products and services, of course, they pay a reasonable price. However, this price is usually negotiable, especially in B2B relationships or large scale orders. What would happen if all of a sudden, the price of raw materials for a company becomes fully public? Other competitors can now demand similar discounts, forcing industries into a vicious cycle of price reduction. As each and every price discount is negotiated on a case by case basis, considering factors as creditworthiness and timing of payment, transparent supplier prices would only cause enormous pressure on suppliers to deal with negotiations.

    Beyond the price of products, the timing of payments is also fully transparent on the blockchain. However, in certain circumstances, it is also a crucial business secret to keep the information on the sequence of invoice payments indoors. Considering cash flow implications, it can happen that one invoice is paid on time, while other invoices are still pending payment. In the case of blockchain transactions however all payments are transparent, so it can be clear for each counterparty that only a selected number of invoices has been paid even if the sufficient funds are available which can cause unnecessary tension between business partners.

    Additionally, if all historical transactions of a company are known, its creditworthiness might be considered incorrectly. It can happen that the creditworthiness is considered better than it is if the incoming funds to a specific address are extraordinarily high, but these funds are needed in other parts of the business, so the overall solvency of the business can be still negative despite the large funds. On the other hand, creditworthiness can be considered worse than it actually is, if only a handful of addresses are taken into consideration for the solvency analysis, neglecting other forms of wealth, like other Bitcoin addresses, or fiat accounts.

    Clients

    From the client’s perspective, the factors listed under suppliers are all applicable. If a client knows the revenue stream of the company, they can draw an incorrect conclusion about the actual financial situation of a company and make a decision of purchasing a product based on this assumed financial situation. If for example, there are no incoming funds for a given period, clients may stay away from purchasing products and services, solely because they might consider the company dormant or insolvent. But in reality, the seasonality of incoming funds is not disclosed for all companies, so it can be a perfectly stable business situation to receive incoming funds only in a given period of a year, while still being able to deliver service throughout the year.

    Another aspect is the possible price negotiations on the client-side. If a client finds out that another client is paying less for a service or product, they can demand similar discounts which can result in downward price pressure in the industry. This can ultimately result in companies going out of businesses if they cannot adjust to the lower price levels which are below the equilibrium prices.

    Competitors

    Everyone can agree that the pricing structure of services is a very sensitive topic and is the core of the business secret which makes a company successful. If all competitors can look at the transactions of the company, it also means they can adjust their own pricing structure to follow the successful market leaders in the industry, causing turbulence in competition. Each company has its own pricing structure which should be coming from the internal processes, know-how, and resources. Although external factors should be considered in pricing, they should not be the main driving force in pricing decisions.

    Employees

    There is now a growing number of companies that are paying their employees salaries in bitcoin due to the trustless transactions with relatively low fees, especially with international transactions.

    With transparent transaction history, employees would be aware of each other’s salaries without the company disclosing this information. Although there are some theories supporting a transparent salary structure, up to now the majority of the companies prefer to keep salaries as secret and obligate employees to keep salary and wage information confidential. Obfuscated transaction history can help companies to keep salary information confidential which can keep a relaxed atmosphere among employees with no wage pressures.

    Phishing attacks

    Disclosing financial information for a company makes them more vulnerable to phishing attacks. If the exact time and amount of payment are publicly known, attackers can use this information to build trust with the company and squeeze out other crucial business information pretending to be a trusted partner.

    Privacy perspective from the institutional investor’s point of view

    ',31),m={href:"https://bitinfocharts.com/top-100-richest-bitcoin-addresses.html",target:"_blank",rel:"noopener noreferrer"},y=o('

    Bitcoin address distribution

    Institutional investors and cryptocurrency exchanges are holding large sums of bitcoin on a blockchain where transactions are completely transparent. These so-called whales sometimes need to move large amounts of coins for any reason which can often lead to unintentional price manipulation. If a large bitcoin holding is on the move, it can always raise concern in the media regarding the future of Bitcoin, causing unnecessary price fluctuations. In the case of unintentional price manipulation, it is difficult to prove there has been no insider trading on the institutional side, which can cause loss of faith from the clients.

    Using obfuscated transaction history in large bitcoin transactions can help to keep the market stable and avoid unintentional price manipulations.

    Resolving AML conflicts

    Privacy is not just for criminals. One of the major critiques against using CoinJoin is that if the transaction history is not known for a company, it may be used as a way to launder money. From the above-listed cases, we already see that currently using fiat payments, during the normal course of businesses, companies do not disclose all financial information as that would result in a loss of business secrets. Why would they need to do this if they are just using a new method of payment, called Bitcoin? Using privacy tools to obfuscate Bitcoin transactions is completely legal and in accordance with the current legal framework.

    User privacy

    In all jurisdictions, there are different laws and acts that are made to protect customers privacy. This is not limited only to personal data but also financial data. In the EU there is GDPR, in the USA there is the Privacy Act of 1974, in Canada, there is the Privacy Act of 1985, etc. These set different rules to be kept in order to preserve individual privacy both on personal and financial levels.

    KYC/AML

    By now in mainly all jurisdictions, custodial cryptocurrency service providers (wallet, exchange, payment processor, etc.) are requested to run KYC/AML checks on users and their transactions. The KYC process and inner policies should ensure personal data protection. The accounts are assigned to these individual users, who are verified by the provider. This means the provider identifies the user just like a legacy bank would do. The different AML checks are run on deposits or withdrawals. The suspicious transactions can be linked to users based on the transactions that are initiated by them personally. KYC and AML procedures now ensure that all transactions involving fiat (like buying and selling bitcoin on exchanges for fiat currency) have a detailed background in terms of who is sending what money to whom, the identification of transactions are even more strict than in the current banking world, where two companies or individuals can send even large funds without the need to verify their source.

    Using CoinJoin as a custodial service provider

    As soon as a user deposits the funds to any of these service providers, the funds are in one large cluster. From now on the funds are possessed by the service provider and the actual user balances are only kept on internal records. At this point all KYC/AML procedures are done, funds should be considered “clean”. The funds are controlled by the service provider and different policies are set for securing these funds (hot and cold storage, multisig, etc.). The record system of the provider will show the exact value of funds belonging to the different users. This is the time when a provider could preserve its users’ privacy by applying CoinJoin on these funds. In case of a withdrawal, coinjoined UTXOs could be sent to the user. Again, this user is already KYC-ed, the provider has full knowledge about the user. In case of a law enforcement request, all data can be provided, since the deposit history of the user in question is still available. The only thing CoinJoin does, in this case, is protecting the user from third-party observers, while the service provider is still enabled to provide data for law enforcement if requested.

    Conclusion

    Companies using Bitcoin as a method of payment currently do not have sufficient privacy regarding their financial information. Outsiders can get valuable business-related information by studying the public transaction history of a company, causing economic damage in the long run. Using CoinJoin transactions can help businesses to keep their privacy while still enjoying the benefits that Bitcoin transactions can provide. Concerns from the AML perspective are not valid, as the necessary data can be provided to authorities upon investigation requests.

    ',13);function g(b,w){const t=s("router-link"),r=s("ExternalLinkIcon");return l(),h("div",null,[u,e("nav",f,[e("ul",null,[e("li",null,[n(t,{to:"#overview"},{default:a(()=>[i("Overview")]),_:1})]),e("li",null,[n(t,{to:"#coinjoin-transactions"},{default:a(()=>[i("CoinJoin transactions")]),_:1}),e("ul",null,[e("li",null,[n(t,{to:"#difference-between-ordinary-banking-and-blockchain"},{default:a(()=>[i("Difference between ordinary banking and blockchain")]),_:1})]),e("li",null,[n(t,{to:"#service-providers-obligations-regarding-privacy"},{default:a(()=>[i("Service providers' obligations regarding privacy")]),_:1})]),e("li",null,[n(t,{to:"#coinjoin-as-a-privacy-preserving-tool"},{default:a(()=>[i("CoinJoin as a privacy-preserving tool")]),_:1})])])]),e("li",null,[n(t,{to:"#privacy-perspective-from-the-companies-point-of-view"},{default:a(()=>[i("Privacy perspective from the companies' point of view")]),_:1}),e("ul",null,[e("li",null,[n(t,{to:"#suppliers"},{default:a(()=>[i("Suppliers")]),_:1})]),e("li",null,[n(t,{to:"#clients"},{default:a(()=>[i("Clients")]),_:1})]),e("li",null,[n(t,{to:"#competitors"},{default:a(()=>[i("Competitors")]),_:1})]),e("li",null,[n(t,{to:"#employees"},{default:a(()=>[i("Employees")]),_:1})]),e("li",null,[n(t,{to:"#phishing-attacks"},{default:a(()=>[i("Phishing attacks")]),_:1})])])]),e("li",null,[n(t,{to:"#privacy-perspective-from-the-institutional-investor-s-point-of-view"},{default:a(()=>[i("Privacy perspective from the institutional investor’s point of view")]),_:1})]),e("li",null,[n(t,{to:"#resolving-aml-conflicts"},{default:a(()=>[i("Resolving AML conflicts")]),_:1}),e("ul",null,[e("li",null,[n(t,{to:"#user-privacy"},{default:a(()=>[i("User privacy")]),_:1})]),e("li",null,[n(t,{to:"#kyc-aml"},{default:a(()=>[i("KYC/AML")]),_:1})]),e("li",null,[n(t,{to:"#using-coinjoin-as-a-custodial-service-provider"},{default:a(()=>[i("Using CoinJoin as a custodial service provider")]),_:1})])])]),e("li",null,[n(t,{to:"#conclusion"},{default:a(()=>[i("Conclusion")]),_:1})])])]),v,e("p",null,[i("The Bitcoin market is considered "),e("a",m,[i("fairly concentrated"),n(r)]),i(" in the sense that out of the millions of Bitcoin addresses, less than 1% holds 87% of bitcoins.")]),y])}const C=c(p,[["render",g],["__file","LegalConcern.html.vue"]]),_=JSON.parse(`{"path":"/why-wasabi/LegalConcern.html","title":"CoinJoin Legal Concern","lang":"en-US","frontmatter":{"title":"CoinJoin Legal Concern","description":"A legal analysis on the regulation of companies utilizing CoinJoin transactions. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Overview","slug":"overview","link":"#overview","children":[]},{"level":2,"title":"CoinJoin transactions","slug":"coinjoin-transactions","link":"#coinjoin-transactions","children":[{"level":3,"title":"Difference between ordinary banking and blockchain","slug":"difference-between-ordinary-banking-and-blockchain","link":"#difference-between-ordinary-banking-and-blockchain","children":[]},{"level":3,"title":"Service providers' obligations regarding privacy","slug":"service-providers-obligations-regarding-privacy","link":"#service-providers-obligations-regarding-privacy","children":[]},{"level":3,"title":"CoinJoin as a privacy-preserving tool","slug":"coinjoin-as-a-privacy-preserving-tool","link":"#coinjoin-as-a-privacy-preserving-tool","children":[]}]},{"level":2,"title":"Privacy perspective from the companies' point of view","slug":"privacy-perspective-from-the-companies-point-of-view","link":"#privacy-perspective-from-the-companies-point-of-view","children":[{"level":3,"title":"Suppliers","slug":"suppliers","link":"#suppliers","children":[]},{"level":3,"title":"Clients","slug":"clients","link":"#clients","children":[]},{"level":3,"title":"Competitors","slug":"competitors","link":"#competitors","children":[]},{"level":3,"title":"Employees","slug":"employees","link":"#employees","children":[]},{"level":3,"title":"Phishing attacks","slug":"phishing-attacks","link":"#phishing-attacks","children":[]}]},{"level":2,"title":"Privacy perspective from the institutional investor’s point of view","slug":"privacy-perspective-from-the-institutional-investor-s-point-of-view","link":"#privacy-perspective-from-the-institutional-investor-s-point-of-view","children":[]},{"level":2,"title":"Resolving AML conflicts","slug":"resolving-aml-conflicts","link":"#resolving-aml-conflicts","children":[{"level":3,"title":"User privacy","slug":"user-privacy","link":"#user-privacy","children":[]},{"level":3,"title":"KYC/AML","slug":"kyc-aml","link":"#kyc-aml","children":[]},{"level":3,"title":"Using CoinJoin as a custodial service provider","slug":"using-coinjoin-as-a-custodial-service-provider","link":"#using-coinjoin-as-a-custodial-service-provider","children":[]}]},{"level":2,"title":"Conclusion","slug":"conclusion","link":"#conclusion","children":[]}],"git":{"updatedTime":1720425186000},"filePathRelative":"why-wasabi/LegalConcern.md"}`);export{C as comp,_ as data}; +import{_ as c,r as s,o as l,c as h,a as e,d as n,w as a,b as i,e as o}from"./app-CwImt2bI.js";const d="/AddressDistribution.png",p={},u=e("h1",{id:"coinjoin-legal-concern",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#coinjoin-legal-concern"},[e("span",null,"CoinJoin Legal Concern")])],-1),f={class:"table-of-contents"},v=o('

    Using Bitcoin and other cryptocurrencies in the everyday course of businesses is becoming more and more popular. Digital money has a lot of advantages, from unstoppable transactions to relatively low fees, and quick final settlement of international payments. But all come at a price: the blockchain stores sensitive information like the amount and involved addresses of a transaction, giving away too much business-related information to the public. However, this does not necessarily need to be the case.

    Overview

    A CoinJoin transaction obfuscates the history of a given coin, making it hard to trace the coin back to the originator of the funds. The implementation of Wasabi Wallet CoinJoin allows the original user to get back his funds with an obfuscated history.

    It is often assumed that the main problem with an obfuscated transaction history is that financial regulators may have concerns about money laundering. However, this is only the first impression, if we go into the details it can become more transparent why institutions should not worry about violating AML rules and why companies could have a direct competitive advantage using CoinJoin transactions.

    With a transparent financial track record, companies paying with cryptocurrencies may find themselves in a squeezing situation, where their suppliers, clients, and competitors are aware of all of their payment steps and prices. For institutional investors, each step would be scrutinized by the market causing intentional or unintentional price manipulation.

    While the Bitcoin blockchain does not store personal information about the owners of the specific Bitcoin addresses, using metadata makes it possible to link Bitcoin addresses to certain companies and individuals. If such a link can be established, all past and future transactions can be traced.

    CoinJoin transactions

    Difference between ordinary banking and blockchain

    The ordinary banking system is closed, a very non-transparent system, where the data inside this system is hidden from outside observers. “Only” the bank and the user know the transactions made inside the system. In opposition, the blockchain is transparent and open to everyone. This means not only the “bank” (custodial service provider) but also outsider 3rd party observers are capable of tracking these transactions.

    Service providers' obligations regarding privacy

    There is no question a service provider who keeps a record of personal information needs to deal with the different privacy regulations and act according to them. In the ordinary banking system personal financial information is handled as a secret thus preserving individual privacy from third parties. Whereas in the open blockchain system this information by the nature of the technology cannot be kept secret, so there is a large risk of a privacy leak of sensitive financial information. This is obviously not intentional and even though the personal information might be protected, the financial information is nevertheless leaked due to the pseudonym nature of the system. This information has similar sensitivity as name, address, gender, etc. so it should be handled with great care.

    CoinJoin as a privacy-preserving tool

    Since the Bitcoin blockchain is transparent, transactions cannot be kept secret. Currently, one prevalent solution in Bitcoin to gain privacy is to CoinJoin the different coins to obfuscate their history. By the use of this tool, a custodial service provider can at least start to protect its users' financial privacy.

    Privacy perspective from the companies' point of view

    The essence of competitive advantages is to keep and hold business secrets. Each and every successful company has developed its own mechanism to deliver the best products and services to its customers. To reach this, they usually use a secret sauce, called the business secret to deliver the results. If anything, when a financial payment becomes fully transparent this business secret is evaporating Let’s look a bit deeper into what exactly this means for companies, who would like to use Bitcoin as the payment method, where all transactions are recorded on the blockchain.

    Suppliers

    Companies use suppliers to acquire products and services they use in their own production stages. For these products and services, of course, they pay a reasonable price. However, this price is usually negotiable, especially in B2B relationships or large scale orders. What would happen if all of a sudden, the price of raw materials for a company becomes fully public? Other competitors can now demand similar discounts, forcing industries into a vicious cycle of price reduction. As each and every price discount is negotiated on a case by case basis, considering factors as creditworthiness and timing of payment, transparent supplier prices would only cause enormous pressure on suppliers to deal with negotiations.

    Beyond the price of products, the timing of payments is also fully transparent on the blockchain. However, in certain circumstances, it is also a crucial business secret to keep the information on the sequence of invoice payments indoors. Considering cash flow implications, it can happen that one invoice is paid on time, while other invoices are still pending payment. In the case of blockchain transactions however all payments are transparent, so it can be clear for each counterparty that only a selected number of invoices has been paid even if the sufficient funds are available which can cause unnecessary tension between business partners.

    Additionally, if all historical transactions of a company are known, its creditworthiness might be considered incorrectly. It can happen that the creditworthiness is considered better than it is if the incoming funds to a specific address are extraordinarily high, but these funds are needed in other parts of the business, so the overall solvency of the business can be still negative despite the large funds. On the other hand, creditworthiness can be considered worse than it actually is, if only a handful of addresses are taken into consideration for the solvency analysis, neglecting other forms of wealth, like other Bitcoin addresses, or fiat accounts.

    Clients

    From the client’s perspective, the factors listed under suppliers are all applicable. If a client knows the revenue stream of the company, they can draw an incorrect conclusion about the actual financial situation of a company and make a decision of purchasing a product based on this assumed financial situation. If for example, there are no incoming funds for a given period, clients may stay away from purchasing products and services, solely because they might consider the company dormant or insolvent. But in reality, the seasonality of incoming funds is not disclosed for all companies, so it can be a perfectly stable business situation to receive incoming funds only in a given period of a year, while still being able to deliver service throughout the year.

    Another aspect is the possible price negotiations on the client-side. If a client finds out that another client is paying less for a service or product, they can demand similar discounts which can result in downward price pressure in the industry. This can ultimately result in companies going out of businesses if they cannot adjust to the lower price levels which are below the equilibrium prices.

    Competitors

    Everyone can agree that the pricing structure of services is a very sensitive topic and is the core of the business secret which makes a company successful. If all competitors can look at the transactions of the company, it also means they can adjust their own pricing structure to follow the successful market leaders in the industry, causing turbulence in competition. Each company has its own pricing structure which should be coming from the internal processes, know-how, and resources. Although external factors should be considered in pricing, they should not be the main driving force in pricing decisions.

    Employees

    There is now a growing number of companies that are paying their employees salaries in bitcoin due to the trustless transactions with relatively low fees, especially with international transactions.

    With transparent transaction history, employees would be aware of each other’s salaries without the company disclosing this information. Although there are some theories supporting a transparent salary structure, up to now the majority of the companies prefer to keep salaries as secret and obligate employees to keep salary and wage information confidential. Obfuscated transaction history can help companies to keep salary information confidential which can keep a relaxed atmosphere among employees with no wage pressures.

    Phishing attacks

    Disclosing financial information for a company makes them more vulnerable to phishing attacks. If the exact time and amount of payment are publicly known, attackers can use this information to build trust with the company and squeeze out other crucial business information pretending to be a trusted partner.

    Privacy perspective from the institutional investor’s point of view

    ',31),m={href:"https://bitinfocharts.com/top-100-richest-bitcoin-addresses.html",target:"_blank",rel:"noopener noreferrer"},y=o('

    Bitcoin address distribution

    Institutional investors and cryptocurrency exchanges are holding large sums of bitcoin on a blockchain where transactions are completely transparent. These so-called whales sometimes need to move large amounts of coins for any reason which can often lead to unintentional price manipulation. If a large bitcoin holding is on the move, it can always raise concern in the media regarding the future of Bitcoin, causing unnecessary price fluctuations. In the case of unintentional price manipulation, it is difficult to prove there has been no insider trading on the institutional side, which can cause loss of faith from the clients.

    Using obfuscated transaction history in large bitcoin transactions can help to keep the market stable and avoid unintentional price manipulations.

    Resolving AML conflicts

    Privacy is not just for criminals. One of the major critiques against using CoinJoin is that if the transaction history is not known for a company, it may be used as a way to launder money. From the above-listed cases, we already see that currently using fiat payments, during the normal course of businesses, companies do not disclose all financial information as that would result in a loss of business secrets. Why would they need to do this if they are just using a new method of payment, called Bitcoin? Using privacy tools to obfuscate Bitcoin transactions is completely legal and in accordance with the current legal framework.

    User privacy

    In all jurisdictions, there are different laws and acts that are made to protect customers privacy. This is not limited only to personal data but also financial data. In the EU there is GDPR, in the USA there is the Privacy Act of 1974, in Canada, there is the Privacy Act of 1985, etc. These set different rules to be kept in order to preserve individual privacy both on personal and financial levels.

    KYC/AML

    By now in mainly all jurisdictions, custodial cryptocurrency service providers (wallet, exchange, payment processor, etc.) are requested to run KYC/AML checks on users and their transactions. The KYC process and inner policies should ensure personal data protection. The accounts are assigned to these individual users, who are verified by the provider. This means the provider identifies the user just like a legacy bank would do. The different AML checks are run on deposits or withdrawals. The suspicious transactions can be linked to users based on the transactions that are initiated by them personally. KYC and AML procedures now ensure that all transactions involving fiat (like buying and selling bitcoin on exchanges for fiat currency) have a detailed background in terms of who is sending what money to whom, the identification of transactions are even more strict than in the current banking world, where two companies or individuals can send even large funds without the need to verify their source.

    Using CoinJoin as a custodial service provider

    As soon as a user deposits the funds to any of these service providers, the funds are in one large cluster. From now on the funds are possessed by the service provider and the actual user balances are only kept on internal records. At this point all KYC/AML procedures are done, funds should be considered “clean”. The funds are controlled by the service provider and different policies are set for securing these funds (hot and cold storage, multisig, etc.). The record system of the provider will show the exact value of funds belonging to the different users. This is the time when a provider could preserve its users’ privacy by applying CoinJoin on these funds. In case of a withdrawal, coinjoined UTXOs could be sent to the user. Again, this user is already KYC-ed, the provider has full knowledge about the user. In case of a law enforcement request, all data can be provided, since the deposit history of the user in question is still available. The only thing CoinJoin does, in this case, is protecting the user from third-party observers, while the service provider is still enabled to provide data for law enforcement if requested.

    Conclusion

    Companies using Bitcoin as a method of payment currently do not have sufficient privacy regarding their financial information. Outsiders can get valuable business-related information by studying the public transaction history of a company, causing economic damage in the long run. Using CoinJoin transactions can help businesses to keep their privacy while still enjoying the benefits that Bitcoin transactions can provide. Concerns from the AML perspective are not valid, as the necessary data can be provided to authorities upon investigation requests.

    ',13);function g(b,w){const t=s("router-link"),r=s("ExternalLinkIcon");return l(),h("div",null,[u,e("nav",f,[e("ul",null,[e("li",null,[n(t,{to:"#overview"},{default:a(()=>[i("Overview")]),_:1})]),e("li",null,[n(t,{to:"#coinjoin-transactions"},{default:a(()=>[i("CoinJoin transactions")]),_:1}),e("ul",null,[e("li",null,[n(t,{to:"#difference-between-ordinary-banking-and-blockchain"},{default:a(()=>[i("Difference between ordinary banking and blockchain")]),_:1})]),e("li",null,[n(t,{to:"#service-providers-obligations-regarding-privacy"},{default:a(()=>[i("Service providers' obligations regarding privacy")]),_:1})]),e("li",null,[n(t,{to:"#coinjoin-as-a-privacy-preserving-tool"},{default:a(()=>[i("CoinJoin as a privacy-preserving tool")]),_:1})])])]),e("li",null,[n(t,{to:"#privacy-perspective-from-the-companies-point-of-view"},{default:a(()=>[i("Privacy perspective from the companies' point of view")]),_:1}),e("ul",null,[e("li",null,[n(t,{to:"#suppliers"},{default:a(()=>[i("Suppliers")]),_:1})]),e("li",null,[n(t,{to:"#clients"},{default:a(()=>[i("Clients")]),_:1})]),e("li",null,[n(t,{to:"#competitors"},{default:a(()=>[i("Competitors")]),_:1})]),e("li",null,[n(t,{to:"#employees"},{default:a(()=>[i("Employees")]),_:1})]),e("li",null,[n(t,{to:"#phishing-attacks"},{default:a(()=>[i("Phishing attacks")]),_:1})])])]),e("li",null,[n(t,{to:"#privacy-perspective-from-the-institutional-investor-s-point-of-view"},{default:a(()=>[i("Privacy perspective from the institutional investor’s point of view")]),_:1})]),e("li",null,[n(t,{to:"#resolving-aml-conflicts"},{default:a(()=>[i("Resolving AML conflicts")]),_:1}),e("ul",null,[e("li",null,[n(t,{to:"#user-privacy"},{default:a(()=>[i("User privacy")]),_:1})]),e("li",null,[n(t,{to:"#kyc-aml"},{default:a(()=>[i("KYC/AML")]),_:1})]),e("li",null,[n(t,{to:"#using-coinjoin-as-a-custodial-service-provider"},{default:a(()=>[i("Using CoinJoin as a custodial service provider")]),_:1})])])]),e("li",null,[n(t,{to:"#conclusion"},{default:a(()=>[i("Conclusion")]),_:1})])])]),v,e("p",null,[i("The Bitcoin market is considered "),e("a",m,[i("fairly concentrated"),n(r)]),i(" in the sense that out of the millions of Bitcoin addresses, less than 1% holds 87% of bitcoins.")]),y])}const C=c(p,[["render",g],["__file","LegalConcern.html.vue"]]),_=JSON.parse(`{"path":"/why-wasabi/LegalConcern.html","title":"CoinJoin Legal Concern","lang":"en-US","frontmatter":{"title":"CoinJoin Legal Concern","description":"A legal analysis on the regulation of companies utilizing CoinJoin transactions. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Overview","slug":"overview","link":"#overview","children":[]},{"level":2,"title":"CoinJoin transactions","slug":"coinjoin-transactions","link":"#coinjoin-transactions","children":[{"level":3,"title":"Difference between ordinary banking and blockchain","slug":"difference-between-ordinary-banking-and-blockchain","link":"#difference-between-ordinary-banking-and-blockchain","children":[]},{"level":3,"title":"Service providers' obligations regarding privacy","slug":"service-providers-obligations-regarding-privacy","link":"#service-providers-obligations-regarding-privacy","children":[]},{"level":3,"title":"CoinJoin as a privacy-preserving tool","slug":"coinjoin-as-a-privacy-preserving-tool","link":"#coinjoin-as-a-privacy-preserving-tool","children":[]}]},{"level":2,"title":"Privacy perspective from the companies' point of view","slug":"privacy-perspective-from-the-companies-point-of-view","link":"#privacy-perspective-from-the-companies-point-of-view","children":[{"level":3,"title":"Suppliers","slug":"suppliers","link":"#suppliers","children":[]},{"level":3,"title":"Clients","slug":"clients","link":"#clients","children":[]},{"level":3,"title":"Competitors","slug":"competitors","link":"#competitors","children":[]},{"level":3,"title":"Employees","slug":"employees","link":"#employees","children":[]},{"level":3,"title":"Phishing attacks","slug":"phishing-attacks","link":"#phishing-attacks","children":[]}]},{"level":2,"title":"Privacy perspective from the institutional investor’s point of view","slug":"privacy-perspective-from-the-institutional-investor-s-point-of-view","link":"#privacy-perspective-from-the-institutional-investor-s-point-of-view","children":[]},{"level":2,"title":"Resolving AML conflicts","slug":"resolving-aml-conflicts","link":"#resolving-aml-conflicts","children":[{"level":3,"title":"User privacy","slug":"user-privacy","link":"#user-privacy","children":[]},{"level":3,"title":"KYC/AML","slug":"kyc-aml","link":"#kyc-aml","children":[]},{"level":3,"title":"Using CoinJoin as a custodial service provider","slug":"using-coinjoin-as-a-custodial-service-provider","link":"#using-coinjoin-as-a-custodial-service-provider","children":[]}]},{"level":2,"title":"Conclusion","slug":"conclusion","link":"#conclusion","children":[]}],"git":{"updatedTime":1720425980000},"filePathRelative":"why-wasabi/LegalConcern.md"}`);export{C as comp,_ as data}; diff --git a/assets/NetworkLevelPrivacy.html-BkVkjp52.js b/assets/NetworkLevelPrivacy.html-yEBz1wzp.js similarity index 99% rename from assets/NetworkLevelPrivacy.html-BkVkjp52.js rename to assets/NetworkLevelPrivacy.html-yEBz1wzp.js index d0e392ab0..0e996e1ab 100644 --- a/assets/NetworkLevelPrivacy.html-BkVkjp52.js +++ b/assets/NetworkLevelPrivacy.html-yEBz1wzp.js @@ -1 +1 @@ -import{_ as c}from"./Logo_without_text_with_bg_dark_with_yt-D8lqXhN0.js";import{_ as d,r,o as h,c as u,a as e,d as a,w as i,b as t,e as s}from"./app-3S7gIoGc.js";const p={},f=e("h1",{id:"network-level-privacy-bitcoin-core-vs-wasabi-wallet",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#network-level-privacy-bitcoin-core-vs-wasabi-wallet"},[e("span",null,"Network-Level Privacy - Bitcoin Core vs Wasabi Wallet")])],-1),b=e("p",null,"Bitcoin is a peer-to-peer network of full nodes that define, verify, and enforce the Bitcoin consensus rules. There is a lot of communication between them and metadata can be used to de-anonymize Bitcoin users.",-1),v={class:"table-of-contents"},m=e("h2",{id:"problem",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#problem"},[e("span",null,"Problem")])],-1),g=e("h3",{id:"clearnet-light-clients",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#clearnet-light-clients"},[e("span",null,"Clearnet light clients")])],-1),y=e("p",null,"When the communication to the network is unencrypted over clearnet, then there is an easy correlation of the Bitcoin transactions to the IP address of the peer who sent it. The IP address can even be used to find the physical location of the user!",-1),k=e("p",null,"A Bitcoin full node broadcasts not just the transactions of its user, but it also gossips all of the other transactions that it has received from its peers. Thus it is very difficult to find out which transactions originated from which full node. However, when a node or a wallet does not gossip all transactions, but only the transactions of its user, then it is easier to find out which node has sent those specific transactions.",-1),w={href:"https://github.com/bitcoin/bips/blob/master/bip-0037.mediawiki",target:"_blank",rel:"noopener noreferrer"},_={href:"https://jonasnick.github.io/blog/2015/02/12/privacy-in-bitcoinj/",target:"_blank",rel:"noopener noreferrer"},T={href:"https://www.reddit.com/r/Bitcoin/comments/2feox9/electrum_securityprivacy_model/ck8szc0/",target:"_blank",rel:"noopener noreferrer"},B=s('

    DANGER

    When the user sends the extended public key or a filter of all the addresses to the central server, then the server can COMPLETELY deanonymize the users.

    Wasabi's solution

    Full node by default & block filters over Tor

    Wasabi checks if there is a local Tor instance installed, and if so, it uses this to onion-route all the traffic to and from the network. If Tor is not already installed, then it is accessed automatically from within Wasabi. This means that by default, all network communication is secured from outside snooping and the IP address is hidden.

    ',4),P={href:"https://github.com/bitcoin/bitcoin",target:"_blank",rel:"noopener noreferrer"},W={class:"custom-container tip"},x=e("p",{class:"custom-container-title"},"Wasabi ships with Bitcoin Knots!",-1),I={href:"https://github.com/bitcoin/bips/blob/master/bip-0158.mediawiki",target:"_blank",rel:"noopener noreferrer"},C=s('

    Privacy by default!

    Wasabi has network-level privacy as good as a Bitcoin full node.

    In-depth comparison

    Furthermore, network-level privacy consists of two sub-categories.

    • Private UTXO Retrieval
    • Private Transaction Broadcasting

    Bitcoin Core

    Private UTXO retrieval

    Bitcoin Core downloads all the blocks ever created and establishes your wallet balances locally. This is as good as it gets.

    Private transaction broadcasting

    Bitcoin Core broadcasts transactions to other peers on the clearnet, unencrypted. Other peers cannot figure out which transaction originates from a specific node because Core does not only broadcast its own transactions but also propagates every other transaction that hits its mempool. However, some papers note it’s not bulletproof:

    ',9),N={href:"https://github.com/bitcoin/bips/blob/master/bip-0156.mediawiki",target:"_blank",rel:"noopener noreferrer"},A=s('

    Adversaries identified

    • Malicious Peer
    • Supernode

    Bitcoin Core + Tor

    You can use Bitcoin Core with Tor, which solves some of the above-mentioned issues. In this case, a supernode cannot track back transactions to your IP address.

    An entity that can break Tor is a universal adversary, however, most Tor attacks are not possible if exit nodes are not involved. It is reasonable to assume that this entity can break the onion routing, not Tor's encryption itself.

    Adversaries identified

    • Tor breaker

    Wasabi Wallet light node

    Private UTXO retrieval

    The backend server serves block filters to all the clients over Tor. From those filters, the clients figure out which blocks they are interested in and download them [and some false positive blocks] from peers. One block per peer, and always over a fresh Tor stream. When a block is acquired, the peer gets disconnected. Because of the end-to-end encryption of the onion network, it immediately defeats an ISP adversary and makes the already impossible job of the Sybil adversary even more impossible. The only adversary that could possibly overcome this would have to setup thousands of full nodes over Tor and also break Tor itself.

    Private transaction broadcasting

    All Wasabi traffic is tunneled through Tor. Wasabi connects only to onion nodes, so end-to-end encryption is enforced between the wallet and peers. All this without involving any exit node. Wasabi connects to each peer through a different Tor stream. A new Bitcoin peer is chosen for every transaction broadcast.

    Everything over Tor!

    Wasabi broadcast transactions to only one peer over Tor, and immediately after that the peer is disconnected.

    Adversaries identified

    • ISP
    • Tor Breaker Sybil Attacker With Thousands Of Full Nodes Over Onion

    Wasabi Wallet + full node

    TIP

    Wasabi has a partial Bitcoin Knots integration. This means that it is possible (but not mandatory) to start Bitcoin Knots during the launch of Wasabi, without having to install or configure anything manually.

    Private UTXO retrieval

    If you have a listening full node running in the background (not only Bitcoin Core, any full node) then Wasabi automatically picks it up and instead of asking peers for blocks, it asks for blocks from your own node. Using Wasabi this way results in the same privacy model as Bitcoin Core's, regarding Private UTXO Retrieval.

    Private transaction broadcasting

    Even when Wasabi is connected to your own node, it will broadcast the transaction in the above-described way: to one new peer over Tor.

    Universal Attacks

    Every time you use software that interacts with a Bitcoin network, and especially a Bitcoin node, you leave a sticky fingerprint in your traffic. It comes in the form of a small but unavoidable spike in volume every time a new block is mined and the nodes start gossiping about it. The blocks in Bitcoin are quite big, and the propagation speed is critical for consensus (greater delay means more frequent accidental forks), so such effect is predictable, and, in a sense, inherent to the Bitcoin architecture.

    ',23),S={href:"https://github.com/bitcoin/bips/blob/master/bip-0152.mediawiki",target:"_blank",rel:"noopener noreferrer"},L={href:"https://m417z.com/bitsniff/",target:"_blank",rel:"noopener noreferrer"},E=s('

    Protection

    There are many ways to go about it, but staying completely undetected is far from trivial - traditional privacy-enhancing tools mostly focus on the packet level, which is orthogonal to the technique. Let’s break down the potential defense vectors.

    • VPN / Tor - unlikely to affect the time series shape much, and therefore for larger traffic lengths the statistical significance of block-related spikes will inevitably become overwhelming.

    • Traffic mixing - for traffic volumes that are orders of magnitude higher than Bitcoin P2P communications, mixing is likely to be very effective. That would, however, demand constant shielding of both upstream and downstream communications, and couldn't be done effectively by just running the node on a general-purpose machine - any noticeably long unshielded period may be enough for detection.

    • Being your own ISP - too spicy for most, but that should work.

    • Blockstream Satellite - the ultimate solution. Eliminates the traffic analysis threat altogether.

    Beyond active measures available now, both the privacy and the bandwidth efficiency of Bitcoin communications are actively worked on. It is entirely possible that the messaging protocol will get to the point where block propagation doesn't trigger any significant spikes in traffic volume.

    ',4),O={href:"https://79jke.github.io/BitSniff/",target:"_blank",rel:"noopener noreferrer"},q={href:"https://m417z.com/bitsniff/",target:"_blank",rel:"noopener noreferrer"},U={href:"https://youtu.be/9S8xsDq3PTU",target:"_blank",rel:"noopener noreferrer"},F=e("img",{src:c,alt:"Watch the video"},null,-1);function R(V,j){const o=r("router-link"),n=r("ExternalLinkIcon"),l=r("RouteLink");return h(),u("div",null,[f,b,e("nav",v,[e("ul",null,[e("li",null,[a(o,{to:"#problem"},{default:i(()=>[t("Problem")]),_:1}),e("ul",null,[e("li",null,[a(o,{to:"#clearnet-light-clients"},{default:i(()=>[t("Clearnet light clients")]),_:1})])])]),e("li",null,[a(o,{to:"#wasabi-s-solution"},{default:i(()=>[t("Wasabi's solution")]),_:1}),e("ul",null,[e("li",null,[a(o,{to:"#full-node-by-default-block-filters-over-tor"},{default:i(()=>[t("Full node by default & block filters over Tor")]),_:1})])])]),e("li",null,[a(o,{to:"#in-depth-comparison"},{default:i(()=>[t("In-depth comparison")]),_:1}),e("ul",null,[e("li",null,[a(o,{to:"#bitcoin-core"},{default:i(()=>[t("Bitcoin Core")]),_:1})]),e("li",null,[a(o,{to:"#bitcoin-core-tor"},{default:i(()=>[t("Bitcoin Core + Tor")]),_:1})]),e("li",null,[a(o,{to:"#wasabi-wallet-light-node"},{default:i(()=>[t("Wasabi Wallet light node")]),_:1})]),e("li",null,[a(o,{to:"#wasabi-wallet-full-node"},{default:i(()=>[t("Wasabi Wallet + full node")]),_:1})])])]),e("li",null,[a(o,{to:"#universal-attacks"},{default:i(()=>[t("Universal Attacks")]),_:1}),e("ul",null,[e("li",null,[a(o,{to:"#protection"},{default:i(()=>[t("Protection")]),_:1})])])])])]),m,g,y,k,e("p",null,[t("There are light wallets, which query a backend server to get information regarding specific addresses or use "),e("a",w,[t("BIP 37"),a(n)]),t(" bloom filtering SPV wallet protocol, which is "),e("a",_,[t("extremely bad for privacy"),a(n)]),t(". And there is Electrum, which "),e("a",T,[t("sends your addresses"),a(n)]),t(" to random Electrum servers.")]),B,e("p",null,[t("In order to fully verify everything, running a full node is essential. If "),e("a",P,[t("bitcoind"),a(n)]),t(" is installed and run on the same computer as Wasabi, then it will automatically and by default connect to the full node. It is also possible to connect Wasabi to a remote full node on another computer by specifying the local IP address or Tor onion service in the settings. Then, Wasabi pulls the verified blocks and queries the mempool from the full node.")]),e("div",W,[x,e("p",null,[t("Wasabi has a "),a(l,{to:"/using-wasabi/BitcoinFullNode.html"},{default:i(()=>[t("partial Bitcoin Knots integration")]),_:1}),t(". This means that it is possible (but not mandatory) to start Bitcoin Knots during the launch of Wasabi, without having to install or configure anything manually.")])]),e("p",null,[t("However, even if no full node is installed, Wasabi has a light client mode based on "),e("a",I,[t("BIP 158 block filters"),a(n)]),t(". The Wasabi server sends a filter of all the transactions in each block to all the users. Then, users check locally if the block contains any transactions with their addresses. If not, then the filter is stored for later reference, and no block is downloaded. However, if there is a user transaction in that block, then Wasabi connects to a random Bitcoin P2P node over Tor and asks for this entire block, not only one transaction. This block request is indistinguishable from the regular P2P gossip, and thus nobody, neither the server nor the full node, know which addresses belong to the user.")]),C,e("blockquote",null,[e("p",null,[t("Bitcoin transaction propagation does not hide the source of a transaction very well, especially against a “supernode” eavesdropper that forms a large number of outgoing connections to reachable nodes on the network. "),e("a",N,[t("Dandelion: Privacy-Preserving Transaction Propagation"),a(n)]),t(".")])]),A,e("p",null,[t("Notably, the volume of block-related messages was drastically reduced since the introduction of Compact Block Relay ("),e("a",S,[t("BIP 152"),a(n)]),t(". Instead of requesting whole blocks, mostly consisting of transactions already known to the node, the peer informed of a new block is only requesting the missing transactions. Yet the amount of extra communications in the seconds following a new block is still considerable. This effect may not be noticeable for a single block, but over time it gets statistically significant and may get exploited.")]),e("p",null,[t("As reported by "),e("a",L,[t("Niko Kudriastev and Michael Maltsev"),a(n)]),t(", it is possible to detect Bitcoin communications using nothing but traffic volume over time - a piece of information even most privacy concerned individuals are likely leaking to their law-abiding Internet Service Provider. In this case, using a VPN and running the node over Tor may not be enough to avoid being detected.")]),E,e("p",null,[t("You can read more about BitSniff "),e("a",O,[t("here"),a(n)]),t(" and check the interactive demo "),e("a",q,[t("here"),a(n)]),t(".")]),e("p",null,[e("a",U,[F,a(n)])])])}const X=d(p,[["render",R],["__file","NetworkLevelPrivacy.html.vue"]]),H=JSON.parse(`{"path":"/why-wasabi/NetworkLevelPrivacy.html","title":"Network-Level Privacy","lang":"en-US","frontmatter":{"title":"Network-Level Privacy","description":"A comparison of the network-level privacy of Wasabi wallet and Bitcoin Core. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Problem","slug":"problem","link":"#problem","children":[{"level":3,"title":"Clearnet light clients","slug":"clearnet-light-clients","link":"#clearnet-light-clients","children":[]}]},{"level":2,"title":"Wasabi's solution","slug":"wasabi-s-solution","link":"#wasabi-s-solution","children":[{"level":3,"title":"Full node by default & block filters over Tor","slug":"full-node-by-default-block-filters-over-tor","link":"#full-node-by-default-block-filters-over-tor","children":[]}]},{"level":2,"title":"In-depth comparison","slug":"in-depth-comparison","link":"#in-depth-comparison","children":[{"level":3,"title":"Bitcoin Core","slug":"bitcoin-core","link":"#bitcoin-core","children":[]},{"level":3,"title":"Bitcoin Core + Tor","slug":"bitcoin-core-tor","link":"#bitcoin-core-tor","children":[]},{"level":3,"title":"Wasabi Wallet light node","slug":"wasabi-wallet-light-node","link":"#wasabi-wallet-light-node","children":[]},{"level":3,"title":"Wasabi Wallet + full node","slug":"wasabi-wallet-full-node","link":"#wasabi-wallet-full-node","children":[]}]},{"level":2,"title":"Universal Attacks","slug":"universal-attacks","link":"#universal-attacks","children":[{"level":3,"title":"Protection","slug":"protection","link":"#protection","children":[]}]}],"git":{"updatedTime":1720425186000},"filePathRelative":"why-wasabi/NetworkLevelPrivacy.md"}`);export{X as comp,H as data}; +import{_ as c}from"./Logo_without_text_with_bg_dark_with_yt-D8lqXhN0.js";import{_ as d,r,o as h,c as u,a as e,d as a,w as i,b as t,e as s}from"./app-CwImt2bI.js";const p={},f=e("h1",{id:"network-level-privacy-bitcoin-core-vs-wasabi-wallet",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#network-level-privacy-bitcoin-core-vs-wasabi-wallet"},[e("span",null,"Network-Level Privacy - Bitcoin Core vs Wasabi Wallet")])],-1),b=e("p",null,"Bitcoin is a peer-to-peer network of full nodes that define, verify, and enforce the Bitcoin consensus rules. There is a lot of communication between them and metadata can be used to de-anonymize Bitcoin users.",-1),v={class:"table-of-contents"},m=e("h2",{id:"problem",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#problem"},[e("span",null,"Problem")])],-1),g=e("h3",{id:"clearnet-light-clients",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#clearnet-light-clients"},[e("span",null,"Clearnet light clients")])],-1),y=e("p",null,"When the communication to the network is unencrypted over clearnet, then there is an easy correlation of the Bitcoin transactions to the IP address of the peer who sent it. The IP address can even be used to find the physical location of the user!",-1),k=e("p",null,"A Bitcoin full node broadcasts not just the transactions of its user, but it also gossips all of the other transactions that it has received from its peers. Thus it is very difficult to find out which transactions originated from which full node. However, when a node or a wallet does not gossip all transactions, but only the transactions of its user, then it is easier to find out which node has sent those specific transactions.",-1),w={href:"https://github.com/bitcoin/bips/blob/master/bip-0037.mediawiki",target:"_blank",rel:"noopener noreferrer"},_={href:"https://jonasnick.github.io/blog/2015/02/12/privacy-in-bitcoinj/",target:"_blank",rel:"noopener noreferrer"},T={href:"https://www.reddit.com/r/Bitcoin/comments/2feox9/electrum_securityprivacy_model/ck8szc0/",target:"_blank",rel:"noopener noreferrer"},B=s('

    DANGER

    When the user sends the extended public key or a filter of all the addresses to the central server, then the server can COMPLETELY deanonymize the users.

    Wasabi's solution

    Full node by default & block filters over Tor

    Wasabi checks if there is a local Tor instance installed, and if so, it uses this to onion-route all the traffic to and from the network. If Tor is not already installed, then it is accessed automatically from within Wasabi. This means that by default, all network communication is secured from outside snooping and the IP address is hidden.

    ',4),P={href:"https://github.com/bitcoin/bitcoin",target:"_blank",rel:"noopener noreferrer"},W={class:"custom-container tip"},x=e("p",{class:"custom-container-title"},"Wasabi ships with Bitcoin Knots!",-1),I={href:"https://github.com/bitcoin/bips/blob/master/bip-0158.mediawiki",target:"_blank",rel:"noopener noreferrer"},C=s('

    Privacy by default!

    Wasabi has network-level privacy as good as a Bitcoin full node.

    In-depth comparison

    Furthermore, network-level privacy consists of two sub-categories.

    • Private UTXO Retrieval
    • Private Transaction Broadcasting

    Bitcoin Core

    Private UTXO retrieval

    Bitcoin Core downloads all the blocks ever created and establishes your wallet balances locally. This is as good as it gets.

    Private transaction broadcasting

    Bitcoin Core broadcasts transactions to other peers on the clearnet, unencrypted. Other peers cannot figure out which transaction originates from a specific node because Core does not only broadcast its own transactions but also propagates every other transaction that hits its mempool. However, some papers note it’s not bulletproof:

    ',9),N={href:"https://github.com/bitcoin/bips/blob/master/bip-0156.mediawiki",target:"_blank",rel:"noopener noreferrer"},A=s('

    Adversaries identified

    • Malicious Peer
    • Supernode

    Bitcoin Core + Tor

    You can use Bitcoin Core with Tor, which solves some of the above-mentioned issues. In this case, a supernode cannot track back transactions to your IP address.

    An entity that can break Tor is a universal adversary, however, most Tor attacks are not possible if exit nodes are not involved. It is reasonable to assume that this entity can break the onion routing, not Tor's encryption itself.

    Adversaries identified

    • Tor breaker

    Wasabi Wallet light node

    Private UTXO retrieval

    The backend server serves block filters to all the clients over Tor. From those filters, the clients figure out which blocks they are interested in and download them [and some false positive blocks] from peers. One block per peer, and always over a fresh Tor stream. When a block is acquired, the peer gets disconnected. Because of the end-to-end encryption of the onion network, it immediately defeats an ISP adversary and makes the already impossible job of the Sybil adversary even more impossible. The only adversary that could possibly overcome this would have to setup thousands of full nodes over Tor and also break Tor itself.

    Private transaction broadcasting

    All Wasabi traffic is tunneled through Tor. Wasabi connects only to onion nodes, so end-to-end encryption is enforced between the wallet and peers. All this without involving any exit node. Wasabi connects to each peer through a different Tor stream. A new Bitcoin peer is chosen for every transaction broadcast.

    Everything over Tor!

    Wasabi broadcast transactions to only one peer over Tor, and immediately after that the peer is disconnected.

    Adversaries identified

    • ISP
    • Tor Breaker Sybil Attacker With Thousands Of Full Nodes Over Onion

    Wasabi Wallet + full node

    TIP

    Wasabi has a partial Bitcoin Knots integration. This means that it is possible (but not mandatory) to start Bitcoin Knots during the launch of Wasabi, without having to install or configure anything manually.

    Private UTXO retrieval

    If you have a listening full node running in the background (not only Bitcoin Core, any full node) then Wasabi automatically picks it up and instead of asking peers for blocks, it asks for blocks from your own node. Using Wasabi this way results in the same privacy model as Bitcoin Core's, regarding Private UTXO Retrieval.

    Private transaction broadcasting

    Even when Wasabi is connected to your own node, it will broadcast the transaction in the above-described way: to one new peer over Tor.

    Universal Attacks

    Every time you use software that interacts with a Bitcoin network, and especially a Bitcoin node, you leave a sticky fingerprint in your traffic. It comes in the form of a small but unavoidable spike in volume every time a new block is mined and the nodes start gossiping about it. The blocks in Bitcoin are quite big, and the propagation speed is critical for consensus (greater delay means more frequent accidental forks), so such effect is predictable, and, in a sense, inherent to the Bitcoin architecture.

    ',23),S={href:"https://github.com/bitcoin/bips/blob/master/bip-0152.mediawiki",target:"_blank",rel:"noopener noreferrer"},L={href:"https://m417z.com/bitsniff/",target:"_blank",rel:"noopener noreferrer"},E=s('

    Protection

    There are many ways to go about it, but staying completely undetected is far from trivial - traditional privacy-enhancing tools mostly focus on the packet level, which is orthogonal to the technique. Let’s break down the potential defense vectors.

    • VPN / Tor - unlikely to affect the time series shape much, and therefore for larger traffic lengths the statistical significance of block-related spikes will inevitably become overwhelming.

    • Traffic mixing - for traffic volumes that are orders of magnitude higher than Bitcoin P2P communications, mixing is likely to be very effective. That would, however, demand constant shielding of both upstream and downstream communications, and couldn't be done effectively by just running the node on a general-purpose machine - any noticeably long unshielded period may be enough for detection.

    • Being your own ISP - too spicy for most, but that should work.

    • Blockstream Satellite - the ultimate solution. Eliminates the traffic analysis threat altogether.

    Beyond active measures available now, both the privacy and the bandwidth efficiency of Bitcoin communications are actively worked on. It is entirely possible that the messaging protocol will get to the point where block propagation doesn't trigger any significant spikes in traffic volume.

    ',4),O={href:"https://79jke.github.io/BitSniff/",target:"_blank",rel:"noopener noreferrer"},q={href:"https://m417z.com/bitsniff/",target:"_blank",rel:"noopener noreferrer"},U={href:"https://youtu.be/9S8xsDq3PTU",target:"_blank",rel:"noopener noreferrer"},F=e("img",{src:c,alt:"Watch the video"},null,-1);function R(V,j){const o=r("router-link"),n=r("ExternalLinkIcon"),l=r("RouteLink");return h(),u("div",null,[f,b,e("nav",v,[e("ul",null,[e("li",null,[a(o,{to:"#problem"},{default:i(()=>[t("Problem")]),_:1}),e("ul",null,[e("li",null,[a(o,{to:"#clearnet-light-clients"},{default:i(()=>[t("Clearnet light clients")]),_:1})])])]),e("li",null,[a(o,{to:"#wasabi-s-solution"},{default:i(()=>[t("Wasabi's solution")]),_:1}),e("ul",null,[e("li",null,[a(o,{to:"#full-node-by-default-block-filters-over-tor"},{default:i(()=>[t("Full node by default & block filters over Tor")]),_:1})])])]),e("li",null,[a(o,{to:"#in-depth-comparison"},{default:i(()=>[t("In-depth comparison")]),_:1}),e("ul",null,[e("li",null,[a(o,{to:"#bitcoin-core"},{default:i(()=>[t("Bitcoin Core")]),_:1})]),e("li",null,[a(o,{to:"#bitcoin-core-tor"},{default:i(()=>[t("Bitcoin Core + Tor")]),_:1})]),e("li",null,[a(o,{to:"#wasabi-wallet-light-node"},{default:i(()=>[t("Wasabi Wallet light node")]),_:1})]),e("li",null,[a(o,{to:"#wasabi-wallet-full-node"},{default:i(()=>[t("Wasabi Wallet + full node")]),_:1})])])]),e("li",null,[a(o,{to:"#universal-attacks"},{default:i(()=>[t("Universal Attacks")]),_:1}),e("ul",null,[e("li",null,[a(o,{to:"#protection"},{default:i(()=>[t("Protection")]),_:1})])])])])]),m,g,y,k,e("p",null,[t("There are light wallets, which query a backend server to get information regarding specific addresses or use "),e("a",w,[t("BIP 37"),a(n)]),t(" bloom filtering SPV wallet protocol, which is "),e("a",_,[t("extremely bad for privacy"),a(n)]),t(". And there is Electrum, which "),e("a",T,[t("sends your addresses"),a(n)]),t(" to random Electrum servers.")]),B,e("p",null,[t("In order to fully verify everything, running a full node is essential. If "),e("a",P,[t("bitcoind"),a(n)]),t(" is installed and run on the same computer as Wasabi, then it will automatically and by default connect to the full node. It is also possible to connect Wasabi to a remote full node on another computer by specifying the local IP address or Tor onion service in the settings. Then, Wasabi pulls the verified blocks and queries the mempool from the full node.")]),e("div",W,[x,e("p",null,[t("Wasabi has a "),a(l,{to:"/using-wasabi/BitcoinFullNode.html"},{default:i(()=>[t("partial Bitcoin Knots integration")]),_:1}),t(". This means that it is possible (but not mandatory) to start Bitcoin Knots during the launch of Wasabi, without having to install or configure anything manually.")])]),e("p",null,[t("However, even if no full node is installed, Wasabi has a light client mode based on "),e("a",I,[t("BIP 158 block filters"),a(n)]),t(". The Wasabi server sends a filter of all the transactions in each block to all the users. Then, users check locally if the block contains any transactions with their addresses. If not, then the filter is stored for later reference, and no block is downloaded. However, if there is a user transaction in that block, then Wasabi connects to a random Bitcoin P2P node over Tor and asks for this entire block, not only one transaction. This block request is indistinguishable from the regular P2P gossip, and thus nobody, neither the server nor the full node, know which addresses belong to the user.")]),C,e("blockquote",null,[e("p",null,[t("Bitcoin transaction propagation does not hide the source of a transaction very well, especially against a “supernode” eavesdropper that forms a large number of outgoing connections to reachable nodes on the network. "),e("a",N,[t("Dandelion: Privacy-Preserving Transaction Propagation"),a(n)]),t(".")])]),A,e("p",null,[t("Notably, the volume of block-related messages was drastically reduced since the introduction of Compact Block Relay ("),e("a",S,[t("BIP 152"),a(n)]),t(". Instead of requesting whole blocks, mostly consisting of transactions already known to the node, the peer informed of a new block is only requesting the missing transactions. Yet the amount of extra communications in the seconds following a new block is still considerable. This effect may not be noticeable for a single block, but over time it gets statistically significant and may get exploited.")]),e("p",null,[t("As reported by "),e("a",L,[t("Niko Kudriastev and Michael Maltsev"),a(n)]),t(", it is possible to detect Bitcoin communications using nothing but traffic volume over time - a piece of information even most privacy concerned individuals are likely leaking to their law-abiding Internet Service Provider. In this case, using a VPN and running the node over Tor may not be enough to avoid being detected.")]),E,e("p",null,[t("You can read more about BitSniff "),e("a",O,[t("here"),a(n)]),t(" and check the interactive demo "),e("a",q,[t("here"),a(n)]),t(".")]),e("p",null,[e("a",U,[F,a(n)])])])}const X=d(p,[["render",R],["__file","NetworkLevelPrivacy.html.vue"]]),H=JSON.parse(`{"path":"/why-wasabi/NetworkLevelPrivacy.html","title":"Network-Level Privacy","lang":"en-US","frontmatter":{"title":"Network-Level Privacy","description":"A comparison of the network-level privacy of Wasabi wallet and Bitcoin Core. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Problem","slug":"problem","link":"#problem","children":[{"level":3,"title":"Clearnet light clients","slug":"clearnet-light-clients","link":"#clearnet-light-clients","children":[]}]},{"level":2,"title":"Wasabi's solution","slug":"wasabi-s-solution","link":"#wasabi-s-solution","children":[{"level":3,"title":"Full node by default & block filters over Tor","slug":"full-node-by-default-block-filters-over-tor","link":"#full-node-by-default-block-filters-over-tor","children":[]}]},{"level":2,"title":"In-depth comparison","slug":"in-depth-comparison","link":"#in-depth-comparison","children":[{"level":3,"title":"Bitcoin Core","slug":"bitcoin-core","link":"#bitcoin-core","children":[]},{"level":3,"title":"Bitcoin Core + Tor","slug":"bitcoin-core-tor","link":"#bitcoin-core-tor","children":[]},{"level":3,"title":"Wasabi Wallet light node","slug":"wasabi-wallet-light-node","link":"#wasabi-wallet-light-node","children":[]},{"level":3,"title":"Wasabi Wallet + full node","slug":"wasabi-wallet-full-node","link":"#wasabi-wallet-full-node","children":[]}]},{"level":2,"title":"Universal Attacks","slug":"universal-attacks","link":"#universal-attacks","children":[{"level":3,"title":"Protection","slug":"protection","link":"#protection","children":[]}]}],"git":{"updatedTime":1720425980000},"filePathRelative":"why-wasabi/NetworkLevelPrivacy.md"}`);export{X as comp,H as data}; diff --git a/assets/PasswordBestPractices.html-BLh76ZwZ.js b/assets/PasswordBestPractices.html-DeqmX9LQ.js similarity index 99% rename from assets/PasswordBestPractices.html-BLh76ZwZ.js rename to assets/PasswordBestPractices.html-DeqmX9LQ.js index 140733bd2..58fdc18c7 100644 --- a/assets/PasswordBestPractices.html-BLh76ZwZ.js +++ b/assets/PasswordBestPractices.html-DeqmX9LQ.js @@ -1,3 +1,3 @@ -import{_ as d,r as l,o as c,c as p,a as e,d as o,w as a,b as s,e as r}from"./app-3S7gIoGc.js";const u={},h=e("h1",{id:"password-best-practices",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#password-best-practices"},[e("span",null,"Password best practices")])],-1),w={class:"table-of-contents"},m=r('

    Introduction

    You shouldn't try to re-invent the wheel for something as complicated and nuanced as cryptography, and especially in regards to entropy.

    These are some of the industry best practices:

    TIP

    Don't "roll your own" crypto.

    Password basics

    ',5),f=e("li",null,[e("p",null,'Randomness is the single-most important requirement for a strong password, because randomness means that the password has no predictable pattern to it. This makes it impossible to crack without doing an exhaustive, "brute-force" attack.')],-1),y=e("li",null,[e("p",null,[s("Assuming a password is constructed randomly, its length has the most impact on its strength. However, a password that is very long, but not randomly constructed, such as: "),e("code",null,"thequickbrownfoxjumpedoverthelazydogsback"),s(", or a passage from literature, is certain to be on every serious hacker's guess list.")])],-1),b=e("h2",{id:"what-not-to-do",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-not-to-do"},[e("span",null,"What not to do")])],-1),g=e("p",null,"Here are a few examples that do it completely wrong. You should not generate your password like this:",-1),v=e("code",null,"Emma1992",-1),_={href:"https://en.wikipedia.org/wiki/List_of_the_most_common_passwords#SplashData",target:"_blank",rel:"noopener noreferrer"},k=e("li",null,[e("p",null,"Do not use the same password that you have used in other places. Because if one password is leaked, then other ones are compromised.")],-1),x=e("li",null,[e("p",null,"Do try to use a mix of uppercase and lowercase letters, numbers, and special characters (&$%@ etc.) in your password.")],-1),P=e("p",null,'Do not take a famous quote, or well-known passage from literature and use it for a password. It will not fool any serious hacker, even if you throw in substitutions such as: "@" instead of "a", or "$" instead of "s".',-1),q={class:"custom-container danger"},D=e("p",{class:"custom-container-title"},"Make a secure password!!",-1),T=e("h2",{id:"use-diceware",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#use-diceware"},[e("span",null,"Use Diceware")])],-1),B=e("p",null,"Rolling dice is an easy and effective way to get high entropy and randomness in a password that can even be memorized.",-1),E=e("p",null,"The Diceware method is a great strategy for your most precious passwords (e.g. the password to your computer, your backups, or your encryption key). You can even use Diceware to create secure wallets.",-1),F={href:"https://www.eff.org/deeplinks/2016/07/new-wordlists-random-passphrases",target:"_blank",rel:"noopener noreferrer"},I=r("

    To start, roll the die five times. Record the number from each roll using the pen and paper. You will end up with a five-digit number. We got 52611. Now search on the Diceware list for the five digit number you just created. Write down the word the number corresponds to, in our case it is salvo. This word by itself is not a good password, it would only take about a thousandth of a second to crack. Repeat the dice rolling process at least five more times.

    After six sets of five rolls, we ended up with 52611 51631 63432 43123 21641 and 14146. This corresponds to the password salvo rhoda walton mudd croft bride.

    This six-word passphrase, even though easy to remember, is just one of 2.21 x 10^23, or 221 sextillion possible six-word combinations taken from the list of 7776 words. A computer capable of 1 trillion guesses/second would take, on average, over 3500 years to correctly guess this or any six-word combination of words from the list, if they are chosen randomly.

    ",3),S={href:"https://blog.securityevaluators.com/understanding-password-complexity-5e0d23643a2a",target:"_blank",rel:"noopener noreferrer"},L=r(`

    Use a dictionary

    All of the major languages have at least 100,000 words in their dictionaries. Most have over 300,000 words. You can take a dictionary in any language that you are comfortable with and create a very strong password by randomly selecting as few as 5 words from it.

    The quick, but not technically random way would be to flip open your chosen dictionary to any seemingly random page, close your eyes, and put your fingertip down on the page. Choose the word nearest your fingertip that has at least 4 letters. Repeat this process at least 4 more times.

    If you'd prefer a truly random way to select pages, and you are using either Windows or Linux, you can easily create random numbers in a selected range (such as the number of pages in your dictionary) from your terminal.

    Assuming your dictionary has, for example, 854 pages:

    Windows: Open a Powershell terminal and enter:

    [C:\\User>] get-random -maximum 854
    +import{_ as d,r as l,o as c,c as p,a as e,d as o,w as a,b as s,e as r}from"./app-CwImt2bI.js";const u={},h=e("h1",{id:"password-best-practices",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#password-best-practices"},[e("span",null,"Password best practices")])],-1),w={class:"table-of-contents"},m=r('

    Introduction

    You shouldn't try to re-invent the wheel for something as complicated and nuanced as cryptography, and especially in regards to entropy.

    These are some of the industry best practices:

    TIP

    Don't "roll your own" crypto.

    Password basics

    ',5),f=e("li",null,[e("p",null,'Randomness is the single-most important requirement for a strong password, because randomness means that the password has no predictable pattern to it. This makes it impossible to crack without doing an exhaustive, "brute-force" attack.')],-1),y=e("li",null,[e("p",null,[s("Assuming a password is constructed randomly, its length has the most impact on its strength. However, a password that is very long, but not randomly constructed, such as: "),e("code",null,"thequickbrownfoxjumpedoverthelazydogsback"),s(", or a passage from literature, is certain to be on every serious hacker's guess list.")])],-1),b=e("h2",{id:"what-not-to-do",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#what-not-to-do"},[e("span",null,"What not to do")])],-1),g=e("p",null,"Here are a few examples that do it completely wrong. You should not generate your password like this:",-1),v=e("code",null,"Emma1992",-1),_={href:"https://en.wikipedia.org/wiki/List_of_the_most_common_passwords#SplashData",target:"_blank",rel:"noopener noreferrer"},k=e("li",null,[e("p",null,"Do not use the same password that you have used in other places. Because if one password is leaked, then other ones are compromised.")],-1),x=e("li",null,[e("p",null,"Do try to use a mix of uppercase and lowercase letters, numbers, and special characters (&$%@ etc.) in your password.")],-1),P=e("p",null,'Do not take a famous quote, or well-known passage from literature and use it for a password. It will not fool any serious hacker, even if you throw in substitutions such as: "@" instead of "a", or "$" instead of "s".',-1),q={class:"custom-container danger"},D=e("p",{class:"custom-container-title"},"Make a secure password!!",-1),T=e("h2",{id:"use-diceware",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#use-diceware"},[e("span",null,"Use Diceware")])],-1),B=e("p",null,"Rolling dice is an easy and effective way to get high entropy and randomness in a password that can even be memorized.",-1),E=e("p",null,"The Diceware method is a great strategy for your most precious passwords (e.g. the password to your computer, your backups, or your encryption key). You can even use Diceware to create secure wallets.",-1),F={href:"https://www.eff.org/deeplinks/2016/07/new-wordlists-random-passphrases",target:"_blank",rel:"noopener noreferrer"},I=r("

    To start, roll the die five times. Record the number from each roll using the pen and paper. You will end up with a five-digit number. We got 52611. Now search on the Diceware list for the five digit number you just created. Write down the word the number corresponds to, in our case it is salvo. This word by itself is not a good password, it would only take about a thousandth of a second to crack. Repeat the dice rolling process at least five more times.

    After six sets of five rolls, we ended up with 52611 51631 63432 43123 21641 and 14146. This corresponds to the password salvo rhoda walton mudd croft bride.

    This six-word passphrase, even though easy to remember, is just one of 2.21 x 10^23, or 221 sextillion possible six-word combinations taken from the list of 7776 words. A computer capable of 1 trillion guesses/second would take, on average, over 3500 years to correctly guess this or any six-word combination of words from the list, if they are chosen randomly.

    ",3),S={href:"https://blog.securityevaluators.com/understanding-password-complexity-5e0d23643a2a",target:"_blank",rel:"noopener noreferrer"},L=r(`

    Use a dictionary

    All of the major languages have at least 100,000 words in their dictionaries. Most have over 300,000 words. You can take a dictionary in any language that you are comfortable with and create a very strong password by randomly selecting as few as 5 words from it.

    The quick, but not technically random way would be to flip open your chosen dictionary to any seemingly random page, close your eyes, and put your fingertip down on the page. Choose the word nearest your fingertip that has at least 4 letters. Repeat this process at least 4 more times.

    If you'd prefer a truly random way to select pages, and you are using either Windows or Linux, you can easily create random numbers in a selected range (such as the number of pages in your dictionary) from your terminal.

    Assuming your dictionary has, for example, 854 pages:

    Windows: Open a Powershell terminal and enter:

    [C:\\User>] get-random -maximum 854
     

    Linux: Open a terminal and enter:

    [user@you:~$] echo $(( $RANDOM % 854 ))
    -

    Each time you repeat this command, your operating system will return a random number somewhere in the range of available pages of your dictionary.

    Use this function to pick pages in a truly random manner, and select the needed words in the same way as before.

    Both this and the Diceware method are good ways to create a password with sufficient randomness that was generated completely off-line.

    Use an open-source password manager

    There are several well-known, cross-platform, and open-source password managers available. The main requirement besides being open-source, is a cryptographically secure random number generator, with the ability to generate significant entropy while using letters, numbers, and special characters.

    It is recommended that you use all available characters when generating a password, and the length of the password should be at least 12 characters for minimally sufficient entropy.

    It is up to the user to choose between a password manager that stores its data in the cloud, making it easy to stay in sync across various devices, or one that only stores its data locally.

    As it so often happens, more convenience means less security in this decision.

    Password entropy

    "Entropy" is a term commonly used to define password strength. It is typically used to describe the combined effect of randomness, length, and number of characters (lowercase/uppercase letters, numbers, and special characters) or words in a password or passphrase.

    Calculating entropy allows the strength of different randomly constructed passwords or phrases to be compared. It also defines the size of the search-space an attacker would need to cover to find the password by trying all possibilities.

    How to calculate entropy

    Assuming a password or passphrase is constructed randomly, its level of entropy can be calculated in this way:

    • For a password, the total number of possible outcomes given a specific length (L), and number of characters used (C), is: C raised to the power of L, or C^L.
      Example: jwodnrosqf is lowercase only (C = 26) and 10 characters long (L = 10). So, 26^10 = 141,000,000,000,000 (141 trillion).

      Including uppercase letters in the same password: jWoDNrosqF to double (C), results in 52^10 possible passwords = 145,000,000,000,000,000 (145 quadrillion).

      Including special characters in the same password: jW0DNro$qF raises (C) to 95, resulting in 95^10 possibilities = 59,900,000,000,000,000,000 (59.9 quintillion).

    • For a passphrase chosen randomly from a list of words, the total number of possible outcomes given a specific number of words (N) and wordlist size (S) is: S raised to the power of N, or S^N.
      Example: The EFF Diceware list contains 7776 words. Randomly selecting 5 words from the list results in 7776^5 possible passphrases = 28,400,000,000,000,000,000 (28.4 quintillion).

    Just knowing how to do these basic calculations allows you to compare the strength of different randomly-generated passwords or phrases.

    "Bits" of entropy

    `,25),N=e("code",null,"bits of entropy",-1),U={href:"https://miniwebtool.com/log-base-2-calculator/",target:"_blank",rel:"noopener noreferrer"},A=r('

    For example, there are 7776 words on the EFF wordlist commonly used with dice to create passphrases. Plugging 7776 into the calculator to get log2(7776), it is shown that each word taken randomly from the list contributes 12.92 bits of entropy to the strength of the passphrase. So, a 5-word passphrase selected randomly from the EFF list will have 5 x 12.92 = 64 bits of entropy.

    Since the combination of: lowercase + uppercase letters, numbers, and special characters = 95, a password constructed using all of these will have log2(95), or 6.57 bits of entropy for each character that comprises the password.

    From that, we can now calculate that, in order to get the same level of entropy with a password instead of a 5-word passphrase, the password must be at least 10 characters in length.

    How much entropy is needed

    Entropy matters because it allows one to compare the required search-space of a potential password with the search-speed known to be available to various potential adversaries. In doing so, it is possible to then know how long it would take an adversary with known resources to attempt every mathematically possible password or passphrase for a given level of entropy.

    Edward Snowden revealed in 2013 that the NSA had the ability to guess passwords at a rate of 1 trillion guesses/second. At that speed of guessing, the password in the above example (28.4 quintillion possibilities) could be guessed in at most, 11 months.

    Since there is an equal chance of finding the password in the first half of the total number of guesses as there is in finding it in the second half of the total number, it is accurate to assume that on average, a password will be found in 1/2 of the time required to do an exhaustive search. That means just over 5 months for the example just mentioned.

    Keep in mind that Snowden's information in quite old, in a processing-power context. We have no way of knowing what is currently possible, so if a State-Level attacker is a part of your assumed threat-model, it would be wise to assume that their tools are now much more powerful.

    Even if a given threat-model does not include State-Level attackers, it is still important to consider that there are GPU-based password hacking tools publicly available that are capable of guessing well into the billions of guesses/second.

    ',9);function j(C,W){const t=l("router-link"),i=l("RouteLink"),n=l("ExternalLinkIcon");return c(),p("div",null,[h,e("nav",w,[e("ul",null,[e("li",null,[o(t,{to:"#introduction"},{default:a(()=>[s("Introduction")]),_:1})]),e("li",null,[o(t,{to:"#password-basics"},{default:a(()=>[s("Password basics")]),_:1})]),e("li",null,[o(t,{to:"#what-not-to-do"},{default:a(()=>[s("What not to do")]),_:1})]),e("li",null,[o(t,{to:"#use-diceware"},{default:a(()=>[s("Use Diceware")]),_:1})]),e("li",null,[o(t,{to:"#use-a-dictionary"},{default:a(()=>[s("Use a dictionary")]),_:1})]),e("li",null,[o(t,{to:"#use-an-open-source-password-manager"},{default:a(()=>[s("Use an open-source password manager")]),_:1})]),e("li",null,[o(t,{to:"#password-entropy"},{default:a(()=>[s("Password entropy")]),_:1}),e("ul",null,[e("li",null,[o(t,{to:"#how-to-calculate-entropy"},{default:a(()=>[s("How to calculate entropy")]),_:1})]),e("li",null,[o(t,{to:"#bits-of-entropy"},{default:a(()=>[s('"Bits" of entropy')]),_:1})]),e("li",null,[o(t,{to:"#how-much-entropy-is-needed"},{default:a(()=>[s("How much entropy is needed")]),_:1})])])])])]),m,e("ol",null,[f,y,e("li",null,[e("p",null,[s('"Entropy" is a term commonly used to define the strength of a random password. There is a tutorial about how to calculate and evaluate entropy in your password '),o(i,{to:"/using-wasabi/PasswordBestPractices.html#how-to-calculate-entropy"},{default:a(()=>[s("here")]),_:1}),s(".")])])]),b,g,e("ol",null,[e("li",null,[e("p",null,[s("Do not use publicly known information like your grandma's maiden name and the birthday of your dog. "),v,s(" is a really, really, really bad password, because it can easily be guessed and it is very short. Here is a list of the worst and "),e("a",_,[s("most commonly used passwords"),o(n)]),s(" in recent years. Password hackers start with lists like this.")])]),k,x,e("li",null,[P,e("div",q,[D,e("p",null,[s("It is of utmost importance to generate a secure password following "),o(i,{to:"/using-wasabi/PasswordBestPractices.html"},{default:a(()=>[s("best practices")]),_:1}),s(".")])])])]),T,B,E,e("p",null,[s("To generate a password using Diceware, you just need a high-quality die, a pen, and some paper. You can find EFF's Diceware list at the "),e("a",F,[s("Electronic Frontier Foundation website"),o(n)]),s(". Make sure you are alone and there are no cameras nearby. For maximum protection, disconnect your computer from the internet (after you save the Diceware list) and cover your webcam.")]),I,e("p",null,[s("A 6-word passphrase derived as just discussed has 77 "),o(i,{to:"/using-wasabi/PasswordBestPractices.html#how-to-calculate-entropy"},{default:a(()=>[s("bits of entropy")]),_:1}),s(". Best practices for being secure against any adversary "),e("a",S,[s("currently recommend"),o(n)]),s(" a minimum of near 80 bits of entropy, so this example phrase barely qualifies.")]),L,e("p",null,[s("Password entropy is often discussed and compared in a context of "),N,s(". This is, of course, because computers can only process 0's and 1's, or bits, so everything related is expressed that way. To calculate bits of entropy, use a "),e("a",U,[s("calculator that does logarithms"),o(n)]),s(" and compute log2(x), where x = the total number of possible outcomes for an event.")]),A])}const H=d(u,[["render",j],["__file","PasswordBestPractices.html.vue"]]),Y=JSON.parse('{"path":"/using-wasabi/PasswordBestPractices.html","title":"Password Best Practices","lang":"en-US","frontmatter":{"title":"Password Best Practices","description":"A detailed guide about how to create and evaluate a strong password. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Introduction","slug":"introduction","link":"#introduction","children":[]},{"level":2,"title":"Password basics","slug":"password-basics","link":"#password-basics","children":[]},{"level":2,"title":"What not to do","slug":"what-not-to-do","link":"#what-not-to-do","children":[]},{"level":2,"title":"Use Diceware","slug":"use-diceware","link":"#use-diceware","children":[]},{"level":2,"title":"Use a dictionary","slug":"use-a-dictionary","link":"#use-a-dictionary","children":[]},{"level":2,"title":"Use an open-source password manager","slug":"use-an-open-source-password-manager","link":"#use-an-open-source-password-manager","children":[]},{"level":2,"title":"Password entropy","slug":"password-entropy","link":"#password-entropy","children":[{"level":3,"title":"How to calculate entropy","slug":"how-to-calculate-entropy","link":"#how-to-calculate-entropy","children":[]},{"level":3,"title":"\\"Bits\\" of entropy","slug":"bits-of-entropy","link":"#bits-of-entropy","children":[]},{"level":3,"title":"How much entropy is needed","slug":"how-much-entropy-is-needed","link":"#how-much-entropy-is-needed","children":[]}]}],"git":{"updatedTime":1720425186000},"filePathRelative":"using-wasabi/PasswordBestPractices.md"}');export{H as comp,Y as data}; +

    Each time you repeat this command, your operating system will return a random number somewhere in the range of available pages of your dictionary.

    Use this function to pick pages in a truly random manner, and select the needed words in the same way as before.

    Both this and the Diceware method are good ways to create a password with sufficient randomness that was generated completely off-line.

    Use an open-source password manager

    There are several well-known, cross-platform, and open-source password managers available. The main requirement besides being open-source, is a cryptographically secure random number generator, with the ability to generate significant entropy while using letters, numbers, and special characters.

    It is recommended that you use all available characters when generating a password, and the length of the password should be at least 12 characters for minimally sufficient entropy.

    It is up to the user to choose between a password manager that stores its data in the cloud, making it easy to stay in sync across various devices, or one that only stores its data locally.

    As it so often happens, more convenience means less security in this decision.

    Password entropy

    "Entropy" is a term commonly used to define password strength. It is typically used to describe the combined effect of randomness, length, and number of characters (lowercase/uppercase letters, numbers, and special characters) or words in a password or passphrase.

    Calculating entropy allows the strength of different randomly constructed passwords or phrases to be compared. It also defines the size of the search-space an attacker would need to cover to find the password by trying all possibilities.

    How to calculate entropy

    Assuming a password or passphrase is constructed randomly, its level of entropy can be calculated in this way:

    • For a password, the total number of possible outcomes given a specific length (L), and number of characters used (C), is: C raised to the power of L, or C^L.
      Example: jwodnrosqf is lowercase only (C = 26) and 10 characters long (L = 10). So, 26^10 = 141,000,000,000,000 (141 trillion).

      Including uppercase letters in the same password: jWoDNrosqF to double (C), results in 52^10 possible passwords = 145,000,000,000,000,000 (145 quadrillion).

      Including special characters in the same password: jW0DNro$qF raises (C) to 95, resulting in 95^10 possibilities = 59,900,000,000,000,000,000 (59.9 quintillion).

    • For a passphrase chosen randomly from a list of words, the total number of possible outcomes given a specific number of words (N) and wordlist size (S) is: S raised to the power of N, or S^N.
      Example: The EFF Diceware list contains 7776 words. Randomly selecting 5 words from the list results in 7776^5 possible passphrases = 28,400,000,000,000,000,000 (28.4 quintillion).

    Just knowing how to do these basic calculations allows you to compare the strength of different randomly-generated passwords or phrases.

    "Bits" of entropy

    `,25),N=e("code",null,"bits of entropy",-1),U={href:"https://miniwebtool.com/log-base-2-calculator/",target:"_blank",rel:"noopener noreferrer"},A=r('

    For example, there are 7776 words on the EFF wordlist commonly used with dice to create passphrases. Plugging 7776 into the calculator to get log2(7776), it is shown that each word taken randomly from the list contributes 12.92 bits of entropy to the strength of the passphrase. So, a 5-word passphrase selected randomly from the EFF list will have 5 x 12.92 = 64 bits of entropy.

    Since the combination of: lowercase + uppercase letters, numbers, and special characters = 95, a password constructed using all of these will have log2(95), or 6.57 bits of entropy for each character that comprises the password.

    From that, we can now calculate that, in order to get the same level of entropy with a password instead of a 5-word passphrase, the password must be at least 10 characters in length.

    How much entropy is needed

    Entropy matters because it allows one to compare the required search-space of a potential password with the search-speed known to be available to various potential adversaries. In doing so, it is possible to then know how long it would take an adversary with known resources to attempt every mathematically possible password or passphrase for a given level of entropy.

    Edward Snowden revealed in 2013 that the NSA had the ability to guess passwords at a rate of 1 trillion guesses/second. At that speed of guessing, the password in the above example (28.4 quintillion possibilities) could be guessed in at most, 11 months.

    Since there is an equal chance of finding the password in the first half of the total number of guesses as there is in finding it in the second half of the total number, it is accurate to assume that on average, a password will be found in 1/2 of the time required to do an exhaustive search. That means just over 5 months for the example just mentioned.

    Keep in mind that Snowden's information in quite old, in a processing-power context. We have no way of knowing what is currently possible, so if a State-Level attacker is a part of your assumed threat-model, it would be wise to assume that their tools are now much more powerful.

    Even if a given threat-model does not include State-Level attackers, it is still important to consider that there are GPU-based password hacking tools publicly available that are capable of guessing well into the billions of guesses/second.

    ',9);function j(C,W){const t=l("router-link"),i=l("RouteLink"),n=l("ExternalLinkIcon");return c(),p("div",null,[h,e("nav",w,[e("ul",null,[e("li",null,[o(t,{to:"#introduction"},{default:a(()=>[s("Introduction")]),_:1})]),e("li",null,[o(t,{to:"#password-basics"},{default:a(()=>[s("Password basics")]),_:1})]),e("li",null,[o(t,{to:"#what-not-to-do"},{default:a(()=>[s("What not to do")]),_:1})]),e("li",null,[o(t,{to:"#use-diceware"},{default:a(()=>[s("Use Diceware")]),_:1})]),e("li",null,[o(t,{to:"#use-a-dictionary"},{default:a(()=>[s("Use a dictionary")]),_:1})]),e("li",null,[o(t,{to:"#use-an-open-source-password-manager"},{default:a(()=>[s("Use an open-source password manager")]),_:1})]),e("li",null,[o(t,{to:"#password-entropy"},{default:a(()=>[s("Password entropy")]),_:1}),e("ul",null,[e("li",null,[o(t,{to:"#how-to-calculate-entropy"},{default:a(()=>[s("How to calculate entropy")]),_:1})]),e("li",null,[o(t,{to:"#bits-of-entropy"},{default:a(()=>[s('"Bits" of entropy')]),_:1})]),e("li",null,[o(t,{to:"#how-much-entropy-is-needed"},{default:a(()=>[s("How much entropy is needed")]),_:1})])])])])]),m,e("ol",null,[f,y,e("li",null,[e("p",null,[s('"Entropy" is a term commonly used to define the strength of a random password. There is a tutorial about how to calculate and evaluate entropy in your password '),o(i,{to:"/using-wasabi/PasswordBestPractices.html#how-to-calculate-entropy"},{default:a(()=>[s("here")]),_:1}),s(".")])])]),b,g,e("ol",null,[e("li",null,[e("p",null,[s("Do not use publicly known information like your grandma's maiden name and the birthday of your dog. "),v,s(" is a really, really, really bad password, because it can easily be guessed and it is very short. Here is a list of the worst and "),e("a",_,[s("most commonly used passwords"),o(n)]),s(" in recent years. Password hackers start with lists like this.")])]),k,x,e("li",null,[P,e("div",q,[D,e("p",null,[s("It is of utmost importance to generate a secure password following "),o(i,{to:"/using-wasabi/PasswordBestPractices.html"},{default:a(()=>[s("best practices")]),_:1}),s(".")])])])]),T,B,E,e("p",null,[s("To generate a password using Diceware, you just need a high-quality die, a pen, and some paper. You can find EFF's Diceware list at the "),e("a",F,[s("Electronic Frontier Foundation website"),o(n)]),s(". Make sure you are alone and there are no cameras nearby. For maximum protection, disconnect your computer from the internet (after you save the Diceware list) and cover your webcam.")]),I,e("p",null,[s("A 6-word passphrase derived as just discussed has 77 "),o(i,{to:"/using-wasabi/PasswordBestPractices.html#how-to-calculate-entropy"},{default:a(()=>[s("bits of entropy")]),_:1}),s(". Best practices for being secure against any adversary "),e("a",S,[s("currently recommend"),o(n)]),s(" a minimum of near 80 bits of entropy, so this example phrase barely qualifies.")]),L,e("p",null,[s("Password entropy is often discussed and compared in a context of "),N,s(". This is, of course, because computers can only process 0's and 1's, or bits, so everything related is expressed that way. To calculate bits of entropy, use a "),e("a",U,[s("calculator that does logarithms"),o(n)]),s(" and compute log2(x), where x = the total number of possible outcomes for an event.")]),A])}const H=d(u,[["render",j],["__file","PasswordBestPractices.html.vue"]]),Y=JSON.parse('{"path":"/using-wasabi/PasswordBestPractices.html","title":"Password Best Practices","lang":"en-US","frontmatter":{"title":"Password Best Practices","description":"A detailed guide about how to create and evaluate a strong password. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Introduction","slug":"introduction","link":"#introduction","children":[]},{"level":2,"title":"Password basics","slug":"password-basics","link":"#password-basics","children":[]},{"level":2,"title":"What not to do","slug":"what-not-to-do","link":"#what-not-to-do","children":[]},{"level":2,"title":"Use Diceware","slug":"use-diceware","link":"#use-diceware","children":[]},{"level":2,"title":"Use a dictionary","slug":"use-a-dictionary","link":"#use-a-dictionary","children":[]},{"level":2,"title":"Use an open-source password manager","slug":"use-an-open-source-password-manager","link":"#use-an-open-source-password-manager","children":[]},{"level":2,"title":"Password entropy","slug":"password-entropy","link":"#password-entropy","children":[{"level":3,"title":"How to calculate entropy","slug":"how-to-calculate-entropy","link":"#how-to-calculate-entropy","children":[]},{"level":3,"title":"\\"Bits\\" of entropy","slug":"bits-of-entropy","link":"#bits-of-entropy","children":[]},{"level":3,"title":"How much entropy is needed","slug":"how-much-entropy-is-needed","link":"#how-much-entropy-is-needed","children":[]}]}],"git":{"updatedTime":1720425980000},"filePathRelative":"using-wasabi/PasswordBestPractices.md"}');export{H as comp,Y as data}; diff --git a/assets/PayJoin.html-CDKaUHzz.js b/assets/PayJoin.html-CYU7F1JU.js similarity index 98% rename from assets/PayJoin.html-CDKaUHzz.js rename to assets/PayJoin.html-CYU7F1JU.js index 64e0688b3..d3c07d9f3 100644 --- a/assets/PayJoin.html-CDKaUHzz.js +++ b/assets/PayJoin.html-CYU7F1JU.js @@ -1,5 +1,5 @@ -import{_ as c,r as o,o as r,c as l,a as e,d as n,w as i,b as t,e as d}from"./app-3S7gIoGc.js";const h="/PayJoinSend.png",p="/PayJoinPreviewTransaction.png",u={},f=e("h1",{id:"payjoin",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#payjoin"},[e("span",null,"PayJoin")])],-1),b={class:"table-of-contents"},y=e("h2",{id:"sending-payjoin-step-by-step",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#sending-payjoin-step-by-step"},[e("span",null,"Sending PayJoin step-by-step")])],-1),v=e("li",null,[e("p",null,[t("Load a wallet and open the "),e("code",null,"Send"),t(" dialog.")])],-1),g={href:"https://github.com/bitcoin/bips/blob/master/bip-0021.mediawiki",target:"_blank",rel:"noopener noreferrer"},m=e("code",null,"pj=",-1),_=e("code",null,"To",-1),P=e("code",null,"Send",-1),k=e("code",null,"bitcoin:tb1q0382a3m2jzvyk5lkea5h5jcht88xa6l0jufgwx?amount=0.00010727&pj=https://payjoin.test.kukks.org/BTC/pj",-1),w=d('

    Enter the label of the recipient.

    Send Bitcoin PayJoin transaction in Wasabi Wallet

    1. Click Continue.

    2. At Preview Transaction, verify that the information is correct.

    PayJoinPreviewTransaction

    1. Click Confirm, and type in the passphrase.

    The success of a PayJoin transaction is not something that depends on Wasabi.

    It may happen that the transaction is broadcast with success, but that it is not a PayJoin. This can happen for several reasons including:

    • The receiver did not have any utxos to contribute towards a PayJoin.
    • Your wallet does not use the same address format as the receiver's.
    • The PayJoin server is not available.

    The goal of PayJoin

    PayJoin is a collaborative transaction between the sender and the receiver of a payment, for example the merchant and the customer. The goal of the protocol is to break the common input ownership heuristic, while making it difficult to fingerprint that the transaction is in fact a CoinJoin. Further, it reduces the transaction fees paid by the merchant due to consolidation of coins.

    Coordination

    The coordination of this coinjoin is done with the PayToEndPoint [P2EP] concept. The receiver is reachable over the internet, either over a Tor onion service or clearnet IP address. The link is included in a BIP21 Bitcoin URI, and is provided to the sender as the payment invoice. The sender uses this onion service or IP address to connect to the server of the receiver and communicate the further protocol. The coordination is usually done within seconds, and will abort to the fallback transaction after some time if the connection breaks.

    Fallback transaction

    In the very first request to the receiving server, the sender provides a finalized signed transaction which has only the inputs of the sender, like any other Bitcoin transaction. The inputs are only from the sender. The outputs are the address of the receiver, as well as the change address of the sender. For example here, Alice pays Bob 0.2 bitcoin.

    Alice input   1 bitcoin   -->   Bob output            0.2 bitcoin
    +import{_ as c,r as o,o as r,c as l,a as e,d as n,w as i,b as t,e as d}from"./app-CwImt2bI.js";const h="/PayJoinSend.png",p="/PayJoinPreviewTransaction.png",u={},f=e("h1",{id:"payjoin",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#payjoin"},[e("span",null,"PayJoin")])],-1),b={class:"table-of-contents"},y=e("h2",{id:"sending-payjoin-step-by-step",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#sending-payjoin-step-by-step"},[e("span",null,"Sending PayJoin step-by-step")])],-1),v=e("li",null,[e("p",null,[t("Load a wallet and open the "),e("code",null,"Send"),t(" dialog.")])],-1),g={href:"https://github.com/bitcoin/bips/blob/master/bip-0021.mediawiki",target:"_blank",rel:"noopener noreferrer"},m=e("code",null,"pj=",-1),_=e("code",null,"To",-1),P=e("code",null,"Send",-1),k=e("code",null,"bitcoin:tb1q0382a3m2jzvyk5lkea5h5jcht88xa6l0jufgwx?amount=0.00010727&pj=https://payjoin.test.kukks.org/BTC/pj",-1),w=d('

    Enter the label of the recipient.

    Send Bitcoin PayJoin transaction in Wasabi Wallet

    1. Click Continue.

    2. At Preview Transaction, verify that the information is correct.

    PayJoinPreviewTransaction

    1. Click Confirm, and type in the passphrase.

    The success of a PayJoin transaction is not something that depends on Wasabi.

    It may happen that the transaction is broadcast with success, but that it is not a PayJoin. This can happen for several reasons including:

    • The receiver did not have any utxos to contribute towards a PayJoin.
    • Your wallet does not use the same address format as the receiver's.
    • The PayJoin server is not available.

    The goal of PayJoin

    PayJoin is a collaborative transaction between the sender and the receiver of a payment, for example the merchant and the customer. The goal of the protocol is to break the common input ownership heuristic, while making it difficult to fingerprint that the transaction is in fact a CoinJoin. Further, it reduces the transaction fees paid by the merchant due to consolidation of coins.

    Coordination

    The coordination of this coinjoin is done with the PayToEndPoint [P2EP] concept. The receiver is reachable over the internet, either over a Tor onion service or clearnet IP address. The link is included in a BIP21 Bitcoin URI, and is provided to the sender as the payment invoice. The sender uses this onion service or IP address to connect to the server of the receiver and communicate the further protocol. The coordination is usually done within seconds, and will abort to the fallback transaction after some time if the connection breaks.

    Fallback transaction

    In the very first request to the receiving server, the sender provides a finalized signed transaction which has only the inputs of the sender, like any other Bitcoin transaction. The inputs are only from the sender. The outputs are the address of the receiver, as well as the change address of the sender. For example here, Alice pays Bob 0.2 bitcoin.

    Alice input   1 bitcoin   -->   Bob output            0.2 bitcoin
                                     Alice change output   0.8 bitcoin
     

    Both the sender and the receiver could broadcast this transaction.

    PayJoin transaction

    The receiving server responds to this initial proposal, with a transaction that adds more inputs to the transaction. Thus, the output belonging to the receiver increases in value, above the value that the payment amount is due.

    Alice input   1 bitcoin   -->   Bob output            0.7 bitcoin
     Bob input     0.5 bitcoin -->   Alice change output   0.8 bitcoin
    -

    The sender broadcasts this transaction to the Bitcoin network.

    Advantages of PayJoin

    First and foremost, the common input ownership heuristic is broken, meaning that the inputs do not belong to one single entity, but to several of them. This breaks one of the most important assumptions of transaction surveillance companies. Contrarily to other coinjoin implementations, the outputs are not of equal value, so it is not obvious that this transaction is in fact a coinjoin.

    Further, the outputs do not reflect the actual value of the transaction. In our example, the economic transfer is of 0.2 bitcoin from Alice to Bob, but the outputs are worth 0.7 bitcoin and 0.8 bitcoin. This is obfuscating the actual amount payed.

    Finally, the receiver is consolidating his coins, thus saving on future transaction fees. Without the PayJoin, the receiver would have two coins, worth 0.2 bitcoin and 0.5 bitcoin, and he would have to pay twice the transaction fee to spend these coins. But because of using PayJoin, he only has one coin, worth 0.7 bitcoin, thus reducing his future transaction costs when spending this coin.

    `,22);function J(j,x){const a=o("router-link"),s=o("ExternalLinkIcon");return r(),l("div",null,[f,e("nav",b,[e("ul",null,[e("li",null,[n(a,{to:"#sending-payjoin-step-by-step"},{default:i(()=>[t("Sending PayJoin step-by-step")]),_:1})]),e("li",null,[n(a,{to:"#the-goal-of-payjoin"},{default:i(()=>[t("The goal of PayJoin")]),_:1})]),e("li",null,[n(a,{to:"#coordination"},{default:i(()=>[t("Coordination")]),_:1})]),e("li",null,[n(a,{to:"#fallback-transaction"},{default:i(()=>[t("Fallback transaction")]),_:1})]),e("li",null,[n(a,{to:"#payjoin-transaction"},{default:i(()=>[t("PayJoin transaction")]),_:1})]),e("li",null,[n(a,{to:"#advantages-of-payjoin"},{default:i(()=>[t("Advantages of PayJoin")]),_:1})])])]),y,e("ol",null,[v,e("li",null,[e("p",null,[t("Request from the receiver a "),e("a",g,[t("BIP21 Bitcoin URI"),n(s)]),t(" with the flag "),m,t(" and paste it into the "),_,t(" field of the "),P,t(" dialog. (E.g. "),k,t(")")])])]),w])}const B=c(u,[["render",J],["__file","PayJoin.html.vue"]]),C=JSON.parse(`{"path":"/using-wasabi/PayJoin.html","title":"PayJoin","lang":"en-US","frontmatter":{"title":"PayJoin","description":"A detailed explanation about PayJoin and it's implementation in Wasabi Wallet. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Sending PayJoin step-by-step","slug":"sending-payjoin-step-by-step","link":"#sending-payjoin-step-by-step","children":[]},{"level":2,"title":"The goal of PayJoin","slug":"the-goal-of-payjoin","link":"#the-goal-of-payjoin","children":[]},{"level":2,"title":"Coordination","slug":"coordination","link":"#coordination","children":[]},{"level":2,"title":"Fallback transaction","slug":"fallback-transaction","link":"#fallback-transaction","children":[]},{"level":2,"title":"PayJoin transaction","slug":"payjoin-transaction","link":"#payjoin-transaction","children":[]},{"level":2,"title":"Advantages of PayJoin","slug":"advantages-of-payjoin","link":"#advantages-of-payjoin","children":[]}],"git":{"updatedTime":1720425186000},"filePathRelative":"using-wasabi/PayJoin.md"}`);export{B as comp,C as data}; +

    The sender broadcasts this transaction to the Bitcoin network.

    Advantages of PayJoin

    First and foremost, the common input ownership heuristic is broken, meaning that the inputs do not belong to one single entity, but to several of them. This breaks one of the most important assumptions of transaction surveillance companies. Contrarily to other coinjoin implementations, the outputs are not of equal value, so it is not obvious that this transaction is in fact a coinjoin.

    Further, the outputs do not reflect the actual value of the transaction. In our example, the economic transfer is of 0.2 bitcoin from Alice to Bob, but the outputs are worth 0.7 bitcoin and 0.8 bitcoin. This is obfuscating the actual amount payed.

    Finally, the receiver is consolidating his coins, thus saving on future transaction fees. Without the PayJoin, the receiver would have two coins, worth 0.2 bitcoin and 0.5 bitcoin, and he would have to pay twice the transaction fee to spend these coins. But because of using PayJoin, he only has one coin, worth 0.7 bitcoin, thus reducing his future transaction costs when spending this coin.

    `,22);function J(j,x){const a=o("router-link"),s=o("ExternalLinkIcon");return r(),l("div",null,[f,e("nav",b,[e("ul",null,[e("li",null,[n(a,{to:"#sending-payjoin-step-by-step"},{default:i(()=>[t("Sending PayJoin step-by-step")]),_:1})]),e("li",null,[n(a,{to:"#the-goal-of-payjoin"},{default:i(()=>[t("The goal of PayJoin")]),_:1})]),e("li",null,[n(a,{to:"#coordination"},{default:i(()=>[t("Coordination")]),_:1})]),e("li",null,[n(a,{to:"#fallback-transaction"},{default:i(()=>[t("Fallback transaction")]),_:1})]),e("li",null,[n(a,{to:"#payjoin-transaction"},{default:i(()=>[t("PayJoin transaction")]),_:1})]),e("li",null,[n(a,{to:"#advantages-of-payjoin"},{default:i(()=>[t("Advantages of PayJoin")]),_:1})])])]),y,e("ol",null,[v,e("li",null,[e("p",null,[t("Request from the receiver a "),e("a",g,[t("BIP21 Bitcoin URI"),n(s)]),t(" with the flag "),m,t(" and paste it into the "),_,t(" field of the "),P,t(" dialog. (E.g. "),k,t(")")])])]),w])}const B=c(u,[["render",J],["__file","PayJoin.html.vue"]]),C=JSON.parse(`{"path":"/using-wasabi/PayJoin.html","title":"PayJoin","lang":"en-US","frontmatter":{"title":"PayJoin","description":"A detailed explanation about PayJoin and it's implementation in Wasabi Wallet. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Sending PayJoin step-by-step","slug":"sending-payjoin-step-by-step","link":"#sending-payjoin-step-by-step","children":[]},{"level":2,"title":"The goal of PayJoin","slug":"the-goal-of-payjoin","link":"#the-goal-of-payjoin","children":[]},{"level":2,"title":"Coordination","slug":"coordination","link":"#coordination","children":[]},{"level":2,"title":"Fallback transaction","slug":"fallback-transaction","link":"#fallback-transaction","children":[]},{"level":2,"title":"PayJoin transaction","slug":"payjoin-transaction","link":"#payjoin-transaction","children":[]},{"level":2,"title":"Advantages of PayJoin","slug":"advantages-of-payjoin","link":"#advantages-of-payjoin","children":[]}],"git":{"updatedTime":1720425980000},"filePathRelative":"using-wasabi/PayJoin.md"}`);export{B as comp,C as data}; diff --git a/assets/RPC.html-CWcUhsmq.js b/assets/RPC.html-DAODCFkf.js similarity index 99% rename from assets/RPC.html-CWcUhsmq.js rename to assets/RPC.html-DAODCFkf.js index 1802bb400..532ac4afa 100644 --- a/assets/RPC.html-CWcUhsmq.js +++ b/assets/RPC.html-DAODCFkf.js @@ -1,4 +1,4 @@ -import{_ as c,r as i,o as u,c as r,a as s,d as a,w as t,b as n,e as p}from"./app-3S7gIoGc.js";const d={},q=s("h1",{id:"wasabi-remote-procedure-call-interface",tabindex:"-1"},[s("a",{class:"header-anchor",href:"#wasabi-remote-procedure-call-interface"},[s("span",null,"Wasabi Remote Procedure Call Interface")])],-1),k=s("p",null,"Wasabi Wallet provides an RPC interface to interact with the wallet programmatically. The RPC server is listening by default on port 37128.",-1),v={class:"table-of-contents"},b=s("h2",{id:"limitations",tabindex:"-1"},[s("a",{class:"header-anchor",href:"#limitations"},[s("span",null,"Limitations")])],-1),m={href:"https://github.com/dotnet/corefx/issues/14691",target:"_blank",rel:"noopener noreferrer"},h=s("code",null,"wcli",-1),g={href:"https://github.com/WalletWasabi/WalletWasabi/tree/master/Contrib/CLI",target:"_blank",rel:"noopener noreferrer"},f=p(`

    Configure RPC

    The RPC server has to be configured and enabled. This is done in the Config.json file and the relevant settings are:

    JsonRpcServerEnabled: [true | false] (default: false)
    +import{_ as c,r as i,o as u,c as r,a as s,d as a,w as t,b as n,e as p}from"./app-CwImt2bI.js";const d={},q=s("h1",{id:"wasabi-remote-procedure-call-interface",tabindex:"-1"},[s("a",{class:"header-anchor",href:"#wasabi-remote-procedure-call-interface"},[s("span",null,"Wasabi Remote Procedure Call Interface")])],-1),k=s("p",null,"Wasabi Wallet provides an RPC interface to interact with the wallet programmatically. The RPC server is listening by default on port 37128.",-1),v={class:"table-of-contents"},b=s("h2",{id:"limitations",tabindex:"-1"},[s("a",{class:"header-anchor",href:"#limitations"},[s("span",null,"Limitations")])],-1),m={href:"https://github.com/dotnet/corefx/issues/14691",target:"_blank",rel:"noopener noreferrer"},h=s("code",null,"wcli",-1),g={href:"https://github.com/WalletWasabi/WalletWasabi/tree/master/Contrib/CLI",target:"_blank",rel:"noopener noreferrer"},f=p(`

    Configure RPC

    The RPC server has to be configured and enabled. This is done in the Config.json file and the relevant settings are:

    JsonRpcServerEnabled: [true | false] (default: false)
     JsonRpcServerPrefixes: [an array of string with prefixes]
     	(default: [	"http://127.0.0.1:37128/", "http://localhost:37128/"])
     

    The RPC server can be configured to allow Anonymous access or Basic authentication just by editing:

    JsonRpcUser: [username] (default: empty)
    @@ -419,7 +419,7 @@ JsonRpcPassword: [userpassword] (default: empty)
       "result": "65c21ec1-9865-4cd6-bd67-c2f058a45d24",
       "id": "1"
     }
    -

    The first parameter is the destination address, the second parameter is the amount in sats. The result is the paymentId.

    A payincoinjoin is written to the logs and its status can be seen by using the listpaymentsincoinjoin method.

    Payments in coinjoin can in theory be made to any ScriptPubKey, however the zkSNACKs coordinator currently only accepts P2WPKH and P2TR outputs.

    Currently the default maximum is 4 payments per client per coinjoin.

    payincoinjoin only registers a payment, so if coinjoin is not running or the amount is lower than the wallet balance, the payment is queued.

    Pending payments can be removed by using the cancelpaymentincoinjoin method. Pending payments are also removed if the Wasabi client restarts.

    listpaymentsincoinjoin

    Lists the current payments in coinjoins.

    curl -s --data-binary '{"jsonrpc":"2.0", "id":"1", "method":"listpaymentsincoinjoin", "params":[]}' http://127.0.0.1:37128/WalletName | jq
    +

    The first parameter is the destination address, the second parameter is the amount in sats. The result is the paymentId.

    A payincoinjoin is written to the logs and its status can be seen by using the listpaymentsincoinjoin method.

    Payments in coinjoin can theoretically be made to any ScriptPubKey. However, the coordinator may only accept certain types of outputs.

    Currently the default maximum is 4 payments per client per coinjoin.

    payincoinjoin only registers a payment, so if coinjoin is not running or the amount is lower than the wallet balance, the payment is queued.

    Pending payments can be removed by using the cancelpaymentincoinjoin method. Pending payments are also removed if the Wasabi client restarts.

    listpaymentsincoinjoin

    Lists the current payments in coinjoins.

    curl -s --data-binary '{"jsonrpc":"2.0", "id":"1", "method":"listpaymentsincoinjoin", "params":[]}' http://127.0.0.1:37128/WalletName | jq
     
    {
       "jsonrpc": "2.0",
       "result": [
    @@ -500,4 +500,4 @@ JsonRpcPassword: [userpassword] (default: empty)
       ],
       "id": "1"
     }
    -
    `,14);function E(L,F){const e=i("router-link"),o=i("ExternalLinkIcon"),l=i("RouteLink");return u(),r("div",null,[q,k,s("nav",v,[s("ul",null,[s("li",null,[a(e,{to:"#limitations"},{default:t(()=>[n("Limitations")]),_:1})]),s("li",null,[a(e,{to:"#configure-rpc"},{default:t(()=>[n("Configure RPC")]),_:1})]),s("li",null,[a(e,{to:"#available-methods"},{default:t(()=>[n("Available methods")]),_:1}),s("ul",null,[s("li",null,[a(e,{to:"#getstatus"},{default:t(()=>[n("getstatus")]),_:1})]),s("li",null,[a(e,{to:"#createwallet"},{default:t(()=>[n("createwallet")]),_:1})]),s("li",null,[a(e,{to:"#recoverwallet"},{default:t(()=>[n("recoverwallet")]),_:1})]),s("li",null,[a(e,{to:"#listwallets"},{default:t(()=>[n("listwallets")]),_:1})]),s("li",null,[a(e,{to:"#loadwallet"},{default:t(()=>[n("loadwallet")]),_:1})]),s("li",null,[a(e,{to:"#listcoins"},{default:t(()=>[n("listcoins")]),_:1})]),s("li",null,[a(e,{to:"#listunspentcoins"},{default:t(()=>[n("listunspentcoins")]),_:1})]),s("li",null,[a(e,{to:"#getwalletinfo"},{default:t(()=>[n("getwalletinfo")]),_:1})]),s("li",null,[a(e,{to:"#getnewaddress"},{default:t(()=>[n("getnewaddress")]),_:1})]),s("li",null,[a(e,{to:"#send"},{default:t(()=>[n("send")]),_:1})]),s("li",null,[a(e,{to:"#build"},{default:t(()=>[n("build")]),_:1})]),s("li",null,[a(e,{to:"#broadcast"},{default:t(()=>[n("broadcast")]),_:1})]),s("li",null,[a(e,{to:"#speeduptransaction"},{default:t(()=>[n("speeduptransaction")]),_:1})]),s("li",null,[a(e,{to:"#canceltransaction"},{default:t(()=>[n("canceltransaction")]),_:1})]),s("li",null,[a(e,{to:"#gethistory"},{default:t(()=>[n("gethistory")]),_:1})]),s("li",null,[a(e,{to:"#getfeerates"},{default:t(()=>[n("getfeerates")]),_:1})]),s("li",null,[a(e,{to:"#listkeys"},{default:t(()=>[n("listkeys")]),_:1})]),s("li",null,[a(e,{to:"#excludefromcoinjoin"},{default:t(()=>[n("excludefromcoinjoin")]),_:1})]),s("li",null,[a(e,{to:"#startcoinjoin"},{default:t(()=>[n("startcoinjoin")]),_:1})]),s("li",null,[a(e,{to:"#payincoinjoin"},{default:t(()=>[n("payincoinjoin")]),_:1})]),s("li",null,[a(e,{to:"#listpaymentsincoinjoin"},{default:t(()=>[n("listpaymentsincoinjoin")]),_:1})]),s("li",null,[a(e,{to:"#cancelpaymentincoinjoin"},{default:t(()=>[n("cancelpaymentincoinjoin")]),_:1})]),s("li",null,[a(e,{to:"#startcoinjoinsweep"},{default:t(()=>[n("startcoinjoinsweep")]),_:1})]),s("li",null,[a(e,{to:"#stopcoinjoin"},{default:t(()=>[n("stopcoinjoin")]),_:1})]),s("li",null,[a(e,{to:"#buildunsafetransaction"},{default:t(()=>[n("buildunsafetransaction")]),_:1})]),s("li",null,[a(e,{to:"#stop"},{default:t(()=>[n("stop")]),_:1})])])]),s("li",null,[a(e,{to:"#errors"},{default:t(()=>[n("Errors")]),_:1}),s("ul",null,[s("li",null,[a(e,{to:"#method-not-found"},{default:t(()=>[n("Method not found")]),_:1})]),s("li",null,[a(e,{to:"#parse-error"},{default:t(()=>[n("Parse error")]),_:1})]),s("li",null,[a(e,{to:"#mismatching-parameters"},{default:t(()=>[n("Mismatching parameters")]),_:1})])])]),s("li",null,[a(e,{to:"#expose-the-rpc-server-as-an-onion-service"},{default:t(()=>[n("Expose the RPC server as an onion service")]),_:1}),s("ul",null,[s("li",null,[a(e,{to:"#example"},{default:t(()=>[n("Example")]),_:1})])])])])]),b,s("p",null,[n("The RPC server does NOT support batch requests or TLS communications (because it is "),s("a",m,[n("not supported on Linux and on Mac"),a(o)]),n("). Requests are served in order one-by-one in series (no parallel processing). It is intentionally limited to serve only one whitelisted local address and it is disabled by default.")]),s("p",null,[n("The more user friendly command line interface "),h,n(" can be found "),s("a",g,[n("here"),a(o)]),n(".")]),f,s("p",null,[n("It is recommended to install the "),y,n(),s("a",j,[n("command line json processor"),a(o)]),n(" with "),w,n(", and then adding "),x,n(" at the end of every RPC command to have a structured output.")]),_,s("div",P,[T,s("ul",null,[s("li",null,[s("p",null,[n("Another option is to install "),s("a",W,[n("Git"),a(o)]),n(" and to use Git Bash.")])]),s("li",null,[s("p",null,[n("To install "),C,n(" check this "),s("a",N,[n("video tutorial"),a(o)]),n(".")])])])]),R,s("p",null,[n("Speeds up a transaction and returns the hex of a new transaction; ready for broadcast. It first tries to speed it up using "),a(l,{to:"/using-wasabi/glossary/Glossary-GeneralBitcoin.html#replace-by-fee-rbf"},{default:t(()=>[n("RBF")]),_:1}),n(", if that is not possible it will do "),a(l,{to:"/using-wasabi/glossary/Glossary-GeneralBitcoin.html#child-pays-for-parent-cpfp"},{default:t(()=>[n("CPFP")]),_:1}),n(".")]),S,s("p",null,[n("Cancels a transaction and returns the hex of a new transaction; ready for broadcast. It first tries to use "),a(l,{to:"/using-wasabi/glossary/Glossary-GeneralBitcoin.html#replace-by-fee-rbf"},{default:t(()=>[n("RBF")]),_:1}),n(", if that is not possible it will do "),a(l,{to:"/using-wasabi/glossary/Glossary-GeneralBitcoin.html#child-pays-for-parent-cpfp"},{default:t(()=>[n("CPFP")]),_:1}),n(". It is similar to the "),I,n(" method, except that the transaction sends the bitcoin back to the wallet (to an unused internal address).")]),z,s("p",null,[n("Since Wasabi version "),s("a",A,[n("2.0.6"),a(o)]),n(" the RPC can be exposed as an onion service, which enables remote control.")]),s("p",null,[n("The RPC server can be exposed as an onion service by using the "),U,n(),a(l,{to:"/using-wasabi/StartupParameters.html"},{default:t(()=>[n("start up parameter")]),_:1}),n(" or the environment variable.")]),B])}const D=c(d,[["render",E],["__file","RPC.html.vue"]]),G=JSON.parse('{"path":"/using-wasabi/RPC.html","title":"RPC Interface","lang":"en-US","frontmatter":{"title":"RPC Interface","description":"A step by step guide on how to use the Wasabi remote procedure call interface. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Limitations","slug":"limitations","link":"#limitations","children":[]},{"level":2,"title":"Configure RPC","slug":"configure-rpc","link":"#configure-rpc","children":[]},{"level":2,"title":"Available methods","slug":"available-methods","link":"#available-methods","children":[{"level":3,"title":"getstatus","slug":"getstatus","link":"#getstatus","children":[]},{"level":3,"title":"createwallet","slug":"createwallet","link":"#createwallet","children":[]},{"level":3,"title":"recoverwallet","slug":"recoverwallet","link":"#recoverwallet","children":[]},{"level":3,"title":"listwallets","slug":"listwallets","link":"#listwallets","children":[]},{"level":3,"title":"loadwallet","slug":"loadwallet","link":"#loadwallet","children":[]},{"level":3,"title":"listcoins","slug":"listcoins","link":"#listcoins","children":[]},{"level":3,"title":"listunspentcoins","slug":"listunspentcoins","link":"#listunspentcoins","children":[]},{"level":3,"title":"getwalletinfo","slug":"getwalletinfo","link":"#getwalletinfo","children":[]},{"level":3,"title":"getnewaddress","slug":"getnewaddress","link":"#getnewaddress","children":[]},{"level":3,"title":"send","slug":"send","link":"#send","children":[]},{"level":3,"title":"build","slug":"build","link":"#build","children":[]},{"level":3,"title":"broadcast","slug":"broadcast","link":"#broadcast","children":[]},{"level":3,"title":"speeduptransaction","slug":"speeduptransaction","link":"#speeduptransaction","children":[]},{"level":3,"title":"canceltransaction","slug":"canceltransaction","link":"#canceltransaction","children":[]},{"level":3,"title":"gethistory","slug":"gethistory","link":"#gethistory","children":[]},{"level":3,"title":"getfeerates","slug":"getfeerates","link":"#getfeerates","children":[]},{"level":3,"title":"listkeys","slug":"listkeys","link":"#listkeys","children":[]},{"level":3,"title":"excludefromcoinjoin","slug":"excludefromcoinjoin","link":"#excludefromcoinjoin","children":[]},{"level":3,"title":"startcoinjoin","slug":"startcoinjoin","link":"#startcoinjoin","children":[]},{"level":3,"title":"payincoinjoin","slug":"payincoinjoin","link":"#payincoinjoin","children":[]},{"level":3,"title":"listpaymentsincoinjoin","slug":"listpaymentsincoinjoin","link":"#listpaymentsincoinjoin","children":[]},{"level":3,"title":"cancelpaymentincoinjoin","slug":"cancelpaymentincoinjoin","link":"#cancelpaymentincoinjoin","children":[]},{"level":3,"title":"startcoinjoinsweep","slug":"startcoinjoinsweep","link":"#startcoinjoinsweep","children":[]},{"level":3,"title":"stopcoinjoin","slug":"stopcoinjoin","link":"#stopcoinjoin","children":[]},{"level":3,"title":"buildunsafetransaction","slug":"buildunsafetransaction","link":"#buildunsafetransaction","children":[]},{"level":3,"title":"stop","slug":"stop","link":"#stop","children":[]}]},{"level":2,"title":"Errors","slug":"errors","link":"#errors","children":[{"level":3,"title":"Method not found","slug":"method-not-found","link":"#method-not-found","children":[]},{"level":3,"title":"Parse error","slug":"parse-error","link":"#parse-error","children":[]},{"level":3,"title":"Mismatching parameters","slug":"mismatching-parameters","link":"#mismatching-parameters","children":[]}]},{"level":2,"title":"Expose the RPC server as an onion service","slug":"expose-the-rpc-server-as-an-onion-service","link":"#expose-the-rpc-server-as-an-onion-service","children":[{"level":3,"title":"Example","slug":"example","link":"#example","children":[]}]}],"git":{"updatedTime":1720425186000},"filePathRelative":"using-wasabi/RPC.md"}');export{D as comp,G as data}; +
    `,14);function E(L,F){const e=i("router-link"),o=i("ExternalLinkIcon"),l=i("RouteLink");return u(),r("div",null,[q,k,s("nav",v,[s("ul",null,[s("li",null,[a(e,{to:"#limitations"},{default:t(()=>[n("Limitations")]),_:1})]),s("li",null,[a(e,{to:"#configure-rpc"},{default:t(()=>[n("Configure RPC")]),_:1})]),s("li",null,[a(e,{to:"#available-methods"},{default:t(()=>[n("Available methods")]),_:1}),s("ul",null,[s("li",null,[a(e,{to:"#getstatus"},{default:t(()=>[n("getstatus")]),_:1})]),s("li",null,[a(e,{to:"#createwallet"},{default:t(()=>[n("createwallet")]),_:1})]),s("li",null,[a(e,{to:"#recoverwallet"},{default:t(()=>[n("recoverwallet")]),_:1})]),s("li",null,[a(e,{to:"#listwallets"},{default:t(()=>[n("listwallets")]),_:1})]),s("li",null,[a(e,{to:"#loadwallet"},{default:t(()=>[n("loadwallet")]),_:1})]),s("li",null,[a(e,{to:"#listcoins"},{default:t(()=>[n("listcoins")]),_:1})]),s("li",null,[a(e,{to:"#listunspentcoins"},{default:t(()=>[n("listunspentcoins")]),_:1})]),s("li",null,[a(e,{to:"#getwalletinfo"},{default:t(()=>[n("getwalletinfo")]),_:1})]),s("li",null,[a(e,{to:"#getnewaddress"},{default:t(()=>[n("getnewaddress")]),_:1})]),s("li",null,[a(e,{to:"#send"},{default:t(()=>[n("send")]),_:1})]),s("li",null,[a(e,{to:"#build"},{default:t(()=>[n("build")]),_:1})]),s("li",null,[a(e,{to:"#broadcast"},{default:t(()=>[n("broadcast")]),_:1})]),s("li",null,[a(e,{to:"#speeduptransaction"},{default:t(()=>[n("speeduptransaction")]),_:1})]),s("li",null,[a(e,{to:"#canceltransaction"},{default:t(()=>[n("canceltransaction")]),_:1})]),s("li",null,[a(e,{to:"#gethistory"},{default:t(()=>[n("gethistory")]),_:1})]),s("li",null,[a(e,{to:"#getfeerates"},{default:t(()=>[n("getfeerates")]),_:1})]),s("li",null,[a(e,{to:"#listkeys"},{default:t(()=>[n("listkeys")]),_:1})]),s("li",null,[a(e,{to:"#excludefromcoinjoin"},{default:t(()=>[n("excludefromcoinjoin")]),_:1})]),s("li",null,[a(e,{to:"#startcoinjoin"},{default:t(()=>[n("startcoinjoin")]),_:1})]),s("li",null,[a(e,{to:"#payincoinjoin"},{default:t(()=>[n("payincoinjoin")]),_:1})]),s("li",null,[a(e,{to:"#listpaymentsincoinjoin"},{default:t(()=>[n("listpaymentsincoinjoin")]),_:1})]),s("li",null,[a(e,{to:"#cancelpaymentincoinjoin"},{default:t(()=>[n("cancelpaymentincoinjoin")]),_:1})]),s("li",null,[a(e,{to:"#startcoinjoinsweep"},{default:t(()=>[n("startcoinjoinsweep")]),_:1})]),s("li",null,[a(e,{to:"#stopcoinjoin"},{default:t(()=>[n("stopcoinjoin")]),_:1})]),s("li",null,[a(e,{to:"#buildunsafetransaction"},{default:t(()=>[n("buildunsafetransaction")]),_:1})]),s("li",null,[a(e,{to:"#stop"},{default:t(()=>[n("stop")]),_:1})])])]),s("li",null,[a(e,{to:"#errors"},{default:t(()=>[n("Errors")]),_:1}),s("ul",null,[s("li",null,[a(e,{to:"#method-not-found"},{default:t(()=>[n("Method not found")]),_:1})]),s("li",null,[a(e,{to:"#parse-error"},{default:t(()=>[n("Parse error")]),_:1})]),s("li",null,[a(e,{to:"#mismatching-parameters"},{default:t(()=>[n("Mismatching parameters")]),_:1})])])]),s("li",null,[a(e,{to:"#expose-the-rpc-server-as-an-onion-service"},{default:t(()=>[n("Expose the RPC server as an onion service")]),_:1}),s("ul",null,[s("li",null,[a(e,{to:"#example"},{default:t(()=>[n("Example")]),_:1})])])])])]),b,s("p",null,[n("The RPC server does NOT support batch requests or TLS communications (because it is "),s("a",m,[n("not supported on Linux and on Mac"),a(o)]),n("). Requests are served in order one-by-one in series (no parallel processing). It is intentionally limited to serve only one whitelisted local address and it is disabled by default.")]),s("p",null,[n("The more user friendly command line interface "),h,n(" can be found "),s("a",g,[n("here"),a(o)]),n(".")]),f,s("p",null,[n("It is recommended to install the "),y,n(),s("a",j,[n("command line json processor"),a(o)]),n(" with "),w,n(", and then adding "),x,n(" at the end of every RPC command to have a structured output.")]),_,s("div",P,[T,s("ul",null,[s("li",null,[s("p",null,[n("Another option is to install "),s("a",W,[n("Git"),a(o)]),n(" and to use Git Bash.")])]),s("li",null,[s("p",null,[n("To install "),C,n(" check this "),s("a",N,[n("video tutorial"),a(o)]),n(".")])])])]),R,s("p",null,[n("Speeds up a transaction and returns the hex of a new transaction; ready for broadcast. It first tries to speed it up using "),a(l,{to:"/using-wasabi/glossary/Glossary-GeneralBitcoin.html#replace-by-fee-rbf"},{default:t(()=>[n("RBF")]),_:1}),n(", if that is not possible it will do "),a(l,{to:"/using-wasabi/glossary/Glossary-GeneralBitcoin.html#child-pays-for-parent-cpfp"},{default:t(()=>[n("CPFP")]),_:1}),n(".")]),S,s("p",null,[n("Cancels a transaction and returns the hex of a new transaction; ready for broadcast. It first tries to use "),a(l,{to:"/using-wasabi/glossary/Glossary-GeneralBitcoin.html#replace-by-fee-rbf"},{default:t(()=>[n("RBF")]),_:1}),n(", if that is not possible it will do "),a(l,{to:"/using-wasabi/glossary/Glossary-GeneralBitcoin.html#child-pays-for-parent-cpfp"},{default:t(()=>[n("CPFP")]),_:1}),n(". It is similar to the "),I,n(" method, except that the transaction sends the bitcoin back to the wallet (to an unused internal address).")]),z,s("p",null,[n("Since Wasabi version "),s("a",A,[n("2.0.6"),a(o)]),n(" the RPC can be exposed as an onion service, which enables remote control.")]),s("p",null,[n("The RPC server can be exposed as an onion service by using the "),U,n(),a(l,{to:"/using-wasabi/StartupParameters.html"},{default:t(()=>[n("start up parameter")]),_:1}),n(" or the environment variable.")]),B])}const D=c(d,[["render",E],["__file","RPC.html.vue"]]),G=JSON.parse('{"path":"/using-wasabi/RPC.html","title":"RPC Interface","lang":"en-US","frontmatter":{"title":"RPC Interface","description":"A step by step guide on how to use the Wasabi remote procedure call interface. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Limitations","slug":"limitations","link":"#limitations","children":[]},{"level":2,"title":"Configure RPC","slug":"configure-rpc","link":"#configure-rpc","children":[]},{"level":2,"title":"Available methods","slug":"available-methods","link":"#available-methods","children":[{"level":3,"title":"getstatus","slug":"getstatus","link":"#getstatus","children":[]},{"level":3,"title":"createwallet","slug":"createwallet","link":"#createwallet","children":[]},{"level":3,"title":"recoverwallet","slug":"recoverwallet","link":"#recoverwallet","children":[]},{"level":3,"title":"listwallets","slug":"listwallets","link":"#listwallets","children":[]},{"level":3,"title":"loadwallet","slug":"loadwallet","link":"#loadwallet","children":[]},{"level":3,"title":"listcoins","slug":"listcoins","link":"#listcoins","children":[]},{"level":3,"title":"listunspentcoins","slug":"listunspentcoins","link":"#listunspentcoins","children":[]},{"level":3,"title":"getwalletinfo","slug":"getwalletinfo","link":"#getwalletinfo","children":[]},{"level":3,"title":"getnewaddress","slug":"getnewaddress","link":"#getnewaddress","children":[]},{"level":3,"title":"send","slug":"send","link":"#send","children":[]},{"level":3,"title":"build","slug":"build","link":"#build","children":[]},{"level":3,"title":"broadcast","slug":"broadcast","link":"#broadcast","children":[]},{"level":3,"title":"speeduptransaction","slug":"speeduptransaction","link":"#speeduptransaction","children":[]},{"level":3,"title":"canceltransaction","slug":"canceltransaction","link":"#canceltransaction","children":[]},{"level":3,"title":"gethistory","slug":"gethistory","link":"#gethistory","children":[]},{"level":3,"title":"getfeerates","slug":"getfeerates","link":"#getfeerates","children":[]},{"level":3,"title":"listkeys","slug":"listkeys","link":"#listkeys","children":[]},{"level":3,"title":"excludefromcoinjoin","slug":"excludefromcoinjoin","link":"#excludefromcoinjoin","children":[]},{"level":3,"title":"startcoinjoin","slug":"startcoinjoin","link":"#startcoinjoin","children":[]},{"level":3,"title":"payincoinjoin","slug":"payincoinjoin","link":"#payincoinjoin","children":[]},{"level":3,"title":"listpaymentsincoinjoin","slug":"listpaymentsincoinjoin","link":"#listpaymentsincoinjoin","children":[]},{"level":3,"title":"cancelpaymentincoinjoin","slug":"cancelpaymentincoinjoin","link":"#cancelpaymentincoinjoin","children":[]},{"level":3,"title":"startcoinjoinsweep","slug":"startcoinjoinsweep","link":"#startcoinjoinsweep","children":[]},{"level":3,"title":"stopcoinjoin","slug":"stopcoinjoin","link":"#stopcoinjoin","children":[]},{"level":3,"title":"buildunsafetransaction","slug":"buildunsafetransaction","link":"#buildunsafetransaction","children":[]},{"level":3,"title":"stop","slug":"stop","link":"#stop","children":[]}]},{"level":2,"title":"Errors","slug":"errors","link":"#errors","children":[{"level":3,"title":"Method not found","slug":"method-not-found","link":"#method-not-found","children":[]},{"level":3,"title":"Parse error","slug":"parse-error","link":"#parse-error","children":[]},{"level":3,"title":"Mismatching parameters","slug":"mismatching-parameters","link":"#mismatching-parameters","children":[]}]},{"level":2,"title":"Expose the RPC server as an onion service","slug":"expose-the-rpc-server-as-an-onion-service","link":"#expose-the-rpc-server-as-an-onion-service","children":[{"level":3,"title":"Example","slug":"example","link":"#example","children":[]}]}],"git":{"updatedTime":1720425980000},"filePathRelative":"using-wasabi/RPC.md"}');export{D as comp,G as data}; diff --git a/assets/Receive.html-DJ-IChEN.js b/assets/Receive.html-B3vnDoLn.js similarity index 98% rename from assets/Receive.html-DJ-IChEN.js rename to assets/Receive.html-B3vnDoLn.js index 7422e49c7..14005c7ef 100644 --- a/assets/Receive.html-DJ-IChEN.js +++ b/assets/Receive.html-B3vnDoLn.js @@ -1,7 +1,7 @@ -import{_ as c}from"./Logo_without_text_with_bg_dark_with_yt-D8lqXhN0.js";import{_ as d,a as h}from"./AddressAwaitingPayment-B9ABKMdf.js";import{_ as u,r,o as p,c as b,a as e,d as a,w as i,b as t,e as l}from"./app-3S7gIoGc.js";const y={},m=e("h1",{id:"receive-bitcoin",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#receive-bitcoin"},[e("span",null,"Receive bitcoin")])],-1),w={class:"table-of-contents"},g={href:"https://youtu.be/Wjc00GBn-OQ",title:"Receive bitcoin in Wasabi Wallet",target:"_blank",rel:"noopener noreferrer"},f=e("img",{src:c,alt:"Receive bitcoin in Wasabi Wallet"},null,-1),v=l('

    Generating addresses step-by-step

    1. Start Wasabi and open the wallet that you want to receive coins into.
    2. Click the Receive button in the main view's top right corner.
    3. Type in the name of the entities who know that this address is yours. If you have already used a label before, simply choose it from the suggested labels.

    Receive label in Wasabi

    1. Press Continue and the wallet will generate a new address.

    Bitcoin address in Wasabi

    Bitcoin public keys and addresses

    ',6),k={href:"https://en.wikipedia.org/wiki/Public-key_cryptography",target:"_blank",rel:"noopener noreferrer"},_={href:"https://en.wikipedia.org/wiki/Elliptic_Curve_Digital_Signature_Algorithm",target:"_blank",rel:"noopener noreferrer"},x={href:"https://en.wikipedia.org/wiki/Cryptographic_hash_function",target:"_blank",rel:"noopener noreferrer"},T=e("div",{class:"custom-container tip"},[e("p",{class:"custom-container-title"},"TIP"),e("p",null,'Wasabi Wallet does not "store your money", rather it stores your public keys and an encrypted secret that requires your passphrase to derive the private keys. It creates addresses for receiving bitcoin, and it signs transactions that spend your bitcoin.')],-1),C=e("h2",{id:"the-problem-with-address-reuse",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#the-problem-with-address-reuse"},[e("span",null,"The problem with address reuse")])],-1),W=l('

    TIP

    This is why Wasabi removes the address from the Addresses Awaiting Payment list as soon as it has received a coin.

    The importance of labeling

    Satoshis are the base unit currency of the Bitcoin network and are truly fungible, meaning that any 100 000 000 satoshis are always equal to 1 bitcoin. Just like with gold atoms, it doesn't matter which specific gold atoms you have, as long as it's gold, it's gold. However, an unspent transaction output, a bitcoin, is a chunk of money and is not fungible, because it has a different amount of satoshis in it, a different public key locking it up, a unique transaction history, and a unique index number. This is just like a gold coin, with a unique amount of gold atoms, and either a pretty mintage or an old chipped broken coin. Because UTXOs are not fungible, it is very important to know exactly which coin is which, and that is done by carefully labeling.

    For example, if I create a new address to receive a 0.5 BTC payment from Andrew for a laptop that I sold to him then the label has to be: Andrew.

    The label is not for describing the reason for payment, but rather to list those who know that this address is yours. Understanding this difference between labeling an address and describing a transaction is very important for your privacy.

    TIP

    In Wasabi it is mandatory to give every receive address a label of those who know that this address is yours, so that later you know what to do with it, and it also helps the auto coin selection algorithm when sending.

    Clusters

    Following the previous example, if I have to send a fraction (0.1 BTC) of the previously received coin to Charlie then in the Send tab the observers should be: Charlie. In that way, the change (0.4 BTC) will be known by Andrew and Charlie because they both will be able to follow the change. That's exactly what Wasabi displays in the coins list (cluster column), Wasabi tells us who are the ones that know about each of our coins in order to allow us to decide what to do with the coins.

    Let's take a look at another example: Imagine you have three coins, one known by Alice, one known by a KYC exchange and finally one known by Charlie. Imagine you need to sell a few sats to Charlie, which coin/s should you send? The obvious selection is the one already known by Charlie because by doing that he cannot learn anything new about our wallet, moreover, neither Alice nor the KYC exchange can learn anything new! But what if the coin is not big enough and we need to use more than one coin? You can use the one known by Alice or the one known by the KYC exchange, but are you okay with Charlie knowing about your deposit/withdrawal from the exchange? Are you okay with Alice knowing about your deal with Charlie? In case none of those combinations are acceptable for you then you should CoinJoin your coins.

    Coinjoined coins

    ',10),B=l(`

    Final words about labels and examples

    4 coins with good labels:

    Andrew
    +import{_ as c}from"./Logo_without_text_with_bg_dark_with_yt-D8lqXhN0.js";import{_ as d,a as h}from"./AddressAwaitingPayment-B9ABKMdf.js";import{_ as u,r,o as p,c as b,a as e,d as a,w as i,b as t,e as l}from"./app-CwImt2bI.js";const y={},m=e("h1",{id:"receive-bitcoin",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#receive-bitcoin"},[e("span",null,"Receive bitcoin")])],-1),w={class:"table-of-contents"},g={href:"https://youtu.be/Wjc00GBn-OQ",title:"Receive bitcoin in Wasabi Wallet",target:"_blank",rel:"noopener noreferrer"},f=e("img",{src:c,alt:"Receive bitcoin in Wasabi Wallet"},null,-1),v=l('

    Generating addresses step-by-step

    1. Start Wasabi and open the wallet that you want to receive coins into.
    2. Click the Receive button in the main view's top right corner.
    3. Type in the name of the entities who know that this address is yours. If you have already used a label before, simply choose it from the suggested labels.

    Receive label in Wasabi

    1. Press Continue and the wallet will generate a new address.

    Bitcoin address in Wasabi

    Bitcoin public keys and addresses

    ',6),k={href:"https://en.wikipedia.org/wiki/Public-key_cryptography",target:"_blank",rel:"noopener noreferrer"},_={href:"https://en.wikipedia.org/wiki/Elliptic_Curve_Digital_Signature_Algorithm",target:"_blank",rel:"noopener noreferrer"},x={href:"https://en.wikipedia.org/wiki/Cryptographic_hash_function",target:"_blank",rel:"noopener noreferrer"},T=e("div",{class:"custom-container tip"},[e("p",{class:"custom-container-title"},"TIP"),e("p",null,'Wasabi Wallet does not "store your money", rather it stores your public keys and an encrypted secret that requires your passphrase to derive the private keys. It creates addresses for receiving bitcoin, and it signs transactions that spend your bitcoin.')],-1),C=e("h2",{id:"the-problem-with-address-reuse",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#the-problem-with-address-reuse"},[e("span",null,"The problem with address reuse")])],-1),W=l('

    TIP

    This is why Wasabi removes the address from the Addresses Awaiting Payment list as soon as it has received a coin.

    The importance of labeling

    Satoshis are the base unit currency of the Bitcoin network and are truly fungible, meaning that any 100 000 000 satoshis are always equal to 1 bitcoin. Just like with gold atoms, it doesn't matter which specific gold atoms you have, as long as it's gold, it's gold. However, an unspent transaction output, a bitcoin, is a chunk of money and is not fungible, because it has a different amount of satoshis in it, a different public key locking it up, a unique transaction history, and a unique index number. This is just like a gold coin, with a unique amount of gold atoms, and either a pretty mintage or an old chipped broken coin. Because UTXOs are not fungible, it is very important to know exactly which coin is which, and that is done by carefully labeling.

    For example, if I create a new address to receive a 0.5 BTC payment from Andrew for a laptop that I sold to him then the label has to be: Andrew.

    The label is not for describing the reason for payment, but rather to list those who know that this address is yours. Understanding this difference between labeling an address and describing a transaction is very important for your privacy.

    TIP

    In Wasabi it is mandatory to give every receive address a label of those who know that this address is yours, so that later you know what to do with it, and it also helps the auto coin selection algorithm when sending.

    Clusters

    Following the previous example, if I have to send a fraction (0.1 BTC) of the previously received coin to Charlie then in the Send tab the observers should be: Charlie. In that way, the change (0.4 BTC) will be known by Andrew and Charlie because they both will be able to follow the change. That's exactly what Wasabi displays in the coins list (cluster column), Wasabi tells us who are the ones that know about each of our coins in order to allow us to decide what to do with the coins.

    Let's take a look at another example: Imagine you have three coins, one known by Alice, one known by a KYC exchange and finally one known by Charlie. Imagine you need to sell a few sats to Charlie, which coin/s should you send? The obvious selection is the one already known by Charlie because by doing that he cannot learn anything new about our wallet, moreover, neither Alice nor the KYC exchange can learn anything new! But what if the coin is not big enough and we need to use more than one coin? You can use the one known by Alice or the one known by the KYC exchange, but are you okay with Charlie knowing about your deposit/withdrawal from the exchange? Are you okay with Alice knowing about your deal with Charlie? In case none of those combinations are acceptable for you then you should CoinJoin your coins.

    Coinjoined coins

    ',10),B=l(`

    Final words about labels and examples

    4 coins with good labels:

    Andrew
     David, Me
     Carlos, Sofia
     KYC exchange
     

    2 coins with bad labels:

    Payment from Andrew for my laptop
     From my old wallet
    -

    In case we take the two first coins with good labels and send them to María, look how the change cluster will be displayed: Maria, Andrew, David, Me (these people know about the coin). Now, look how this will be displayed if I use the two coins with bad labels: Maria, Payment from Andrew for my laptop, From my old wallet (Is this high-quality info about the privacy level of my coin? Not really.).

    So, think about coins, think about who knows and make sure to make decisions about privacy based on what you are going to reveal and to whom. Wasabi doesn't care about why you transact with bitcoins, it only cares about who you transact with because this is what helps you reclaim your privacy.

    `,7);function I(A,R){const n=r("router-link"),o=r("ExternalLinkIcon"),s=r("RouteLink");return p(),b("div",null,[m,e("nav",w,[e("ul",null,[e("li",null,[a(n,{to:"#generating-addresses-step-by-step"},{default:i(()=>[t("Generating addresses step-by-step")]),_:1})]),e("li",null,[a(n,{to:"#bitcoin-public-keys-and-addresses"},{default:i(()=>[t("Bitcoin public keys and addresses")]),_:1})]),e("li",null,[a(n,{to:"#the-problem-with-address-reuse"},{default:i(()=>[t("The problem with address reuse")]),_:1})]),e("li",null,[a(n,{to:"#the-importance-of-labeling"},{default:i(()=>[t("The importance of labeling")]),_:1}),e("ul",null,[e("li",null,[a(n,{to:"#clusters"},{default:i(()=>[t("Clusters")]),_:1})]),e("li",null,[a(n,{to:"#coinjoined-coins"},{default:i(()=>[t("Coinjoined coins")]),_:1})]),e("li",null,[a(n,{to:"#final-words-about-labels-and-examples"},{default:i(()=>[t("Final words about labels and examples")]),_:1})])])])])]),e("p",null,[e("a",g,[f,a(o)])]),v,e("p",null,[t("The Bitcoin protocol utilizes "),e("a",k,[t("public key cryptography"),a(o)]),t(" to defend and verify the property rights of the individuals holding and transacting bitcoin. A private key is a large random number that should be kept secret. With the "),e("a",_,[t("elliptic curve digital signature algorithm"),a(o)]),t(", based on the private key you can calculate a public key. If someone has only the public key, it is computationally infeasible [pretty much impossible] to calculate the private key. Whoever knows the private key can calculate a cryptography signature over a message, which proves that the private key was known by the signer, without actually revealing the secret.")]),e("p",null,[t("For data size efficiency, in Bitcoin, the public key is "),e("a",x,[t("hashed"),a(o)]),t(" and encoded into a "),a(s,{to:"/using-wasabi/BIPs.html#bip-173-base32-address-format-for-native-v0-16-witness-outputs"},{default:i(()=>[t("bech32")]),_:1}),t(' address. This address commits to the public key, which commits to the private key. In a Bitcoin transaction, the output creates a new unspent transaction output which is "locked up" by an address. The input of the transaction spends a UTXO by providing a valid signature of the public key that the address committed to.')]),T,C,e("p",null,[t("Whenever you use the same address to lock up different UTXOs, then all these coins can be spent by anyone who knows the same private key. This makes it obvious for anyone that this one entity [you] owns all these coins, which is very bad for privacy. The first rule of Bitcoin privacy is "),a(s,{to:"/why-wasabi/AddressReuse.html"},{default:i(()=>[t("never reuse addresses")]),_:1}),t("!")]),W,e("p",null,[t("Those inputs that participate in a Wasabi "),a(s,{to:"/using-wasabi/CoinJoin.html"},{default:i(()=>[t("coinjoin")]),_:1}),t(" transaction get transformed into arbitrary sized outputs with an increased anonymity score. By default, Wasabi tries to create big coinjoin transactions with many inputs and outputs, but the individual coins' privacy varies depending on the final amounts and values of the inputs and outputs of other participants. The higher the anonymity score of a coin, the harder it is for an observer to know who that coin belongs to. For that reason, coins with a high anonymity score are usually the ones preferred when making a payment transaction. When coins achieve the target anonymity score of the selected coinjoin strategy, their values will the visible under the Privacy Progress bar.")]),B])}const S=u(y,[["render",I],["__file","Receive.html.vue"]]),N=JSON.parse('{"path":"/using-wasabi/Receive.html","title":"Receive","lang":"en-US","frontmatter":{"title":"Receive","description":"A step-by-step guide on how to receive bitcoin in Wasabi. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Generating addresses step-by-step","slug":"generating-addresses-step-by-step","link":"#generating-addresses-step-by-step","children":[]},{"level":2,"title":"Bitcoin public keys and addresses","slug":"bitcoin-public-keys-and-addresses","link":"#bitcoin-public-keys-and-addresses","children":[]},{"level":2,"title":"The problem with address reuse","slug":"the-problem-with-address-reuse","link":"#the-problem-with-address-reuse","children":[]},{"level":2,"title":"The importance of labeling","slug":"the-importance-of-labeling","link":"#the-importance-of-labeling","children":[{"level":3,"title":"Clusters","slug":"clusters","link":"#clusters","children":[]},{"level":3,"title":"Coinjoined coins","slug":"coinjoined-coins","link":"#coinjoined-coins","children":[]},{"level":3,"title":"Final words about labels and examples","slug":"final-words-about-labels-and-examples","link":"#final-words-about-labels-and-examples","children":[]}]}],"git":{"updatedTime":1720425186000},"filePathRelative":"using-wasabi/Receive.md"}');export{S as comp,N as data}; +

    In case we take the two first coins with good labels and send them to María, look how the change cluster will be displayed: Maria, Andrew, David, Me (these people know about the coin). Now, look how this will be displayed if I use the two coins with bad labels: Maria, Payment from Andrew for my laptop, From my old wallet (Is this high-quality info about the privacy level of my coin? Not really.).

    So, think about coins, think about who knows and make sure to make decisions about privacy based on what you are going to reveal and to whom. Wasabi doesn't care about why you transact with bitcoins, it only cares about who you transact with because this is what helps you reclaim your privacy.

    `,7);function I(A,R){const n=r("router-link"),o=r("ExternalLinkIcon"),s=r("RouteLink");return p(),b("div",null,[m,e("nav",w,[e("ul",null,[e("li",null,[a(n,{to:"#generating-addresses-step-by-step"},{default:i(()=>[t("Generating addresses step-by-step")]),_:1})]),e("li",null,[a(n,{to:"#bitcoin-public-keys-and-addresses"},{default:i(()=>[t("Bitcoin public keys and addresses")]),_:1})]),e("li",null,[a(n,{to:"#the-problem-with-address-reuse"},{default:i(()=>[t("The problem with address reuse")]),_:1})]),e("li",null,[a(n,{to:"#the-importance-of-labeling"},{default:i(()=>[t("The importance of labeling")]),_:1}),e("ul",null,[e("li",null,[a(n,{to:"#clusters"},{default:i(()=>[t("Clusters")]),_:1})]),e("li",null,[a(n,{to:"#coinjoined-coins"},{default:i(()=>[t("Coinjoined coins")]),_:1})]),e("li",null,[a(n,{to:"#final-words-about-labels-and-examples"},{default:i(()=>[t("Final words about labels and examples")]),_:1})])])])])]),e("p",null,[e("a",g,[f,a(o)])]),v,e("p",null,[t("The Bitcoin protocol utilizes "),e("a",k,[t("public key cryptography"),a(o)]),t(" to defend and verify the property rights of the individuals holding and transacting bitcoin. A private key is a large random number that should be kept secret. With the "),e("a",_,[t("elliptic curve digital signature algorithm"),a(o)]),t(", based on the private key you can calculate a public key. If someone has only the public key, it is computationally infeasible [pretty much impossible] to calculate the private key. Whoever knows the private key can calculate a cryptography signature over a message, which proves that the private key was known by the signer, without actually revealing the secret.")]),e("p",null,[t("For data size efficiency, in Bitcoin, the public key is "),e("a",x,[t("hashed"),a(o)]),t(" and encoded into a "),a(s,{to:"/using-wasabi/BIPs.html#bip-173-base32-address-format-for-native-v0-16-witness-outputs"},{default:i(()=>[t("bech32")]),_:1}),t(' address. This address commits to the public key, which commits to the private key. In a Bitcoin transaction, the output creates a new unspent transaction output which is "locked up" by an address. The input of the transaction spends a UTXO by providing a valid signature of the public key that the address committed to.')]),T,C,e("p",null,[t("Whenever you use the same address to lock up different UTXOs, then all these coins can be spent by anyone who knows the same private key. This makes it obvious for anyone that this one entity [you] owns all these coins, which is very bad for privacy. The first rule of Bitcoin privacy is "),a(s,{to:"/why-wasabi/AddressReuse.html"},{default:i(()=>[t("never reuse addresses")]),_:1}),t("!")]),W,e("p",null,[t("Those inputs that participate in a Wasabi "),a(s,{to:"/using-wasabi/CoinJoin.html"},{default:i(()=>[t("coinjoin")]),_:1}),t(" transaction get transformed into arbitrary sized outputs with an increased anonymity score. By default, Wasabi tries to create big coinjoin transactions with many inputs and outputs, but the individual coins' privacy varies depending on the final amounts and values of the inputs and outputs of other participants. The higher the anonymity score of a coin, the harder it is for an observer to know who that coin belongs to. For that reason, coins with a high anonymity score are usually the ones preferred when making a payment transaction. When coins achieve the target anonymity score of the selected coinjoin strategy, their values will the visible under the Privacy Progress bar.")]),B])}const S=u(y,[["render",I],["__file","Receive.html.vue"]]),N=JSON.parse('{"path":"/using-wasabi/Receive.html","title":"Receive","lang":"en-US","frontmatter":{"title":"Receive","description":"A step-by-step guide on how to receive bitcoin in Wasabi. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Generating addresses step-by-step","slug":"generating-addresses-step-by-step","link":"#generating-addresses-step-by-step","children":[]},{"level":2,"title":"Bitcoin public keys and addresses","slug":"bitcoin-public-keys-and-addresses","link":"#bitcoin-public-keys-and-addresses","children":[]},{"level":2,"title":"The problem with address reuse","slug":"the-problem-with-address-reuse","link":"#the-problem-with-address-reuse","children":[]},{"level":2,"title":"The importance of labeling","slug":"the-importance-of-labeling","link":"#the-importance-of-labeling","children":[{"level":3,"title":"Clusters","slug":"clusters","link":"#clusters","children":[]},{"level":3,"title":"Coinjoined coins","slug":"coinjoined-coins","link":"#coinjoined-coins","children":[]},{"level":3,"title":"Final words about labels and examples","slug":"final-words-about-labels-and-examples","link":"#final-words-about-labels-and-examples","children":[]}]}],"git":{"updatedTime":1720425980000},"filePathRelative":"using-wasabi/Receive.md"}');export{S as comp,N as data}; diff --git a/assets/Security.html-zR3z54mc.js b/assets/Security.html-CjcZ0NtV.js similarity index 99% rename from assets/Security.html-zR3z54mc.js rename to assets/Security.html-CjcZ0NtV.js index 003ae05c7..12a01e075 100644 --- a/assets/Security.html-zR3z54mc.js +++ b/assets/Security.html-CjcZ0NtV.js @@ -1,4 +1,4 @@ -import{_ as l,r as v,o as d,c as r,a as i,b as n,d as s,e as a}from"./app-3S7gIoGc.js";const c={},u=i("h1",{id:"security-policy",tabindex:"-1"},[i("a",{class:"header-anchor",href:"#security-policy"},[i("span",null,"Security Policy")])],-1),b={href:"https://github.com/WalletWasabi/WalletWasabi/issues/new/choose",target:"_blank",rel:"noopener noreferrer"},m={href:"https://github.com/WalletWasabi/WalletWasabi/security/advisories/new",target:"_blank",rel:"noopener noreferrer"},t=i("code",null,"F079 0C08 68BD BAB8 EE33 F9CE 50FB 7FEB 00F9 7588",-1),o=a(`
    -----BEGIN PGP PUBLIC KEY BLOCK-----
    +import{_ as l,r as v,o as d,c as r,a as i,b as n,d as s,e as a}from"./app-CwImt2bI.js";const c={},u=i("h1",{id:"security-policy",tabindex:"-1"},[i("a",{class:"header-anchor",href:"#security-policy"},[i("span",null,"Security Policy")])],-1),b={href:"https://github.com/WalletWasabi/WalletWasabi/issues/new/choose",target:"_blank",rel:"noopener noreferrer"},m={href:"https://github.com/WalletWasabi/WalletWasabi/security/advisories/new",target:"_blank",rel:"noopener noreferrer"},t=i("code",null,"F079 0C08 68BD BAB8 EE33 F9CE 50FB 7FEB 00F9 7588",-1),o=a(`
    -----BEGIN PGP PUBLIC KEY BLOCK-----
     
     mQINBF1e9xEBEACvehUjz+FTOdj824HLkIIYLGUqlV7FhkzjAob7P2v+1LrCAdnE
     ATGe6Yb0jz/kQ+6U5W/5YWVBjy80hS+JfMESvXIPmgf6Dnz4zKZ2IDZ4V32mjJ4p
    @@ -144,4 +144,4 @@ VeNeeXEn8Ya4e5QLgcubXK1RTeg6HfiYzJMzFcYfV1O9x6PG2Wj5PLBI6qfwRtNO
     TeI=
     =QePN
     -----END PGP PUBLIC KEY BLOCK-----
    -
    `,1);function A(B,Q){const e=v("ExternalLinkIcon");return d(),r("div",null,[u,i("p",null,[n("If a vulnerability does not compromise users' privacy or security, open a "),i("a",b,[n("regular GitHub issue"),s(e)]),n(".")]),i("p",null,[n("If it does, then pay great care to responsible disclosure. Report a "),i("a",m,[n("private vulnerability on GitHub"),s(e)]),n(" or send an email to molnardavid84@gmail.com, preferably using PGP encryption: "),t]),o])}const C=l(c,[["render",A],["__file","Security.html.vue"]]),p=JSON.parse('{"path":"/building-wasabi/Security.html","title":"Security Policy","lang":"en-US","frontmatter":{"title":"Security Policy","description":"For those looking to responsibly disclose a vulnerability. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[],"git":{"updatedTime":1720425186000},"filePathRelative":"building-wasabi/Security.md"}');export{C as comp,p as data}; +
    `,1);function A(B,Q){const e=v("ExternalLinkIcon");return d(),r("div",null,[u,i("p",null,[n("If a vulnerability does not compromise users' privacy or security, open a "),i("a",b,[n("regular GitHub issue"),s(e)]),n(".")]),i("p",null,[n("If it does, then pay great care to responsible disclosure. Report a "),i("a",m,[n("private vulnerability on GitHub"),s(e)]),n(" or send an email to molnardavid84@gmail.com, preferably using PGP encryption: "),t]),o])}const C=l(c,[["render",A],["__file","Security.html.vue"]]),p=JSON.parse('{"path":"/building-wasabi/Security.html","title":"Security Policy","lang":"en-US","frontmatter":{"title":"Security Policy","description":"For those looking to responsibly disclose a vulnerability. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[],"git":{"updatedTime":1720425980000},"filePathRelative":"building-wasabi/Security.md"}');export{C as comp,p as data}; diff --git a/assets/Send.html-D0pe3AOm.js b/assets/Send.html-D3Odg27s.js similarity index 99% rename from assets/Send.html-D0pe3AOm.js rename to assets/Send.html-D3Odg27s.js index b169095f3..f16021f03 100644 --- a/assets/Send.html-D0pe3AOm.js +++ b/assets/Send.html-D3Odg27s.js @@ -1 +1 @@ -import{_ as h}from"./Logo_without_text_with_bg_dark_with_yt-D8lqXhN0.js";import{_ as d,c as u,a as p,b as c}from"./HistoryRightClick-DykL0_1P.js";import{_ as m}from"./CoinjoinStrategy-BZrDbG5n.js";import{_ as g,r as l,o as b,c as f,a as e,d as n,w as i,b as t,e as r}from"./app-3S7gIoGc.js";const y="/SendButton.png",_="/SendRecipientLabel.png",v="/Send.png",w="/SendChangeFee.png",k="/SendPrivacySuggestion.png",W="/SendPreviewTransaction.png",S="/SendPassword.png",T="/PaymentSuccessful.png",x={},C=e("h1",{id:"send",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#send"},[e("span",null,"Send")])],-1),A={class:"table-of-contents"},P={href:"https://youtu.be/vCI5aza-lv0",title:"Send in Wasabi Wallet",target:"_blank",rel:"noopener noreferrer"},F=e("img",{src:h,alt:"Send in Wasabi Wallet"},null,-1),B=r('

    How to send bitcoin step-by-step

    1. Click the Send button.

    Wasabi Wallet Send Button

    1. Enter/paste the destination address.

    Wasabi Wallet Send To Field

    1. Specify the amount of bitcoin to send to the destination address. Optionally, you can specify the dollar amount to send instead.

    Wasabi Wallet Send Amount Field

    1. Label the recipient by entering the name of the person or company who you are sending to.

    Wasabi Wallet Send Recipient Label

    1. Click Continue.

    Wasabi Wallet Send

    1. Preview Transaction.

      • Verify the amount, recipient, and the address.
      • Review the estimated time for confirmation and the transaction fee. Optionally, you can change the transaction fee or confirmation time by clicking on the edit fee icon.

      Wasabi Wallet Send Change Fee

      • Review the suggestions to improve your privacy by clicking the shield icon in the top right corner. For example, you may want to slightly increase or decrease your payment amount to avoid change.

      Wasabi Wallet Send Privacy Suggestion

    2. Click Confirm.

    Wasabi Wallet Send Preview Transaction

    1. Type in your passphrase, then click Send.

    Wasabi Wallet Send Passphrase

    1. Transaction successfully sent!

    Wasabi Wallet Payment Successful

    Coins

    ',18),R=e("code",null,"Send",-1),U=e("h2",{id:"clusters",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#clusters"},[e("span",null,"Clusters")])],-1),I=e("code",null,"Alice",-1),j=e("code",null,"Alice, Bob",-1),O=e("h2",{id:"anonymity-set",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#anonymity-set"},[e("span",null,"Anonymity Set")])],-1),E=e("p",null,[t("A typical bitcoin transaction will contain one input and two outputs - one of the outputs is the coin you are sending and the other output is the change coin that goes back to your wallet. Your change coin can be linked to this one input. There is a 1 in 1 chance to find this link and no plausible deniability. Thus, Wasabi denotes this coin's anonymity set as "),e("code",null,"1"),t(".")],-1),H=e("p",null,[t("There are three coinjoin strategies to choose from in Wasabi Wallet which effect the target anonymity score for your coins. These three strategies are "),e("code",null,"Minimize Cost"),t(", "),e("code",null,"Maximize Speed"),t(", and "),e("code",null,"Maximize Privacy"),t(". Each of these strategies come with different trade-offs.")],-1),L=e("p",null,"Alternatively, custom coinjoin settings can be configured.",-1),M=e("p",null,[e("img",{src:m,alt:"Coinjoin Strategy",title:"Coinjoin Strategy"})],-1),z=e("h2",{id:"receiving-address",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#receiving-address"},[e("span",null,"Receiving Address")])],-1),N=e("code",null,"1",-1),q=e("code",null,"3",-1),G=e("code",null,"bc1q",-1),V=e("code",null,"bc1p",-1),Y=e("h2",{id:"observers",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#observers"},[e("span",null,"Observers")])],-1),X=r('

    Amount

    In the Amount text box you can specify how many bitcoins the receiving address will gain. You can also see and enter the current US Dollar value of the sending amount.

    Avoid sending rounded values

    If you specify a rounded amount, like 0.0100 0000 bitcoin, then the change output will not be rounded, like 0.0896 8413 bitcoin. This makes it easy for an observer to conclude that the spending amount was the 0.01 bitcoin, and that the other output is the change back to the sender. So in order to increase your privacy, you can set a non-rounded amount, like 0.0101 6843.

    Send Amount Field

    Mining Fee

    ',5),J=e("code",null,"value of inputs - value of outputs",-1),K=e("code",null,"smart fee",-1),Q=e("p",null,[e("img",{src:d,alt:"Wasabi Wallet Fee Slider",title:"Wasabi Wallet Fee Slider"})],-1),D=e("p",null,[t("In some cases, there is very little demand for block space, and then Wasabi will set the minimum fee of "),e("code",null,"1 sat/vByte"),t(".")],-1),$={class:"custom-container tip"},Z=e("p",{class:"custom-container-title"},"High-priority transaction fees",-1),ee=e("p",null,"If you have a transaction that is high-priority and you really want it to be confirmed ASAP:",-1),te={href:"https://mempool.space",target:"_blank",rel:"noopener noreferrer"},ne={href:"http://mempoolhqx4isw62xs7abwphsq7ldayuidyx2v2oethdhhj6mlo2r6ad.onion/",target:"_blank",rel:"noopener noreferrer"},ie=e("li",null,"Select a fee that is well above the current highest fee (perhaps double or triple it) if it is very important to you that the transaction is confirmed soon.",-1),oe={href:"https://bitcointechtalk.com/an-introduction-to-bitcoin-core-fee-estimation-27920880ad0",target:"_blank",rel:"noopener noreferrer"},ae=e("h2",{id:"privacy-suggestions",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#privacy-suggestions"},[e("span",null,"Privacy Suggestions")])],-1),se={href:"https://github.com/WalletWasabi/WalletWasabi/releases/tag/v2.0.4",target:"_blank",rel:"noopener noreferrer"},le=e("em",null,"Preview Transaction",-1),re=r('

    There are warnings for:

    • Interlinking labels
    • Using non-private coins
    • Using semi-private coins
    • Creating change
    • Consolidating 10 coins or more
    • Using unconfirmed coins
    • Using coinjoining coins

    There are clickable suggestions to:

    • Manage labels (when interlinking labels)
    • Only use private coins
    • Not use non-private coins (only use private and semi-private)
    • Avoid change

    The suggestion to only use semi-private or private coins is only shown if the amount difference is less than or equal to 25%.

    TIP

    Each suggestion has a tooltip. Hover over the suggestion to see more information.

    Password

    ',7),ce=e("h2",{id:"broadcast",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#broadcast"},[e("span",null,"Broadcast")])],-1),he=e("p",null,"Once the transaction is signed, Wasabi will connect to a random Bitcoin P2P node over Tor and provide this transaction, then it will immediately disconnect. This first node will gossip the transaction throughout the network, then miners can include it in a block.",-1),de=e("h2",{id:"speed-up-or-cancel-transaction",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#speed-up-or-cancel-transaction"},[e("span",null,"Speed Up or Cancel Transaction")])],-1),ue=e("p",null,'Pending (unconfirmed) Bitcoin transactions can be replaced by sending a new transaction that pays a higher fee rate using the same (or some) coins/UTXOs. This can be used to speed up or cancel a transaction. The miners are incentivized to mine the transaction with the higher fee rate, as this will earn them more money. If the new higher fee rate paying transaction is confirmed, the old transaction can be considered "replaced".',-1),pe={href:"https://github.com/WalletWasabi/WalletWasabi/releases/tag/v2.0.4",target:"_blank",rel:"noopener noreferrer"},me=e("em",null,"Cancel Transaction",-1),ge=e("p",null,"Speeding up or cancelling a transaction costs additional fees, because a new bitcoin transaction with a higher fee rate (than the previous transaction) has to be sent.",-1),be=e("p",null,"To Speed Up or Cancel a Transaction, right-click on the pending transaction in the history.",-1),fe=e("p",null,[e("img",{src:u,alt:"History Right Click",title:"History Right Click"})],-1),ye=e("p",null,"Click one of the two options and then confirm that you want to pay the additional fee for this action. After which the succesfully speed up/cancelled dialog is displayed.",-1),_e=e("p",null,"In the history, the transaction will now have a rocket (speeded up) or a cross (cancelled) icon. The transaction is still pending, but it should be confirmed sooner than the initial transaction.",-1),ve={href:"https://youtu.be/55KURak5r58",target:"_blank",rel:"noopener noreferrer"},we=e("img",{src:"https://img.youtube.com/vi/55KURak5r58/maxresdefault.jpg",alt:"How to speed up Bitcoin transaction"},null,-1);function ke(We,Se){const o=l("router-link"),s=l("ExternalLinkIcon"),a=l("RouteLink");return b(),f("div",null,[C,e("nav",A,[e("ul",null,[e("li",null,[n(o,{to:"#how-to-send-bitcoin-step-by-step"},{default:i(()=>[t("How to send bitcoin step-by-step")]),_:1})]),e("li",null,[n(o,{to:"#coins"},{default:i(()=>[t("Coins")]),_:1})]),e("li",null,[n(o,{to:"#clusters"},{default:i(()=>[t("Clusters")]),_:1})]),e("li",null,[n(o,{to:"#anonymity-set"},{default:i(()=>[t("Anonymity Set")]),_:1})]),e("li",null,[n(o,{to:"#receiving-address"},{default:i(()=>[t("Receiving Address")]),_:1})]),e("li",null,[n(o,{to:"#observers"},{default:i(()=>[t("Observers")]),_:1})]),e("li",null,[n(o,{to:"#amount"},{default:i(()=>[t("Amount")]),_:1})]),e("li",null,[n(o,{to:"#mining-fee"},{default:i(()=>[t("Mining Fee")]),_:1})]),e("li",null,[n(o,{to:"#privacy-suggestions"},{default:i(()=>[t("Privacy Suggestions")]),_:1})]),e("li",null,[n(o,{to:"#password"},{default:i(()=>[t("Password")]),_:1})]),e("li",null,[n(o,{to:"#broadcast"},{default:i(()=>[t("Broadcast")]),_:1})]),e("li",null,[n(o,{to:"#speed-up-or-cancel-transaction"},{default:i(()=>[t("Speed Up or Cancel Transaction")]),_:1})])])]),e("p",null,[e("a",P,[F,n(s)])]),B,e("p",null,[t("A coin is an unspent transaction output (UTXO): a chunk of bitcoin that can be sent in a future transaction. Unlike fiat currencies which have fixed denominations, each UTXO contains a variable amount of bitcoin. You can get coins by first "),n(a,{to:"/using-wasabi/Receive.html"},{default:i(()=>[t("receiving")]),_:1}),t(" them from someone else. When you want to send some bitcoin you simply enter the amount to send and the address after clicking the "),R,t(" button. Wasabi Wallet does the job of automatically selecting the appropriate combination of coins to include as inputs in the transaction.")]),U,e("p",null,[t("Every time you receive a payment, you first must "),n(a,{to:"/using-wasabi/Receive.html#the-importance-of-labeling"},{default:i(()=>[t("label the observers")]),_:1}),t(" who know this address is yours. This transaction metadata is used to build a cluster of which people know about your coins. For example, if you receive a coin from Alice, then the cluster is "),I,t(". If you now send half of this coin to Bob, then the cluster of your change coin is "),j,t(". The goal is to know the observers who know about your coins and try to reduce their number for each coin.")]),O,E,e("p",null,[t("In a Wasabi "),n(a,{to:"/using-wasabi/CoinJoin.html"},{default:i(()=>[t("coinjoin")]),_:1}),t(", many peers register coins in the input of the transaction, and in the output there are several equal value coins. For example, the output may contain 20 coins worth exactly 0.3 bitcoin. This means that when looking at one of these coinjoin outputs, there is a 1 in 20 chance to find the corresponding input: thus an anonymity set of 20. Therefore, the higher the anonymity set, the more your post-coinjoin coin is delinked from the pre-coinjoin history.")]),H,L,M,z,e("p",null,[t("When sending bitcoin, you need to know the destination address of the receiver. This commits to the spending condition that the receiver agrees to have for this coin. The address can be a public key hash [starting with "),N,t("], a script hash [starting with "),q,t("], a native SegWit bech32 public key hash [starting with "),G,t("], or a Taproot bech32m public key [starting with "),V,t("]. Make sure that you ask the receiver for a "),n(a,{to:"/why-wasabi/AddressReuse.html"},{default:i(()=>[t("new address")]),_:1}),t(" for every payment to protect your privacy and theirs. Wasabi will calculate the checksum and notify you if the provided address is wrong.")]),Y,e("p",null,[t("In Wasabi it is mandatory to provide one or more "),n(a,{to:"/using-wasabi/Receive.html#the-importance-of-labeling"},{default:i(()=>[t("labels")]),_:1}),t(" each time you initiate a transfer of bitcoin. These labels should be the observers of the transaction. An observer of a sending transaction is, of course, the receiver, as well as any other third party that knows that you are the sender of this transaction. For example, you should include as a label the payment processor or the bitcoin exchange if you use their services. This metadata will be used to build an accurate cluster of observers who know about your coins.")]),X,e("p",null,[t("Every transaction must specify a fee which incentives the miner to include it in a block, it is calculated by "),J,t(". The higher the fee per virtual byte (vByte) transaction size, the more likely miners are to confirm this transaction. Wasabi uses Bitcoin Core's "),K,t(" algorithm to estimate the time it will take to confirm at the given fee level. You can change the fee by moving the slider, or by manually setting the "),n(a,{to:"/FAQ/FAQ-UseWasabi.html#how-do-i-set-custom-fee-rate"},{default:i(()=>[t("transaction fee rate")]),_:1}),t(".")]),Q,D,e("div",$,[Z,ee,e("ol",null,[e("li",null,[t("Use "),e("a",te,[t("a mempool monitor"),n(s)]),t(" (available "),e("a",ne,[t("Tor onion website"),n(s)]),t(") to see what fees are likely to get a transaction to be confirmed in the next block.")]),ie]),e("p",null,[t("For a deeper dive into the fee estimation process, "),e("a",oe,[t("this article"),n(s)]),t(" is worth reading.")])]),ae,e("p",null,[t("Since Wasabi version "),e("a",se,[t("2.0.4"),n(s)]),t(" the "),le,t(" dialog contains privacy suggestions. The privacy suggestions help the user to improve their transaction. They are displayed when hovering over the triangle or shield in the top right corner. The suggestions are based on the current coin selection for this transaction. For example, the suggestions will warn the user when the transaction contains non-private coins.")]),re,e("p",null,[t("In order to spend a coin, the transaction must be signed by the private key corresponding to that coin. Wasabi stores a secret on the computer, encrypted with the passphrase that you specified during the "),n(a,{to:"/using-wasabi/WalletGeneration.html#important-info-about-your-wallet-password"},{default:i(()=>[t("wallet generation")]),_:1}),t(". To spend a coin you need to type in the passphrase, which decrypts the encrypted secret, and then derive the child private key that signs the transaction. Afterwards, the passphrase is wiped from memory.")]),ce,he,e("p",null,[t("If for some reason the first broadcast fails, then if you have Wasabi connected to "),n(a,{to:"/using-wasabi/BitcoinFullNode.html"},{default:i(()=>[t("your own Bitcoin full node")]),_:1}),t(" this node will broadcast the transaction to the network. If this also fails, then the transaction is sent to the backend coordinator with a new Tor identity, who then broadcasts the transaction to the network.")]),de,ue,e("p",null,[t("Since Wasabi version "),e("a",pe,[t("2.0.4"),n(s)]),t(" it is possible to easily speed up or cancel a pending transaction. Speeding up and cancelling are similar to each other, the main difference being that a "),me,t(` will send the coins to a new address owned by the user/wallet (this is all done automatically). The transaction is then "cancelled" because the bitcoin (minus the fees) is returned to the user's wallet.`)]),ge,e("p",null,[t("Wasabi first tries to utilize "),n(a,{to:"/using-wasabi/glossary/Glossary-GeneralBitcoin.html#replace-by-fee-rbf"},{default:i(()=>[t("RBF")]),_:1}),t(", if that's not possible it tries to do "),n(a,{to:"/using-wasabi/glossary/Glossary-GeneralBitcoin.html#child-pays-for-parent-cpfp"},{default:i(()=>[t("CPFP")]),_:1}),t(".")]),be,fe,ye,_e,e("p",null,[e("a",ve,[we,n(s)])])])}const Pe=g(x,[["render",ke],["__file","Send.html.vue"]]),Fe=JSON.parse('{"path":"/using-wasabi/Send.html","title":"Send","lang":"en-US","frontmatter":{"title":"Send","description":"A step-by-step guide on how to send bitcoin in Wasabi. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"How to send bitcoin step-by-step","slug":"how-to-send-bitcoin-step-by-step","link":"#how-to-send-bitcoin-step-by-step","children":[]},{"level":2,"title":"Coins","slug":"coins","link":"#coins","children":[]},{"level":2,"title":"Clusters","slug":"clusters","link":"#clusters","children":[]},{"level":2,"title":"Anonymity Set","slug":"anonymity-set","link":"#anonymity-set","children":[]},{"level":2,"title":"Receiving Address","slug":"receiving-address","link":"#receiving-address","children":[]},{"level":2,"title":"Observers","slug":"observers","link":"#observers","children":[]},{"level":2,"title":"Amount","slug":"amount","link":"#amount","children":[]},{"level":2,"title":"Mining Fee","slug":"mining-fee","link":"#mining-fee","children":[]},{"level":2,"title":"Privacy Suggestions","slug":"privacy-suggestions","link":"#privacy-suggestions","children":[]},{"level":2,"title":"Password","slug":"password","link":"#password","children":[]},{"level":2,"title":"Broadcast","slug":"broadcast","link":"#broadcast","children":[]},{"level":2,"title":"Speed Up or Cancel Transaction","slug":"speed-up-or-cancel-transaction","link":"#speed-up-or-cancel-transaction","children":[]}],"git":{"updatedTime":1720425186000},"filePathRelative":"using-wasabi/Send.md"}');export{Pe as comp,Fe as data}; +import{_ as h}from"./Logo_without_text_with_bg_dark_with_yt-D8lqXhN0.js";import{_ as d,c as u,a as p,b as c}from"./HistoryRightClick-DykL0_1P.js";import{_ as m}from"./CoinjoinStrategy-BZrDbG5n.js";import{_ as g,r as l,o as b,c as f,a as e,d as n,w as i,b as t,e as r}from"./app-CwImt2bI.js";const y="/SendButton.png",_="/SendRecipientLabel.png",v="/Send.png",w="/SendChangeFee.png",k="/SendPrivacySuggestion.png",W="/SendPreviewTransaction.png",S="/SendPassword.png",T="/PaymentSuccessful.png",x={},C=e("h1",{id:"send",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#send"},[e("span",null,"Send")])],-1),A={class:"table-of-contents"},P={href:"https://youtu.be/vCI5aza-lv0",title:"Send in Wasabi Wallet",target:"_blank",rel:"noopener noreferrer"},F=e("img",{src:h,alt:"Send in Wasabi Wallet"},null,-1),B=r('

    How to send bitcoin step-by-step

    1. Click the Send button.

    Wasabi Wallet Send Button

    1. Enter/paste the destination address.

    Wasabi Wallet Send To Field

    1. Specify the amount of bitcoin to send to the destination address. Optionally, you can specify the dollar amount to send instead.

    Wasabi Wallet Send Amount Field

    1. Label the recipient by entering the name of the person or company who you are sending to.

    Wasabi Wallet Send Recipient Label

    1. Click Continue.

    Wasabi Wallet Send

    1. Preview Transaction.

      • Verify the amount, recipient, and the address.
      • Review the estimated time for confirmation and the transaction fee. Optionally, you can change the transaction fee or confirmation time by clicking on the edit fee icon.

      Wasabi Wallet Send Change Fee

      • Review the suggestions to improve your privacy by clicking the shield icon in the top right corner. For example, you may want to slightly increase or decrease your payment amount to avoid change.

      Wasabi Wallet Send Privacy Suggestion

    2. Click Confirm.

    Wasabi Wallet Send Preview Transaction

    1. Type in your passphrase, then click Send.

    Wasabi Wallet Send Passphrase

    1. Transaction successfully sent!

    Wasabi Wallet Payment Successful

    Coins

    ',18),R=e("code",null,"Send",-1),U=e("h2",{id:"clusters",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#clusters"},[e("span",null,"Clusters")])],-1),I=e("code",null,"Alice",-1),j=e("code",null,"Alice, Bob",-1),O=e("h2",{id:"anonymity-set",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#anonymity-set"},[e("span",null,"Anonymity Set")])],-1),E=e("p",null,[t("A typical bitcoin transaction will contain one input and two outputs - one of the outputs is the coin you are sending and the other output is the change coin that goes back to your wallet. Your change coin can be linked to this one input. There is a 1 in 1 chance to find this link and no plausible deniability. Thus, Wasabi denotes this coin's anonymity set as "),e("code",null,"1"),t(".")],-1),H=e("p",null,[t("There are three coinjoin strategies to choose from in Wasabi Wallet which effect the target anonymity score for your coins. These three strategies are "),e("code",null,"Minimize Cost"),t(", "),e("code",null,"Maximize Speed"),t(", and "),e("code",null,"Maximize Privacy"),t(". Each of these strategies come with different trade-offs.")],-1),L=e("p",null,"Alternatively, custom coinjoin settings can be configured.",-1),M=e("p",null,[e("img",{src:m,alt:"Coinjoin Strategy",title:"Coinjoin Strategy"})],-1),z=e("h2",{id:"receiving-address",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#receiving-address"},[e("span",null,"Receiving Address")])],-1),N=e("code",null,"1",-1),q=e("code",null,"3",-1),G=e("code",null,"bc1q",-1),V=e("code",null,"bc1p",-1),Y=e("h2",{id:"observers",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#observers"},[e("span",null,"Observers")])],-1),X=r('

    Amount

    In the Amount text box you can specify how many bitcoins the receiving address will gain. You can also see and enter the current US Dollar value of the sending amount.

    Avoid sending rounded values

    If you specify a rounded amount, like 0.0100 0000 bitcoin, then the change output will not be rounded, like 0.0896 8413 bitcoin. This makes it easy for an observer to conclude that the spending amount was the 0.01 bitcoin, and that the other output is the change back to the sender. So in order to increase your privacy, you can set a non-rounded amount, like 0.0101 6843.

    Send Amount Field

    Mining Fee

    ',5),J=e("code",null,"value of inputs - value of outputs",-1),K=e("code",null,"smart fee",-1),Q=e("p",null,[e("img",{src:d,alt:"Wasabi Wallet Fee Slider",title:"Wasabi Wallet Fee Slider"})],-1),D=e("p",null,[t("In some cases, there is very little demand for block space, and then Wasabi will set the minimum fee of "),e("code",null,"1 sat/vByte"),t(".")],-1),$={class:"custom-container tip"},Z=e("p",{class:"custom-container-title"},"High-priority transaction fees",-1),ee=e("p",null,"If you have a transaction that is high-priority and you really want it to be confirmed ASAP:",-1),te={href:"https://mempool.space",target:"_blank",rel:"noopener noreferrer"},ne={href:"http://mempoolhqx4isw62xs7abwphsq7ldayuidyx2v2oethdhhj6mlo2r6ad.onion/",target:"_blank",rel:"noopener noreferrer"},ie=e("li",null,"Select a fee that is well above the current highest fee (perhaps double or triple it) if it is very important to you that the transaction is confirmed soon.",-1),oe={href:"https://bitcointechtalk.com/an-introduction-to-bitcoin-core-fee-estimation-27920880ad0",target:"_blank",rel:"noopener noreferrer"},ae=e("h2",{id:"privacy-suggestions",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#privacy-suggestions"},[e("span",null,"Privacy Suggestions")])],-1),se={href:"https://github.com/WalletWasabi/WalletWasabi/releases/tag/v2.0.4",target:"_blank",rel:"noopener noreferrer"},le=e("em",null,"Preview Transaction",-1),re=r('

    There are warnings for:

    • Interlinking labels
    • Using non-private coins
    • Using semi-private coins
    • Creating change
    • Consolidating 10 coins or more
    • Using unconfirmed coins
    • Using coinjoining coins

    There are clickable suggestions to:

    • Manage labels (when interlinking labels)
    • Only use private coins
    • Not use non-private coins (only use private and semi-private)
    • Avoid change

    The suggestion to only use semi-private or private coins is only shown if the amount difference is less than or equal to 25%.

    TIP

    Each suggestion has a tooltip. Hover over the suggestion to see more information.

    Password

    ',7),ce=e("h2",{id:"broadcast",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#broadcast"},[e("span",null,"Broadcast")])],-1),he=e("p",null,"Once the transaction is signed, Wasabi will connect to a random Bitcoin P2P node over Tor and provide this transaction, then it will immediately disconnect. This first node will gossip the transaction throughout the network, then miners can include it in a block.",-1),de=e("h2",{id:"speed-up-or-cancel-transaction",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#speed-up-or-cancel-transaction"},[e("span",null,"Speed Up or Cancel Transaction")])],-1),ue=e("p",null,'Pending (unconfirmed) Bitcoin transactions can be replaced by sending a new transaction that pays a higher fee rate using the same (or some) coins/UTXOs. This can be used to speed up or cancel a transaction. The miners are incentivized to mine the transaction with the higher fee rate, as this will earn them more money. If the new higher fee rate paying transaction is confirmed, the old transaction can be considered "replaced".',-1),pe={href:"https://github.com/WalletWasabi/WalletWasabi/releases/tag/v2.0.4",target:"_blank",rel:"noopener noreferrer"},me=e("em",null,"Cancel Transaction",-1),ge=e("p",null,"Speeding up or cancelling a transaction costs additional fees, because a new bitcoin transaction with a higher fee rate (than the previous transaction) has to be sent.",-1),be=e("p",null,"To Speed Up or Cancel a Transaction, right-click on the pending transaction in the history.",-1),fe=e("p",null,[e("img",{src:u,alt:"History Right Click",title:"History Right Click"})],-1),ye=e("p",null,"Click one of the two options and then confirm that you want to pay the additional fee for this action. After which the succesfully speed up/cancelled dialog is displayed.",-1),_e=e("p",null,"In the history, the transaction will now have a rocket (speeded up) or a cross (cancelled) icon. The transaction is still pending, but it should be confirmed sooner than the initial transaction.",-1),ve={href:"https://youtu.be/55KURak5r58",target:"_blank",rel:"noopener noreferrer"},we=e("img",{src:"https://img.youtube.com/vi/55KURak5r58/maxresdefault.jpg",alt:"How to speed up Bitcoin transaction"},null,-1);function ke(We,Se){const o=l("router-link"),s=l("ExternalLinkIcon"),a=l("RouteLink");return b(),f("div",null,[C,e("nav",A,[e("ul",null,[e("li",null,[n(o,{to:"#how-to-send-bitcoin-step-by-step"},{default:i(()=>[t("How to send bitcoin step-by-step")]),_:1})]),e("li",null,[n(o,{to:"#coins"},{default:i(()=>[t("Coins")]),_:1})]),e("li",null,[n(o,{to:"#clusters"},{default:i(()=>[t("Clusters")]),_:1})]),e("li",null,[n(o,{to:"#anonymity-set"},{default:i(()=>[t("Anonymity Set")]),_:1})]),e("li",null,[n(o,{to:"#receiving-address"},{default:i(()=>[t("Receiving Address")]),_:1})]),e("li",null,[n(o,{to:"#observers"},{default:i(()=>[t("Observers")]),_:1})]),e("li",null,[n(o,{to:"#amount"},{default:i(()=>[t("Amount")]),_:1})]),e("li",null,[n(o,{to:"#mining-fee"},{default:i(()=>[t("Mining Fee")]),_:1})]),e("li",null,[n(o,{to:"#privacy-suggestions"},{default:i(()=>[t("Privacy Suggestions")]),_:1})]),e("li",null,[n(o,{to:"#password"},{default:i(()=>[t("Password")]),_:1})]),e("li",null,[n(o,{to:"#broadcast"},{default:i(()=>[t("Broadcast")]),_:1})]),e("li",null,[n(o,{to:"#speed-up-or-cancel-transaction"},{default:i(()=>[t("Speed Up or Cancel Transaction")]),_:1})])])]),e("p",null,[e("a",P,[F,n(s)])]),B,e("p",null,[t("A coin is an unspent transaction output (UTXO): a chunk of bitcoin that can be sent in a future transaction. Unlike fiat currencies which have fixed denominations, each UTXO contains a variable amount of bitcoin. You can get coins by first "),n(a,{to:"/using-wasabi/Receive.html"},{default:i(()=>[t("receiving")]),_:1}),t(" them from someone else. When you want to send some bitcoin you simply enter the amount to send and the address after clicking the "),R,t(" button. Wasabi Wallet does the job of automatically selecting the appropriate combination of coins to include as inputs in the transaction.")]),U,e("p",null,[t("Every time you receive a payment, you first must "),n(a,{to:"/using-wasabi/Receive.html#the-importance-of-labeling"},{default:i(()=>[t("label the observers")]),_:1}),t(" who know this address is yours. This transaction metadata is used to build a cluster of which people know about your coins. For example, if you receive a coin from Alice, then the cluster is "),I,t(". If you now send half of this coin to Bob, then the cluster of your change coin is "),j,t(". The goal is to know the observers who know about your coins and try to reduce their number for each coin.")]),O,E,e("p",null,[t("In a Wasabi "),n(a,{to:"/using-wasabi/CoinJoin.html"},{default:i(()=>[t("coinjoin")]),_:1}),t(", many peers register coins in the input of the transaction, and in the output there are several equal value coins. For example, the output may contain 20 coins worth exactly 0.3 bitcoin. This means that when looking at one of these coinjoin outputs, there is a 1 in 20 chance to find the corresponding input: thus an anonymity set of 20. Therefore, the higher the anonymity set, the more your post-coinjoin coin is delinked from the pre-coinjoin history.")]),H,L,M,z,e("p",null,[t("When sending bitcoin, you need to know the destination address of the receiver. This commits to the spending condition that the receiver agrees to have for this coin. The address can be a public key hash [starting with "),N,t("], a script hash [starting with "),q,t("], a native SegWit bech32 public key hash [starting with "),G,t("], or a Taproot bech32m public key [starting with "),V,t("]. Make sure that you ask the receiver for a "),n(a,{to:"/why-wasabi/AddressReuse.html"},{default:i(()=>[t("new address")]),_:1}),t(" for every payment to protect your privacy and theirs. Wasabi will calculate the checksum and notify you if the provided address is wrong.")]),Y,e("p",null,[t("In Wasabi it is mandatory to provide one or more "),n(a,{to:"/using-wasabi/Receive.html#the-importance-of-labeling"},{default:i(()=>[t("labels")]),_:1}),t(" each time you initiate a transfer of bitcoin. These labels should be the observers of the transaction. An observer of a sending transaction is, of course, the receiver, as well as any other third party that knows that you are the sender of this transaction. For example, you should include as a label the payment processor or the bitcoin exchange if you use their services. This metadata will be used to build an accurate cluster of observers who know about your coins.")]),X,e("p",null,[t("Every transaction must specify a fee which incentives the miner to include it in a block, it is calculated by "),J,t(". The higher the fee per virtual byte (vByte) transaction size, the more likely miners are to confirm this transaction. Wasabi uses Bitcoin Core's "),K,t(" algorithm to estimate the time it will take to confirm at the given fee level. You can change the fee by moving the slider, or by manually setting the "),n(a,{to:"/FAQ/FAQ-UseWasabi.html#how-do-i-set-custom-fee-rate"},{default:i(()=>[t("transaction fee rate")]),_:1}),t(".")]),Q,D,e("div",$,[Z,ee,e("ol",null,[e("li",null,[t("Use "),e("a",te,[t("a mempool monitor"),n(s)]),t(" (available "),e("a",ne,[t("Tor onion website"),n(s)]),t(") to see what fees are likely to get a transaction to be confirmed in the next block.")]),ie]),e("p",null,[t("For a deeper dive into the fee estimation process, "),e("a",oe,[t("this article"),n(s)]),t(" is worth reading.")])]),ae,e("p",null,[t("Since Wasabi version "),e("a",se,[t("2.0.4"),n(s)]),t(" the "),le,t(" dialog contains privacy suggestions. The privacy suggestions help the user to improve their transaction. They are displayed when hovering over the triangle or shield in the top right corner. The suggestions are based on the current coin selection for this transaction. For example, the suggestions will warn the user when the transaction contains non-private coins.")]),re,e("p",null,[t("In order to spend a coin, the transaction must be signed by the private key corresponding to that coin. Wasabi stores a secret on the computer, encrypted with the passphrase that you specified during the "),n(a,{to:"/using-wasabi/WalletGeneration.html#important-info-about-your-wallet-password"},{default:i(()=>[t("wallet generation")]),_:1}),t(". To spend a coin you need to type in the passphrase, which decrypts the encrypted secret, and then derive the child private key that signs the transaction. Afterwards, the passphrase is wiped from memory.")]),ce,he,e("p",null,[t("If for some reason the first broadcast fails, then if you have Wasabi connected to "),n(a,{to:"/using-wasabi/BitcoinFullNode.html"},{default:i(()=>[t("your own Bitcoin full node")]),_:1}),t(" this node will broadcast the transaction to the network. If this also fails, then the transaction is sent to the backend coordinator with a new Tor identity, who then broadcasts the transaction to the network.")]),de,ue,e("p",null,[t("Since Wasabi version "),e("a",pe,[t("2.0.4"),n(s)]),t(" it is possible to easily speed up or cancel a pending transaction. Speeding up and cancelling are similar to each other, the main difference being that a "),me,t(` will send the coins to a new address owned by the user/wallet (this is all done automatically). The transaction is then "cancelled" because the bitcoin (minus the fees) is returned to the user's wallet.`)]),ge,e("p",null,[t("Wasabi first tries to utilize "),n(a,{to:"/using-wasabi/glossary/Glossary-GeneralBitcoin.html#replace-by-fee-rbf"},{default:i(()=>[t("RBF")]),_:1}),t(", if that's not possible it tries to do "),n(a,{to:"/using-wasabi/glossary/Glossary-GeneralBitcoin.html#child-pays-for-parent-cpfp"},{default:i(()=>[t("CPFP")]),_:1}),t(".")]),be,fe,ye,_e,e("p",null,[e("a",ve,[we,n(s)])])])}const Pe=g(x,[["render",ke],["__file","Send.html.vue"]]),Fe=JSON.parse('{"path":"/using-wasabi/Send.html","title":"Send","lang":"en-US","frontmatter":{"title":"Send","description":"A step-by-step guide on how to send bitcoin in Wasabi. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"How to send bitcoin step-by-step","slug":"how-to-send-bitcoin-step-by-step","link":"#how-to-send-bitcoin-step-by-step","children":[]},{"level":2,"title":"Coins","slug":"coins","link":"#coins","children":[]},{"level":2,"title":"Clusters","slug":"clusters","link":"#clusters","children":[]},{"level":2,"title":"Anonymity Set","slug":"anonymity-set","link":"#anonymity-set","children":[]},{"level":2,"title":"Receiving Address","slug":"receiving-address","link":"#receiving-address","children":[]},{"level":2,"title":"Observers","slug":"observers","link":"#observers","children":[]},{"level":2,"title":"Amount","slug":"amount","link":"#amount","children":[]},{"level":2,"title":"Mining Fee","slug":"mining-fee","link":"#mining-fee","children":[]},{"level":2,"title":"Privacy Suggestions","slug":"privacy-suggestions","link":"#privacy-suggestions","children":[]},{"level":2,"title":"Password","slug":"password","link":"#password","children":[]},{"level":2,"title":"Broadcast","slug":"broadcast","link":"#broadcast","children":[]},{"level":2,"title":"Speed Up or Cancel Transaction","slug":"speed-up-or-cancel-transaction","link":"#speed-up-or-cancel-transaction","children":[]}],"git":{"updatedTime":1720425980000},"filePathRelative":"using-wasabi/Send.md"}');export{Pe as comp,Fe as data}; diff --git a/assets/StartupParameters.html-DmpGxDRn.js b/assets/StartupParameters.html-C0HQ6Gu6.js similarity index 98% rename from assets/StartupParameters.html-DmpGxDRn.js rename to assets/StartupParameters.html-C0HQ6Gu6.js index 0b06eb38d..61539eaab 100644 --- a/assets/StartupParameters.html-DmpGxDRn.js +++ b/assets/StartupParameters.html-C0HQ6Gu6.js @@ -1 +1 @@ -import{_ as r,r as i,o as u,c as l,a as t,d as e,w as a,b as o,e as s}from"./app-3S7gIoGc.js";const c={},q=t("h1",{id:"starting-wasabi-with-parameters",tabindex:"-1"},[t("a",{class:"header-anchor",href:"#starting-wasabi-with-parameters"},[t("span",null,"Starting Wasabi with parameters")])],-1),h={class:"table-of-contents"},p=t("h2",{id:"available-commands",tabindex:"-1"},[t("a",{class:"header-anchor",href:"#available-commands"},[t("span",null,"Available commands")])],-1),f=t("p",null,"It is possible to start Wasabi with specific parameters. The parameters override the configurations in the configuration file.",-1),A=t("p",null,"When entering the commands on the command line, they are capital letter insensitive.",-1),m=s('

    Help about the options is available when using the command line by adding --help to the executable: wassabeed --help or dotnet run -- --help when building from source.

    Config file configurations

    All configuration options available via the Config.json file are also available as command line arguments:

    Config FileCommand LineEnvironment variable
    ""Network": "TestNet"--network=testnetWASABI-NETWORK=testnet
    "MainNetBackendUri": "https://api.wasabiwallet.io/"--mainnetbackenduri="https://api.wasabiwallet.io/"WASABI-MAINNETBACKENDURI="https://api.wasabiwallet.io/"
    "TestNetClearnetBackendUri": "https://api.wasabiwallet.co/"--testnetbackenduri="https://api.wasabiwallet.co/"WASABI-TESTNETBACKENDURI="https://api.wasabiwallet.co/"
    "RegTestBackendUri": "http://localhost:37127/"--regtestbackenduri="http://localhost:37127/"WASABI-REGTESTBACKENDURI="http://localhost:37127/"
    "UseTor": "Enabled"--usetor=enabledWASABI-USETOR=enabled
    "TerminateTorOnExit": false--terminatetoronexit=falseWASABI-TERMINATETORONEXIT=false
    "TorBridges": "[TorBridge]"--torbridges="[TorBridge]"WASABI-TORBRIDGES="[TorBridge]"
    "DownloadNewVersion": true--downloadnewversion=trueWASABI-DOWNLOADNEWVERSION=true
    "StartLocalBitcoinCoreOnStartup": false--startlocalbitcoincoreonstartup=falseWASABI-STARTLOCALBITCOINCOREONSTARTUP=false
    "StopLocalBitcoinCoreOnShutdown": true--stoplocalbitcoincoreonshutdown=trueWASABI-STOPLOCALBITCOINCOREONSHUTDOWN=true
    "LocalBitcoinCoreDataDir": "/home/UserName/.bitcoin"--localbitcoincoredatadir="/home/UserName/.bitcoin"WASABI-LOCALBITCOINCOREDATADIR="/home/UserName/.bitcoin"
    "MainNetBitcoinP2pEndPoint": "127.0.0.1:8333"--mainnetbitcoinp2pendpoint="127.0.0.1:8333"WASABI-MAINNETBITCOINP2PENDPOINT="127.0.0.1:8333"
    "TestNetBitcoinP2pEndPoint": "127.0.0.1:18333"--testnetbitcoinp2pendpoint="127.0.0.1:18333"WASABI-TESTNETBITCOINP2PENDPOINT="127.0.0.1:18333"
    "RegTestBitcoinP2pEndPoint": "127.0.0.1:18444"--regtestbitcoinp2pendpoint="127.0.0.1:18444"WASABI-REGTESTBITCOINP2PENDPOINT="127.0.0.1:18444"
    "JsonRpcServerEnabled": true--jsonrpcserverenabled=trueWASABI-JSONRPCSERVERENABLED=true
    "JsonRpcUser": ""--jsonrpcuser=""WASABI-JSONRPCUSER=""
    "JsonRpcPassword": ""--jsonrpcpassword=""WASABI-JSONRPCPASSWORD=""
    "JsonRpcServerPrefixes":["http://127.0.0.1:37128/", "http://localhost:37128/"]--jsonrpcserverprefixes=["http://127.0.0.1:37128/", "http://localhost:37128/"]WASABI-JSONRPCSERVERPREFIXES=["http://127.0.0.1:37128/", "http://localhost:37128/"]
    "DustThreshold": "0.00005"--dustthreshold=0.00005WASABI-DUSTTHRESHOLD=0.00005
    "EnableGpu": true--enablegpu=trueWASABI-ENABLEGPU=true
    "CoordinatorIdentifier": "CoinJoinCoordinatorIdentifier"--coordinatoridentifier="coinjoincoordinatoridentifier"WASABI-COORDINATORIDENTIFIER="coinjoincoordinatoridentifier"
    "MaxCoordinationFeeRate": 0.0--maxcoordinationfeerate=0.0WASABI-MAXCOORDINATIONFEERATE=0.0
    "MaxCoinJoinMiningFeeRate": 150.0--maxcoinjoinminingfeerate=150.0WASABI-MAXCOINJOINMININGFEERATE=150.0
    "AbsoluteMinInputCount": 21--absolutemininputcount=21WASABI-ABSOLUTEMININPUTCOUNT=21

    Non-Config file configurations

    There are a few special switches that are not present in the Config.json file and are only available using the command line:

    SwitchCommand LineEnvironment variable
    Ignore P2P transactions--blockonly=trueWASABI-BLOCKONLY=true
    The level of detail used during logging--loglevel=traceWASABI-LOGLEVEL=trace
    Specify to log only to specific target*--logmodes=consoleWASABI-LOGMODES=console
    The path to the directory used during runtime--datadir="$HOME/temp/wasabi-1"WASABI-DATADIR="$HOME/temp/wasabi-1"
    Open wallet "WalletName"--wallet=WalletNameWASABI--WALLET=WalletName
    Expose the RPC as onion service--rpconionenabled=trueWASABI-RPCONIONENABLED=true
    Tor will listen to this SOCKS5 port--torsocksport=35000WASABI-TORSOCKSPORT=35000
    Tor will listen to this control port--torcontrolport=35001WASABI-TORCONTROLPORT=35001
    Folder to use where Tor binary is located--torfolder="$HOME/tor-browser_en-US/Browser/TorBrowser/Tor"WASABI-TORFOLDER="$HOME/tor-browser_en-US/Browser/TorBrowser/Tor"
    • Available options are "" (don't log at all), "file" (log only to file), "console" (log only to console) and "file,console" (log to file and console).
    ',8);function g(b,S){const n=i("router-link"),d=i("RouteLink");return u(),l("div",null,[q,t("nav",h,[t("ul",null,[t("li",null,[e(n,{to:"#available-commands"},{default:a(()=>[o("Available commands")]),_:1}),t("ul",null,[t("li",null,[e(n,{to:"#config-file-configurations"},{default:a(()=>[o("Config file configurations")]),_:1})]),t("li",null,[e(n,{to:"#non-config-file-configurations"},{default:a(()=>[o("Non-Config file configurations")]),_:1})])])])])]),p,f,A,t("p",null,[o("The parameters work for both the GUI and the "),e(d,{to:"/using-wasabi/Daemon.html"},{default:a(()=>[o("Daemon")]),_:1}),o(".")]),m])}const I=r(c,[["render",g],["__file","StartupParameters.html.vue"]]),N=JSON.parse('{"path":"/using-wasabi/StartupParameters.html","title":"Starting Wasabi with parameters","lang":"en-US","frontmatter":{"title":"Starting Wasabi with parameters","description":"A guide on starting Wasabi with parameters, using the command line interface. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Available commands","slug":"available-commands","link":"#available-commands","children":[{"level":3,"title":"Config file configurations","slug":"config-file-configurations","link":"#config-file-configurations","children":[]},{"level":3,"title":"Non-Config file configurations","slug":"non-config-file-configurations","link":"#non-config-file-configurations","children":[]}]}],"git":{"updatedTime":1720425186000},"filePathRelative":"using-wasabi/StartupParameters.md"}');export{I as comp,N as data}; +import{_ as r,r as i,o as u,c as l,a as t,d as e,w as a,b as o,e as s}from"./app-CwImt2bI.js";const c={},q=t("h1",{id:"starting-wasabi-with-parameters",tabindex:"-1"},[t("a",{class:"header-anchor",href:"#starting-wasabi-with-parameters"},[t("span",null,"Starting Wasabi with parameters")])],-1),h={class:"table-of-contents"},p=t("h2",{id:"available-commands",tabindex:"-1"},[t("a",{class:"header-anchor",href:"#available-commands"},[t("span",null,"Available commands")])],-1),f=t("p",null,"It is possible to start Wasabi with specific parameters. The parameters override the configurations in the configuration file.",-1),A=t("p",null,"When entering the commands on the command line, they are capital letter insensitive.",-1),m=s('

    Help about the options is available when using the command line by adding --help to the executable: wassabeed --help or dotnet run -- --help when building from source.

    Config file configurations

    All configuration options available via the Config.json file are also available as command line arguments:

    Config FileCommand LineEnvironment variable
    ""Network": "TestNet"--network=testnetWASABI-NETWORK=testnet
    "MainNetBackendUri": "https://api.wasabiwallet.io/"--mainnetbackenduri="https://api.wasabiwallet.io/"WASABI-MAINNETBACKENDURI="https://api.wasabiwallet.io/"
    "TestNetClearnetBackendUri": "https://api.wasabiwallet.co/"--testnetbackenduri="https://api.wasabiwallet.co/"WASABI-TESTNETBACKENDURI="https://api.wasabiwallet.co/"
    "RegTestBackendUri": "http://localhost:37127/"--regtestbackenduri="http://localhost:37127/"WASABI-REGTESTBACKENDURI="http://localhost:37127/"
    "UseTor": "Enabled"--usetor=enabledWASABI-USETOR=enabled
    "TerminateTorOnExit": false--terminatetoronexit=falseWASABI-TERMINATETORONEXIT=false
    "TorBridges": "[TorBridge]"--torbridges="[TorBridge]"WASABI-TORBRIDGES="[TorBridge]"
    "DownloadNewVersion": true--downloadnewversion=trueWASABI-DOWNLOADNEWVERSION=true
    "StartLocalBitcoinCoreOnStartup": false--startlocalbitcoincoreonstartup=falseWASABI-STARTLOCALBITCOINCOREONSTARTUP=false
    "StopLocalBitcoinCoreOnShutdown": true--stoplocalbitcoincoreonshutdown=trueWASABI-STOPLOCALBITCOINCOREONSHUTDOWN=true
    "LocalBitcoinCoreDataDir": "/home/UserName/.bitcoin"--localbitcoincoredatadir="/home/UserName/.bitcoin"WASABI-LOCALBITCOINCOREDATADIR="/home/UserName/.bitcoin"
    "MainNetBitcoinP2pEndPoint": "127.0.0.1:8333"--mainnetbitcoinp2pendpoint="127.0.0.1:8333"WASABI-MAINNETBITCOINP2PENDPOINT="127.0.0.1:8333"
    "TestNetBitcoinP2pEndPoint": "127.0.0.1:18333"--testnetbitcoinp2pendpoint="127.0.0.1:18333"WASABI-TESTNETBITCOINP2PENDPOINT="127.0.0.1:18333"
    "RegTestBitcoinP2pEndPoint": "127.0.0.1:18444"--regtestbitcoinp2pendpoint="127.0.0.1:18444"WASABI-REGTESTBITCOINP2PENDPOINT="127.0.0.1:18444"
    "JsonRpcServerEnabled": true--jsonrpcserverenabled=trueWASABI-JSONRPCSERVERENABLED=true
    "JsonRpcUser": ""--jsonrpcuser=""WASABI-JSONRPCUSER=""
    "JsonRpcPassword": ""--jsonrpcpassword=""WASABI-JSONRPCPASSWORD=""
    "JsonRpcServerPrefixes":["http://127.0.0.1:37128/", "http://localhost:37128/"]--jsonrpcserverprefixes=["http://127.0.0.1:37128/", "http://localhost:37128/"]WASABI-JSONRPCSERVERPREFIXES=["http://127.0.0.1:37128/", "http://localhost:37128/"]
    "DustThreshold": "0.00005"--dustthreshold=0.00005WASABI-DUSTTHRESHOLD=0.00005
    "EnableGpu": true--enablegpu=trueWASABI-ENABLEGPU=true
    "CoordinatorIdentifier": "CoinJoinCoordinatorIdentifier"--coordinatoridentifier="coinjoincoordinatoridentifier"WASABI-COORDINATORIDENTIFIER="coinjoincoordinatoridentifier"
    "MaxCoordinationFeeRate": 0.0--maxcoordinationfeerate=0.0WASABI-MAXCOORDINATIONFEERATE=0.0
    "MaxCoinJoinMiningFeeRate": 150.0--maxcoinjoinminingfeerate=150.0WASABI-MAXCOINJOINMININGFEERATE=150.0
    "AbsoluteMinInputCount": 21--absolutemininputcount=21WASABI-ABSOLUTEMININPUTCOUNT=21

    Non-Config file configurations

    There are a few special switches that are not present in the Config.json file and are only available using the command line:

    SwitchCommand LineEnvironment variable
    Ignore P2P transactions--blockonly=trueWASABI-BLOCKONLY=true
    The level of detail used during logging--loglevel=traceWASABI-LOGLEVEL=trace
    Specify to log only to specific target*--logmodes=consoleWASABI-LOGMODES=console
    The path to the directory used during runtime--datadir="$HOME/temp/wasabi-1"WASABI-DATADIR="$HOME/temp/wasabi-1"
    Open wallet "WalletName"--wallet=WalletNameWASABI--WALLET=WalletName
    Expose the RPC as onion service--rpconionenabled=trueWASABI-RPCONIONENABLED=true
    Tor will listen to this SOCKS5 port--torsocksport=35000WASABI-TORSOCKSPORT=35000
    Tor will listen to this control port--torcontrolport=35001WASABI-TORCONTROLPORT=35001
    Folder to use where Tor binary is located--torfolder="$HOME/tor-browser_en-US/Browser/TorBrowser/Tor"WASABI-TORFOLDER="$HOME/tor-browser_en-US/Browser/TorBrowser/Tor"
    • Available options are "" (don't log at all), "file" (log only to file), "console" (log only to console) and "file,console" (log to file and console).
    ',8);function g(b,S){const n=i("router-link"),d=i("RouteLink");return u(),l("div",null,[q,t("nav",h,[t("ul",null,[t("li",null,[e(n,{to:"#available-commands"},{default:a(()=>[o("Available commands")]),_:1}),t("ul",null,[t("li",null,[e(n,{to:"#config-file-configurations"},{default:a(()=>[o("Config file configurations")]),_:1})]),t("li",null,[e(n,{to:"#non-config-file-configurations"},{default:a(()=>[o("Non-Config file configurations")]),_:1})])])])])]),p,f,A,t("p",null,[o("The parameters work for both the GUI and the "),e(d,{to:"/using-wasabi/Daemon.html"},{default:a(()=>[o("Daemon")]),_:1}),o(".")]),m])}const I=r(c,[["render",g],["__file","StartupParameters.html.vue"]]),N=JSON.parse('{"path":"/using-wasabi/StartupParameters.html","title":"Starting Wasabi with parameters","lang":"en-US","frontmatter":{"title":"Starting Wasabi with parameters","description":"A guide on starting Wasabi with parameters, using the command line interface. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Available commands","slug":"available-commands","link":"#available-commands","children":[{"level":3,"title":"Config file configurations","slug":"config-file-configurations","link":"#config-file-configurations","children":[]},{"level":3,"title":"Non-Config file configurations","slug":"non-config-file-configurations","link":"#non-config-file-configurations","children":[]}]}],"git":{"updatedTime":1720425980000},"filePathRelative":"using-wasabi/StartupParameters.md"}');export{I as comp,N as data}; diff --git a/assets/Testnet.html-p9vBqYtC.js b/assets/Testnet.html-DRlHBRt4.js similarity index 98% rename from assets/Testnet.html-p9vBqYtC.js rename to assets/Testnet.html-DRlHBRt4.js index c7043ebbc..2590776c4 100644 --- a/assets/Testnet.html-p9vBqYtC.js +++ b/assets/Testnet.html-DRlHBRt4.js @@ -1 +1 @@ -import{_ as c,r as l,o as r,c as d,a as t,d as n,w as i,b as e,e as h}from"./app-3S7gIoGc.js";const u="/SettingsButton.png",b="/SettingsNetwork.png",p="/TestNetIndicator.png",_={},g=t("h1",{id:"testnet",tabindex:"-1"},[t("a",{class:"header-anchor",href:"#testnet"},[t("span",null,"Testnet")])],-1),f={class:"table-of-contents"},m=h('

    Bitcoin testnet

    The Bitcoin testnet is a network that behaves almost exactly the same as the Bitcoin mainnet. The major difference is that the bitcoin on the testnet do not have any economical value, they should not be used to buy or sell goods and services. This makes the network very useful for testing software and features, because there is no risk of losing precious "real" bitcoin from the main network.

    Don't loose your bitcoin

    When testing cutting edge software like Wasabi, use testnet to ensure that your mistakes don't cost you money!

    Activating testnet in Wasabi

    First, open your Wasabi Wallet and click the Settings button in the bottom left corner.

    Settings button

    Select the Bitcoin tab, click on the Network dropdown and select TestNet.

    Settings Network Dropdown

    Restart Wasabi to activate the change. After the restart, you should see the TestNet indicator in the top right corner of the wallet.

    Bitcoin testnet network activated in Wasabi Wallet

    ',10),w={href:"https://github.com/bitcoin/bips/blob/master/bip-0158.mediawiki",target:"_blank",rel:"noopener noreferrer"},v=t("p",null,"After the testing, set the settings back to mainnet, and close Wasabi. It will load on mainnet the next time you start it.",-1),k={class:"custom-container tip"},y=t("p",{class:"custom-container-title"},"TIP",-1),T=t("code",null,"Config.json",-1),W=t("code",null,'"Network":',-1),N=t("code",null,'"Main"',-1),x=t("code",null,'"TestNet"',-1),B=t("code",null,'"RegTest"',-1),j=t("h2",{id:"loading-a-wallet",tabindex:"-1"},[t("a",{class:"header-anchor",href:"#loading-a-wallet"},[t("span",null,"Loading a wallet")])],-1),S=t("p",null,"Wasabi differentiates between Mainnet and TestNet wallets. Meaning that a TestNet wallet will not show up when the Main network is active, and vice versa. You have to create a new wallet when you activate TestNet for the first time.",-1),R=t("h2",{id:"receiving-testnet-bitcoin",tabindex:"-1"},[t("a",{class:"header-anchor",href:"#receiving-testnet-bitcoin"},[t("span",null,"Receiving testnet bitcoin")])],-1),A=t("code",null,"Receive",-1),C=t("code",null,"tb1q...",-1),I=t("code",null,"bc1q...",-1),L={href:"https://en.bitcoin.it/wiki/Testnet#Faucets",target:"_blank",rel:"noopener noreferrer"},F={href:"https://coinfaucet.eu/en/btc-testnet/",target:"_blank",rel:"noopener noreferrer"},q={href:"https://bitcoinfaucet.uo1.net/",target:"_blank",rel:"noopener noreferrer"},M=t("h2",{id:"coinjoin-on-testnet",tabindex:"-1"},[t("a",{class:"header-anchor",href:"#coinjoin-on-testnet"},[t("span",null,"Coinjoin on testnet")])],-1);function V(D,E){const o=l("router-link"),a=l("ExternalLinkIcon"),s=l("RouteLink");return r(),d("div",null,[g,t("nav",f,[t("ul",null,[t("li",null,[n(o,{to:"#bitcoin-testnet"},{default:i(()=>[e("Bitcoin testnet")]),_:1})]),t("li",null,[n(o,{to:"#activating-testnet-in-wasabi"},{default:i(()=>[e("Activating testnet in Wasabi")]),_:1})]),t("li",null,[n(o,{to:"#loading-a-wallet"},{default:i(()=>[e("Loading a wallet")]),_:1})]),t("li",null,[n(o,{to:"#receiving-testnet-bitcoin"},{default:i(()=>[e("Receiving testnet bitcoin")]),_:1})]),t("li",null,[n(o,{to:"#coinjoin-on-testnet"},{default:i(()=>[e("Coinjoin on testnet")]),_:1})])])]),m,t("p",null,[e("When Wasabi is started in testnet, it will fetch testnet "),t("a",w,[e("BIP 158 block filters"),n(a)]),e(" from the backend. For the first start, this may take a couple of minutes.")]),v,t("div",k,[y,t("p",null,[e("Alternatively, you can edit the "),T,e(" file in your "),n(s,{to:"/FAQ/FAQ-UseWasabi.html#where-can-i-find-the-wasabi-data-folder"},{default:i(()=>[e("Wasabi data folder")]),_:1}),e(". In the second line you can modify the value of "),W,e(", to "),N,e(", "),x,e(", or "),B,e(". The changes will apply on the next launch of Wasabi.")])]),j,S,R,t("p",null,[e("You can "),n(s,{to:"/using-wasabi/Receive.html"},{default:i(()=>[e("generate a receive address")]),_:1}),e(" the same way as on mainnet, by labeling the known by entities in the "),A,e(" dialog. Notice that testnet SegWit addresses start with "),C,e(", and not with "),I,e(" as mainnet addresses.")]),t("p",null,[e("Because testnet bitcoin don't have economical value, they are gifted by different sources. There are "),t("a",L,[e("faucets"),n(a)]),e(" like "),t("a",F,[e("this one"),n(a)]),e(" or "),t("a",q,[e("bitcoinfaucet.uo1.net"),n(a)]),e(" that give a certain amount of testnet bitcoin per time period. You may also ask other developers if they have a couple of spare testnet coins available.")]),M,t("p",null,[n(s,{to:"/using-wasabi/CoinJoin.html"},{default:i(()=>[e("CoinJoin")]),_:1}),e(" on testnet is as easy as on mainnet. Usually there are other testers doing a coinjoin, but if you are the only one at the moment, then load two wallets and start coinjoining in both of them.")])])}const P=c(_,[["render",V],["__file","Testnet.html.vue"]]),U=JSON.parse('{"path":"/using-wasabi/Testnet.html","title":"Testnet","lang":"en-US","frontmatter":{"title":"Testnet","description":"A guide on how to use Wasabi on testnet. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Bitcoin testnet","slug":"bitcoin-testnet","link":"#bitcoin-testnet","children":[]},{"level":2,"title":"Activating testnet in Wasabi","slug":"activating-testnet-in-wasabi","link":"#activating-testnet-in-wasabi","children":[]},{"level":2,"title":"Loading a wallet","slug":"loading-a-wallet","link":"#loading-a-wallet","children":[]},{"level":2,"title":"Receiving testnet bitcoin","slug":"receiving-testnet-bitcoin","link":"#receiving-testnet-bitcoin","children":[]},{"level":2,"title":"Coinjoin on testnet","slug":"coinjoin-on-testnet","link":"#coinjoin-on-testnet","children":[]}],"git":{"updatedTime":1720425186000},"filePathRelative":"using-wasabi/Testnet.md"}');export{P as comp,U as data}; +import{_ as c,r as l,o as r,c as d,a as t,d as n,w as i,b as e,e as h}from"./app-CwImt2bI.js";const u="/SettingsButton.png",b="/SettingsNetwork.png",p="/TestNetIndicator.png",_={},g=t("h1",{id:"testnet",tabindex:"-1"},[t("a",{class:"header-anchor",href:"#testnet"},[t("span",null,"Testnet")])],-1),f={class:"table-of-contents"},m=h('

    Bitcoin testnet

    The Bitcoin testnet is a network that behaves almost exactly the same as the Bitcoin mainnet. The major difference is that the bitcoin on the testnet do not have any economical value, they should not be used to buy or sell goods and services. This makes the network very useful for testing software and features, because there is no risk of losing precious "real" bitcoin from the main network.

    Don't loose your bitcoin

    When testing cutting edge software like Wasabi, use testnet to ensure that your mistakes don't cost you money!

    Activating testnet in Wasabi

    First, open your Wasabi Wallet and click the Settings button in the bottom left corner.

    Settings button

    Select the Bitcoin tab, click on the Network dropdown and select TestNet.

    Settings Network Dropdown

    Restart Wasabi to activate the change. After the restart, you should see the TestNet indicator in the top right corner of the wallet.

    Bitcoin testnet network activated in Wasabi Wallet

    ',10),w={href:"https://github.com/bitcoin/bips/blob/master/bip-0158.mediawiki",target:"_blank",rel:"noopener noreferrer"},v=t("p",null,"After the testing, set the settings back to mainnet, and close Wasabi. It will load on mainnet the next time you start it.",-1),k={class:"custom-container tip"},y=t("p",{class:"custom-container-title"},"TIP",-1),T=t("code",null,"Config.json",-1),W=t("code",null,'"Network":',-1),N=t("code",null,'"Main"',-1),x=t("code",null,'"TestNet"',-1),B=t("code",null,'"RegTest"',-1),j=t("h2",{id:"loading-a-wallet",tabindex:"-1"},[t("a",{class:"header-anchor",href:"#loading-a-wallet"},[t("span",null,"Loading a wallet")])],-1),S=t("p",null,"Wasabi differentiates between Mainnet and TestNet wallets. Meaning that a TestNet wallet will not show up when the Main network is active, and vice versa. You have to create a new wallet when you activate TestNet for the first time.",-1),R=t("h2",{id:"receiving-testnet-bitcoin",tabindex:"-1"},[t("a",{class:"header-anchor",href:"#receiving-testnet-bitcoin"},[t("span",null,"Receiving testnet bitcoin")])],-1),A=t("code",null,"Receive",-1),C=t("code",null,"tb1q...",-1),I=t("code",null,"bc1q...",-1),L={href:"https://en.bitcoin.it/wiki/Testnet#Faucets",target:"_blank",rel:"noopener noreferrer"},F={href:"https://coinfaucet.eu/en/btc-testnet/",target:"_blank",rel:"noopener noreferrer"},q={href:"https://bitcoinfaucet.uo1.net/",target:"_blank",rel:"noopener noreferrer"},M=t("h2",{id:"coinjoin-on-testnet",tabindex:"-1"},[t("a",{class:"header-anchor",href:"#coinjoin-on-testnet"},[t("span",null,"Coinjoin on testnet")])],-1);function V(D,E){const o=l("router-link"),a=l("ExternalLinkIcon"),s=l("RouteLink");return r(),d("div",null,[g,t("nav",f,[t("ul",null,[t("li",null,[n(o,{to:"#bitcoin-testnet"},{default:i(()=>[e("Bitcoin testnet")]),_:1})]),t("li",null,[n(o,{to:"#activating-testnet-in-wasabi"},{default:i(()=>[e("Activating testnet in Wasabi")]),_:1})]),t("li",null,[n(o,{to:"#loading-a-wallet"},{default:i(()=>[e("Loading a wallet")]),_:1})]),t("li",null,[n(o,{to:"#receiving-testnet-bitcoin"},{default:i(()=>[e("Receiving testnet bitcoin")]),_:1})]),t("li",null,[n(o,{to:"#coinjoin-on-testnet"},{default:i(()=>[e("Coinjoin on testnet")]),_:1})])])]),m,t("p",null,[e("When Wasabi is started in testnet, it will fetch testnet "),t("a",w,[e("BIP 158 block filters"),n(a)]),e(" from the backend. For the first start, this may take a couple of minutes.")]),v,t("div",k,[y,t("p",null,[e("Alternatively, you can edit the "),T,e(" file in your "),n(s,{to:"/FAQ/FAQ-UseWasabi.html#where-can-i-find-the-wasabi-data-folder"},{default:i(()=>[e("Wasabi data folder")]),_:1}),e(". In the second line you can modify the value of "),W,e(", to "),N,e(", "),x,e(", or "),B,e(". The changes will apply on the next launch of Wasabi.")])]),j,S,R,t("p",null,[e("You can "),n(s,{to:"/using-wasabi/Receive.html"},{default:i(()=>[e("generate a receive address")]),_:1}),e(" the same way as on mainnet, by labeling the known by entities in the "),A,e(" dialog. Notice that testnet SegWit addresses start with "),C,e(", and not with "),I,e(" as mainnet addresses.")]),t("p",null,[e("Because testnet bitcoin don't have economical value, they are gifted by different sources. There are "),t("a",L,[e("faucets"),n(a)]),e(" like "),t("a",F,[e("this one"),n(a)]),e(" or "),t("a",q,[e("bitcoinfaucet.uo1.net"),n(a)]),e(" that give a certain amount of testnet bitcoin per time period. You may also ask other developers if they have a couple of spare testnet coins available.")]),M,t("p",null,[n(s,{to:"/using-wasabi/CoinJoin.html"},{default:i(()=>[e("CoinJoin")]),_:1}),e(" on testnet is as easy as on mainnet. Usually there are other testers doing a coinjoin, but if you are the only one at the moment, then load two wallets and start coinjoining in both of them.")])])}const P=c(_,[["render",V],["__file","Testnet.html.vue"]]),U=JSON.parse('{"path":"/using-wasabi/Testnet.html","title":"Testnet","lang":"en-US","frontmatter":{"title":"Testnet","description":"A guide on how to use Wasabi on testnet. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Bitcoin testnet","slug":"bitcoin-testnet","link":"#bitcoin-testnet","children":[]},{"level":2,"title":"Activating testnet in Wasabi","slug":"activating-testnet-in-wasabi","link":"#activating-testnet-in-wasabi","children":[]},{"level":2,"title":"Loading a wallet","slug":"loading-a-wallet","link":"#loading-a-wallet","children":[]},{"level":2,"title":"Receiving testnet bitcoin","slug":"receiving-testnet-bitcoin","link":"#receiving-testnet-bitcoin","children":[]},{"level":2,"title":"Coinjoin on testnet","slug":"coinjoin-on-testnet","link":"#coinjoin-on-testnet","children":[]}],"git":{"updatedTime":1720425980000},"filePathRelative":"using-wasabi/Testnet.md"}');export{P as comp,U as data}; diff --git a/assets/TransactionGraph.html-5x7EW62O.js b/assets/TransactionGraph.html-DKr0EbYV.js similarity index 96% rename from assets/TransactionGraph.html-5x7EW62O.js rename to assets/TransactionGraph.html-DKr0EbYV.js index 984f17541..e9bf043bb 100644 --- a/assets/TransactionGraph.html-5x7EW62O.js +++ b/assets/TransactionGraph.html-DKr0EbYV.js @@ -1 +1 @@ -import{_ as r,r as o,o as c,c as l,a as n,d as t,w as i,b as a,e as h}from"./app-3S7gIoGc.js";const u={},d=n("h1",{id:"transaction-graph",tabindex:"-1"},[n("a",{class:"header-anchor",href:"#transaction-graph"},[n("span",null,"Transaction Graph")])],-1),p={class:"table-of-contents"},b=h('

    Problem

    Public transaction history

    Because of the input and output model of Bitcoin, there is a chain of digital signatures all the way from the coinbase reward to the current UTXO. This transaction history can reveal sensitive information about the spending patterns of individuals. The receiver of a coin can look back into the transaction history of the sender. And the sender can see the future spending of the receiver.

    Wasabi's Solution

    WabiSabi coinjoins

    ',5),f={href:"https://github.com/WalletWasabi/WabiSabi",target:"_blank",rel:"noopener noreferrer"},m=n("p",null,"This means that when sending an anonscore coin, the receiver does not know about the transaction history before the coinjoin. And when the receiver does a coinjoin himself, then the sender cannot spy on the later spending patterns. An outside observer can only guess the correct link at a rate of 1 in the anonscore, for example, 1-in-100, or 1%.",-1);function _(w,y){const e=o("router-link"),s=o("ExternalLinkIcon");return c(),l("div",null,[d,n("nav",p,[n("ul",null,[n("li",null,[t(e,{to:"#problem"},{default:i(()=>[a("Problem")]),_:1}),n("ul",null,[n("li",null,[t(e,{to:"#public-transaction-history"},{default:i(()=>[a("Public transaction history")]),_:1})])])]),n("li",null,[t(e,{to:"#wasabi-s-solution"},{default:i(()=>[a("Wasabi's Solution")]),_:1}),n("ul",null,[n("li",null,[t(e,{to:"#wabisabi-coinjoins"},{default:i(()=>[a("WabiSabi coinjoins")]),_:1})])])])])]),b,n("p",null,[a("In order to obfuscate the link between inputs and outputs, Wasabi uses the "),n("a",f,[a("WabiSabi"),t(s)]),a(" coinjoin protocol. The Wasabi central coordinator cannot steal and cannot spy, it simply helps many peers to build a huge transaction, with many inputs, and many outputs. The non-private inputs can be linked to their previous transaction history. However, the coinjoin outputs with an anonymity score cannot be tied to the inputs.")]),m])}const g=r(u,[["render",_],["__file","TransactionGraph.html.vue"]]),k=JSON.parse(`{"path":"/why-wasabi/TransactionGraph.html","title":"Transaction Graph","lang":"en-US","frontmatter":{"title":"Transaction Graph","description":"On how Bitcoin transactions are interconnected, how this is dangerous for privacy, and how to fix it. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Problem","slug":"problem","link":"#problem","children":[{"level":3,"title":"Public transaction history","slug":"public-transaction-history","link":"#public-transaction-history","children":[]}]},{"level":2,"title":"Wasabi's Solution","slug":"wasabi-s-solution","link":"#wasabi-s-solution","children":[{"level":3,"title":"WabiSabi coinjoins","slug":"wabisabi-coinjoins","link":"#wabisabi-coinjoins","children":[]}]}],"git":{"updatedTime":1720425186000},"filePathRelative":"why-wasabi/TransactionGraph.md"}`);export{g as comp,k as data}; +import{_ as r,r as o,o as c,c as l,a as n,d as t,w as i,b as a,e as h}from"./app-CwImt2bI.js";const u={},d=n("h1",{id:"transaction-graph",tabindex:"-1"},[n("a",{class:"header-anchor",href:"#transaction-graph"},[n("span",null,"Transaction Graph")])],-1),p={class:"table-of-contents"},b=h('

    Problem

    Public transaction history

    Because of the input and output model of Bitcoin, there is a chain of digital signatures all the way from the coinbase reward to the current UTXO. This transaction history can reveal sensitive information about the spending patterns of individuals. The receiver of a coin can look back into the transaction history of the sender. And the sender can see the future spending of the receiver.

    Wasabi's Solution

    WabiSabi coinjoins

    ',5),f={href:"https://github.com/WalletWasabi/WabiSabi",target:"_blank",rel:"noopener noreferrer"},m=n("p",null,"This means that when sending an anonscore coin, the receiver does not know about the transaction history before the coinjoin. And when the receiver does a coinjoin himself, then the sender cannot spy on the later spending patterns. An outside observer can only guess the correct link at a rate of 1 in the anonscore, for example, 1-in-100, or 1%.",-1);function _(w,y){const e=o("router-link"),s=o("ExternalLinkIcon");return c(),l("div",null,[d,n("nav",p,[n("ul",null,[n("li",null,[t(e,{to:"#problem"},{default:i(()=>[a("Problem")]),_:1}),n("ul",null,[n("li",null,[t(e,{to:"#public-transaction-history"},{default:i(()=>[a("Public transaction history")]),_:1})])])]),n("li",null,[t(e,{to:"#wasabi-s-solution"},{default:i(()=>[a("Wasabi's Solution")]),_:1}),n("ul",null,[n("li",null,[t(e,{to:"#wabisabi-coinjoins"},{default:i(()=>[a("WabiSabi coinjoins")]),_:1})])])])])]),b,n("p",null,[a("In order to obfuscate the link between inputs and outputs, Wasabi uses the "),n("a",f,[a("WabiSabi"),t(s)]),a(" coinjoin protocol. The Wasabi central coordinator cannot steal and cannot spy, it simply helps many peers to build a huge transaction, with many inputs, and many outputs. The non-private inputs can be linked to their previous transaction history. However, the coinjoin outputs with an anonymity score cannot be tied to the inputs.")]),m])}const g=r(u,[["render",_],["__file","TransactionGraph.html.vue"]]),k=JSON.parse(`{"path":"/why-wasabi/TransactionGraph.html","title":"Transaction Graph","lang":"en-US","frontmatter":{"title":"Transaction Graph","description":"On how Bitcoin transactions are interconnected, how this is dangerous for privacy, and how to fix it. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Problem","slug":"problem","link":"#problem","children":[{"level":3,"title":"Public transaction history","slug":"public-transaction-history","link":"#public-transaction-history","children":[]}]},{"level":2,"title":"Wasabi's Solution","slug":"wasabi-s-solution","link":"#wasabi-s-solution","children":[{"level":3,"title":"WabiSabi coinjoins","slug":"wabisabi-coinjoins","link":"#wabisabi-coinjoins","children":[]}]}],"git":{"updatedTime":1720425980000},"filePathRelative":"why-wasabi/TransactionGraph.md"}`);export{g as comp,k as data}; diff --git a/assets/TransactionSurveillanceCompanies.html-rwuC602A.js b/assets/TransactionSurveillanceCompanies.html-BC3VvVts.js similarity index 99% rename from assets/TransactionSurveillanceCompanies.html-rwuC602A.js rename to assets/TransactionSurveillanceCompanies.html-BC3VvVts.js index e10faa7ee..0e45f3ef3 100644 --- a/assets/TransactionSurveillanceCompanies.html-rwuC602A.js +++ b/assets/TransactionSurveillanceCompanies.html-BC3VvVts.js @@ -1 +1 @@ -import{_ as c,r,o as h,c as p,a as e,d as i,w as t,b as n,e as l}from"./app-3S7gIoGc.js";const d={},u=e("h1",{id:"transaction-surveillance-companies",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#transaction-surveillance-companies"},[e("span",null,"Transaction Surveillance Companies")])],-1),y=e("p",null,"A transaction surveillance company is one that attempts to spy on bitcoin users. Their business model is usually to sell the data to any governments, corporations and individuals willing to pay for their services.",-1),m={class:"table-of-contents"},f=l('

    Spying technology

    There are a number of techniques probably used by transaction surveillance companies:

    AML/KYC information

    Many bitcoin exchanges require users to undergo Anti-Money Laundering (AML) and Know-Your-Customer (KYC) checks, which requires users to reveal all kinds of invasive personal information such as their real name, residence, occupation, net worth and income. All this information is usually passed onto the exchange's partner transaction surveillance company, which keeps a database linking the victim's personal information with their bitcoin addresses and transactions.

    Blockchain analysis

    ',5),g=e("h3",{id:"wallet-synchronization-analysis",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#wallet-synchronization-analysis"},[e("span",null,"Wallet synchronization analysis")])],-1),v={href:"https://github.com/bitcoin/bips/blob/master/bip-0037.mediawiki",target:"_blank",rel:"noopener noreferrer"},b=l('

    Transaction broadcasting

    Surveillance companies have been known to sybil and eclipse attack the bitcoin network, and specific nodes, in order to try to find the source IP addresses of unconfirmed transactions.

    Criticisms

    Attempt to invade privacy

    The right to privacy is recognized as a human right, for instance in the US constitution, European Union regulations and the Constitution of India.

    Financial privacy is an essential criteria for the efficient operation of a free market: if you run a business, you cannot effectively set prices if your suppliers and customers can see all your transactions against your will. You cannot compete effectively if your competition is tracking your sales. Individually your informational leverage is lost in your private dealings if you don't have privacy over your accounts: if you pay your landlord in Bitcoin without enough privacy in place, your landlord will see when you've received a pay raise and can hit you up for more rent.

    Financial privacy is essential for personal safety: if thieves can see your income, holdings, and spending, they can use that information to target and exploit you. Without privacy, malicious parties have more ability to steal your identity, snatch your packages from your doorstep, or impersonate businesses you transact with. They also know exactly how much to try to scam you for.

    Financial privacy is essential for human dignity: no one wants the snotty barista at the coffee shop or their nosy neighbors commenting on their income or spending habits. No one wants their baby-crazy in-laws asking why they're buying contraception (or sex toys). Your employer has no business knowing what church you donate to. Only in a perfectly enlightened discrimination-free world where no one has undue authority over anyone else could we retain our dignity and make our lawful transactions freely without self-censorship if we don't have privacy.

    Most importantly, financial privacy isn't incompatible with things like law enforcement or transparency. You can always keep records, be ordered (or volunteer) to provide them to whomever, have judges hold against your interest when you can't produce records (as is the case today). None of this requires globally visible public records.

    Globally visible public records in finance are completely unheard-of. They are undesirable and arguably intolerable. The Bitcoin whitepaper made a promise of how we could get around the visibility of the ledger with pseudonymous addresses, but the ecosystem has broken that promise in a bunch of places and we ought to fix it. Bitcoin could have coded your name or IP address into every transaction. It didn't. The whitepaper even has a section on privacy. Sufficient privacy is an essential prerequisite for a viable digital currency.

    Attempt to destroy fungibility

    ',11),w=l('

    No mechanism for oversight or appeal

    There appears to be no recourse for someone affected by false positive identification of exchange-disapproved transaction history. This could result in them wrongly having their coins confiscated.

    Jurisdiction

    Transaction surveillance company market themselves as a tool for finding "bad guys", but it's unclear which jurisdiction that applies to. For example, could one day the government of China pressure those companies into marking certain coins as "bad" because they belong to users who disagree with Chinese government policy?

    Incentivized to oppose bitcoin updates

    During the deployment of segregated witness, certain transaction surveillance companies were believed to have spread misinformation about it, because the update enables Lightning Network. The companies saw it as a threat to their business, since it can enable transacting with bitcoin more privately.

    Oversold effectiveness

    Transaction surveillance companies rely on heuristics or assumptions when analyzing the blockchain. These heuristics are sometimes not true, for example, the common-input-ownership heuristic is broken by CoinJoin. Even if that heuristic is true, it still requires actually identifying the cluster, which is not always possible.

    Laws surrounding anti-money-laundering typically require businesses to make reasonable efforts to investigate the source of funds. Usually, the transaction surveillance company's customers simply want to legally protect themselves, regardless of whether the surveillance actually works. There is a lot of money in this space from governments and other authorities, who usually don't understand the underlying technology and are happy to throw money at several startups who claim to be able to accurately track everything. Whether the activities of transaction surveillance companies actually help against money laundering is an open question.

    image

    ',10),_={href:"https://blog.chainalysis.com/reports/2021-crypto-crime-report-intro-ransomware-scams-darknet-markets",target:"_blank",rel:"noopener noreferrer"},k=e("h2",{id:"examples",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#examples"},[e("span",null,"Examples")])],-1),x={href:"https://www.chainalysis.com/",target:"_blank",rel:"noopener noreferrer"},T={href:"https://www.elliptic.co/",target:"_blank",rel:"noopener noreferrer"},C={href:"https://www.neutrino.nu/",target:"_blank",rel:"noopener noreferrer"},z={href:"https://www.coinfirm.io/",target:"_blank",rel:"noopener noreferrer"},A={href:"https://blockchaingroup.io/",target:"_blank",rel:"noopener noreferrer"},B={href:"https://ciphertrace.com/",target:"_blank",rel:"noopener noreferrer"},S={href:"https://complyadvantage.com/aml-crypto-compliance/",target:"_blank",rel:"noopener noreferrer"},q={href:"https://www.idology.com/solutions/compliance/",target:"_blank",rel:"noopener noreferrer"},I={href:"https://elementus.io/",target:"_blank",rel:"noopener noreferrer"},E={href:"https://dmgblockchain.com/",target:"_blank",rel:"noopener noreferrer"},N={href:"https://www.scorechain.com/",target:"_blank",rel:"noopener noreferrer"},L={href:"https://crystalblockchain.com/",target:"_blank",rel:"noopener noreferrer"},P=e("li",null,"Coinvalidation",-1);function Y(j,M){const o=r("router-link"),s=r("RouteLink"),a=r("ExternalLinkIcon");return h(),p("div",null,[u,y,e("nav",m,[e("ul",null,[e("li",null,[i(o,{to:"#spying-technology"},{default:t(()=>[n("Spying technology")]),_:1}),e("ul",null,[e("li",null,[i(o,{to:"#aml-kyc-information"},{default:t(()=>[n("AML/KYC information")]),_:1})]),e("li",null,[i(o,{to:"#blockchain-analysis"},{default:t(()=>[n("Blockchain analysis")]),_:1})]),e("li",null,[i(o,{to:"#wallet-synchronization-analysis"},{default:t(()=>[n("Wallet synchronization analysis")]),_:1})]),e("li",null,[i(o,{to:"#transaction-broadcasting"},{default:t(()=>[n("Transaction broadcasting")]),_:1})])])]),e("li",null,[i(o,{to:"#criticisms"},{default:t(()=>[n("Criticisms")]),_:1}),e("ul",null,[e("li",null,[i(o,{to:"#attempt-to-invade-privacy"},{default:t(()=>[n("Attempt to invade privacy")]),_:1})]),e("li",null,[i(o,{to:"#attempt-to-destroy-fungibility"},{default:t(()=>[n("Attempt to destroy fungibility")]),_:1})]),e("li",null,[i(o,{to:"#no-mechanism-for-oversight-or-appeal"},{default:t(()=>[n("No mechanism for oversight or appeal")]),_:1})]),e("li",null,[i(o,{to:"#jurisdiction"},{default:t(()=>[n("Jurisdiction")]),_:1})]),e("li",null,[i(o,{to:"#incentivized-to-oppose-bitcoin-updates"},{default:t(()=>[n("Incentivized to oppose bitcoin updates")]),_:1})]),e("li",null,[i(o,{to:"#oversold-effectiveness"},{default:t(()=>[n("Oversold effectiveness")]),_:1})])])]),e("li",null,[i(o,{to:"#examples"},{default:t(()=>[n("Examples")]),_:1})])])]),f,e("p",null,[n("Bitcoin on-chain transactions are visible to all and so can be analyzed. Important techniques are the "),i(s,{to:"/glossary/Glossary-PrivacyWasabi.html#common-input-ownership-heuristic"},{default:t(()=>[n("common-input-ownership")]),_:1}),n(" heuristic and "),i(s,{to:"/why-wasabi/AddressReuse.html"},{default:t(()=>[n("address reuse")]),_:1}),n(".")]),g,e("p",null,[n("Bitcoin lightweight wallets often download their own history and balance by querying a third-party server. Transaction surveillance companies often try to exploit this to learn which addresses and transactions belong to certain wallets and IPs. The companies have been known to collect "),e("a",v,[n("BIP 37"),i(a)]),n(" filters from BIP37-enabled wallets. They almost-certainly also run many Electrum servers which can spy on any Electrum wallet that connects to them.")]),b,e("p",null,[n("Privacy invasions can lead to damaging or destroying bitcoin "),i(s,{to:"/glossary/Glossary-GeneralBitcoin.html#fungibility"},{default:t(()=>[n("fungibility")]),_:1}),n(". The aim of bitcoin is to be a decentralized digital currency, but if all users are eventually required to consult centralized blacklists before accepting bitcoin, then its decentralization will be destroyed.")]),e("p",null,[i(s,{to:"/FAQ/FAQ-GeneralBitcoinPrivacy.html#how-is-financial-privacy-an-essential-element-to-fungibility-in-bitcoin"},{default:t(()=>[n("How is financial privacy an essential element to fungibility in Bitcoin?")]),_:1})]),w,e("p",null,[e("em",null,[n("According to an excerpt from Chainalysis in their "),e("a",_,[n("2021 report"),i(a)]),n(", in 2019, criminal activity represented only 2.1% of all cryptocurrency transaction volume.")])]),k,e("ul",null,[e("li",null,[e("a",x,[n("Chainanalysis"),i(a)])]),e("li",null,[e("a",T,[n("Elliptic"),i(a)])]),e("li",null,[e("a",C,[n("Neutrino"),i(a)])]),e("li",null,[e("a",z,[n("Coinfirm"),i(a)])]),e("li",null,[e("a",A,[n("Blockchain Group"),i(a)])]),e("li",null,[e("a",B,[n("Ciphertrace"),i(a)])]),e("li",null,[e("a",S,[n("Comply Advantage"),i(a)])]),e("li",null,[e("a",q,[n("Idology"),i(a)])]),e("li",null,[e("a",I,[n("Elementus"),i(a)])]),e("li",null,[e("a",E,[n("DmgBlockchain"),i(a)])]),e("li",null,[e("a",N,[n("ScoreChain"),i(a)])]),e("li",null,[e("a",L,[n("Crystal"),i(a)])]),P])])}const F=c(d,[["render",Y],["__file","TransactionSurveillanceCompanies.html.vue"]]),G=JSON.parse('{"path":"/why-wasabi/TransactionSurveillanceCompanies.html","title":"Transaction Surveillance Companies","lang":"en-US","frontmatter":{"title":"Transaction Surveillance Companies","description":"An explanation of transaction surveillance companies and a list of the most known ones. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Spying technology","slug":"spying-technology","link":"#spying-technology","children":[{"level":3,"title":"AML/KYC information","slug":"aml-kyc-information","link":"#aml-kyc-information","children":[]},{"level":3,"title":"Blockchain analysis","slug":"blockchain-analysis","link":"#blockchain-analysis","children":[]},{"level":3,"title":"Wallet synchronization analysis","slug":"wallet-synchronization-analysis","link":"#wallet-synchronization-analysis","children":[]},{"level":3,"title":"Transaction broadcasting","slug":"transaction-broadcasting","link":"#transaction-broadcasting","children":[]}]},{"level":2,"title":"Criticisms","slug":"criticisms","link":"#criticisms","children":[{"level":3,"title":"Attempt to invade privacy","slug":"attempt-to-invade-privacy","link":"#attempt-to-invade-privacy","children":[]},{"level":3,"title":"Attempt to destroy fungibility","slug":"attempt-to-destroy-fungibility","link":"#attempt-to-destroy-fungibility","children":[]},{"level":3,"title":"No mechanism for oversight or appeal","slug":"no-mechanism-for-oversight-or-appeal","link":"#no-mechanism-for-oversight-or-appeal","children":[]},{"level":3,"title":"Jurisdiction","slug":"jurisdiction","link":"#jurisdiction","children":[]},{"level":3,"title":"Incentivized to oppose bitcoin updates","slug":"incentivized-to-oppose-bitcoin-updates","link":"#incentivized-to-oppose-bitcoin-updates","children":[]},{"level":3,"title":"Oversold effectiveness","slug":"oversold-effectiveness","link":"#oversold-effectiveness","children":[]}]},{"level":2,"title":"Examples","slug":"examples","link":"#examples","children":[]}],"git":{"updatedTime":1720425186000},"filePathRelative":"why-wasabi/TransactionSurveillanceCompanies.md"}');export{F as comp,G as data}; +import{_ as c,r,o as h,c as p,a as e,d as i,w as t,b as n,e as l}from"./app-CwImt2bI.js";const d={},u=e("h1",{id:"transaction-surveillance-companies",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#transaction-surveillance-companies"},[e("span",null,"Transaction Surveillance Companies")])],-1),y=e("p",null,"A transaction surveillance company is one that attempts to spy on bitcoin users. Their business model is usually to sell the data to any governments, corporations and individuals willing to pay for their services.",-1),m={class:"table-of-contents"},f=l('

    Spying technology

    There are a number of techniques probably used by transaction surveillance companies:

    AML/KYC information

    Many bitcoin exchanges require users to undergo Anti-Money Laundering (AML) and Know-Your-Customer (KYC) checks, which requires users to reveal all kinds of invasive personal information such as their real name, residence, occupation, net worth and income. All this information is usually passed onto the exchange's partner transaction surveillance company, which keeps a database linking the victim's personal information with their bitcoin addresses and transactions.

    Blockchain analysis

    ',5),g=e("h3",{id:"wallet-synchronization-analysis",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#wallet-synchronization-analysis"},[e("span",null,"Wallet synchronization analysis")])],-1),v={href:"https://github.com/bitcoin/bips/blob/master/bip-0037.mediawiki",target:"_blank",rel:"noopener noreferrer"},b=l('

    Transaction broadcasting

    Surveillance companies have been known to sybil and eclipse attack the bitcoin network, and specific nodes, in order to try to find the source IP addresses of unconfirmed transactions.

    Criticisms

    Attempt to invade privacy

    The right to privacy is recognized as a human right, for instance in the US constitution, European Union regulations and the Constitution of India.

    Financial privacy is an essential criteria for the efficient operation of a free market: if you run a business, you cannot effectively set prices if your suppliers and customers can see all your transactions against your will. You cannot compete effectively if your competition is tracking your sales. Individually your informational leverage is lost in your private dealings if you don't have privacy over your accounts: if you pay your landlord in Bitcoin without enough privacy in place, your landlord will see when you've received a pay raise and can hit you up for more rent.

    Financial privacy is essential for personal safety: if thieves can see your income, holdings, and spending, they can use that information to target and exploit you. Without privacy, malicious parties have more ability to steal your identity, snatch your packages from your doorstep, or impersonate businesses you transact with. They also know exactly how much to try to scam you for.

    Financial privacy is essential for human dignity: no one wants the snotty barista at the coffee shop or their nosy neighbors commenting on their income or spending habits. No one wants their baby-crazy in-laws asking why they're buying contraception (or sex toys). Your employer has no business knowing what church you donate to. Only in a perfectly enlightened discrimination-free world where no one has undue authority over anyone else could we retain our dignity and make our lawful transactions freely without self-censorship if we don't have privacy.

    Most importantly, financial privacy isn't incompatible with things like law enforcement or transparency. You can always keep records, be ordered (or volunteer) to provide them to whomever, have judges hold against your interest when you can't produce records (as is the case today). None of this requires globally visible public records.

    Globally visible public records in finance are completely unheard-of. They are undesirable and arguably intolerable. The Bitcoin whitepaper made a promise of how we could get around the visibility of the ledger with pseudonymous addresses, but the ecosystem has broken that promise in a bunch of places and we ought to fix it. Bitcoin could have coded your name or IP address into every transaction. It didn't. The whitepaper even has a section on privacy. Sufficient privacy is an essential prerequisite for a viable digital currency.

    Attempt to destroy fungibility

    ',11),w=l('

    No mechanism for oversight or appeal

    There appears to be no recourse for someone affected by false positive identification of exchange-disapproved transaction history. This could result in them wrongly having their coins confiscated.

    Jurisdiction

    Transaction surveillance company market themselves as a tool for finding "bad guys", but it's unclear which jurisdiction that applies to. For example, could one day the government of China pressure those companies into marking certain coins as "bad" because they belong to users who disagree with Chinese government policy?

    Incentivized to oppose bitcoin updates

    During the deployment of segregated witness, certain transaction surveillance companies were believed to have spread misinformation about it, because the update enables Lightning Network. The companies saw it as a threat to their business, since it can enable transacting with bitcoin more privately.

    Oversold effectiveness

    Transaction surveillance companies rely on heuristics or assumptions when analyzing the blockchain. These heuristics are sometimes not true, for example, the common-input-ownership heuristic is broken by CoinJoin. Even if that heuristic is true, it still requires actually identifying the cluster, which is not always possible.

    Laws surrounding anti-money-laundering typically require businesses to make reasonable efforts to investigate the source of funds. Usually, the transaction surveillance company's customers simply want to legally protect themselves, regardless of whether the surveillance actually works. There is a lot of money in this space from governments and other authorities, who usually don't understand the underlying technology and are happy to throw money at several startups who claim to be able to accurately track everything. Whether the activities of transaction surveillance companies actually help against money laundering is an open question.

    image

    ',10),_={href:"https://blog.chainalysis.com/reports/2021-crypto-crime-report-intro-ransomware-scams-darknet-markets",target:"_blank",rel:"noopener noreferrer"},k=e("h2",{id:"examples",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#examples"},[e("span",null,"Examples")])],-1),x={href:"https://www.chainalysis.com/",target:"_blank",rel:"noopener noreferrer"},T={href:"https://www.elliptic.co/",target:"_blank",rel:"noopener noreferrer"},C={href:"https://www.neutrino.nu/",target:"_blank",rel:"noopener noreferrer"},z={href:"https://www.coinfirm.io/",target:"_blank",rel:"noopener noreferrer"},A={href:"https://blockchaingroup.io/",target:"_blank",rel:"noopener noreferrer"},B={href:"https://ciphertrace.com/",target:"_blank",rel:"noopener noreferrer"},S={href:"https://complyadvantage.com/aml-crypto-compliance/",target:"_blank",rel:"noopener noreferrer"},q={href:"https://www.idology.com/solutions/compliance/",target:"_blank",rel:"noopener noreferrer"},I={href:"https://elementus.io/",target:"_blank",rel:"noopener noreferrer"},E={href:"https://dmgblockchain.com/",target:"_blank",rel:"noopener noreferrer"},N={href:"https://www.scorechain.com/",target:"_blank",rel:"noopener noreferrer"},L={href:"https://crystalblockchain.com/",target:"_blank",rel:"noopener noreferrer"},P=e("li",null,"Coinvalidation",-1);function Y(j,M){const o=r("router-link"),s=r("RouteLink"),a=r("ExternalLinkIcon");return h(),p("div",null,[u,y,e("nav",m,[e("ul",null,[e("li",null,[i(o,{to:"#spying-technology"},{default:t(()=>[n("Spying technology")]),_:1}),e("ul",null,[e("li",null,[i(o,{to:"#aml-kyc-information"},{default:t(()=>[n("AML/KYC information")]),_:1})]),e("li",null,[i(o,{to:"#blockchain-analysis"},{default:t(()=>[n("Blockchain analysis")]),_:1})]),e("li",null,[i(o,{to:"#wallet-synchronization-analysis"},{default:t(()=>[n("Wallet synchronization analysis")]),_:1})]),e("li",null,[i(o,{to:"#transaction-broadcasting"},{default:t(()=>[n("Transaction broadcasting")]),_:1})])])]),e("li",null,[i(o,{to:"#criticisms"},{default:t(()=>[n("Criticisms")]),_:1}),e("ul",null,[e("li",null,[i(o,{to:"#attempt-to-invade-privacy"},{default:t(()=>[n("Attempt to invade privacy")]),_:1})]),e("li",null,[i(o,{to:"#attempt-to-destroy-fungibility"},{default:t(()=>[n("Attempt to destroy fungibility")]),_:1})]),e("li",null,[i(o,{to:"#no-mechanism-for-oversight-or-appeal"},{default:t(()=>[n("No mechanism for oversight or appeal")]),_:1})]),e("li",null,[i(o,{to:"#jurisdiction"},{default:t(()=>[n("Jurisdiction")]),_:1})]),e("li",null,[i(o,{to:"#incentivized-to-oppose-bitcoin-updates"},{default:t(()=>[n("Incentivized to oppose bitcoin updates")]),_:1})]),e("li",null,[i(o,{to:"#oversold-effectiveness"},{default:t(()=>[n("Oversold effectiveness")]),_:1})])])]),e("li",null,[i(o,{to:"#examples"},{default:t(()=>[n("Examples")]),_:1})])])]),f,e("p",null,[n("Bitcoin on-chain transactions are visible to all and so can be analyzed. Important techniques are the "),i(s,{to:"/glossary/Glossary-PrivacyWasabi.html#common-input-ownership-heuristic"},{default:t(()=>[n("common-input-ownership")]),_:1}),n(" heuristic and "),i(s,{to:"/why-wasabi/AddressReuse.html"},{default:t(()=>[n("address reuse")]),_:1}),n(".")]),g,e("p",null,[n("Bitcoin lightweight wallets often download their own history and balance by querying a third-party server. Transaction surveillance companies often try to exploit this to learn which addresses and transactions belong to certain wallets and IPs. The companies have been known to collect "),e("a",v,[n("BIP 37"),i(a)]),n(" filters from BIP37-enabled wallets. They almost-certainly also run many Electrum servers which can spy on any Electrum wallet that connects to them.")]),b,e("p",null,[n("Privacy invasions can lead to damaging or destroying bitcoin "),i(s,{to:"/glossary/Glossary-GeneralBitcoin.html#fungibility"},{default:t(()=>[n("fungibility")]),_:1}),n(". The aim of bitcoin is to be a decentralized digital currency, but if all users are eventually required to consult centralized blacklists before accepting bitcoin, then its decentralization will be destroyed.")]),e("p",null,[i(s,{to:"/FAQ/FAQ-GeneralBitcoinPrivacy.html#how-is-financial-privacy-an-essential-element-to-fungibility-in-bitcoin"},{default:t(()=>[n("How is financial privacy an essential element to fungibility in Bitcoin?")]),_:1})]),w,e("p",null,[e("em",null,[n("According to an excerpt from Chainalysis in their "),e("a",_,[n("2021 report"),i(a)]),n(", in 2019, criminal activity represented only 2.1% of all cryptocurrency transaction volume.")])]),k,e("ul",null,[e("li",null,[e("a",x,[n("Chainanalysis"),i(a)])]),e("li",null,[e("a",T,[n("Elliptic"),i(a)])]),e("li",null,[e("a",C,[n("Neutrino"),i(a)])]),e("li",null,[e("a",z,[n("Coinfirm"),i(a)])]),e("li",null,[e("a",A,[n("Blockchain Group"),i(a)])]),e("li",null,[e("a",B,[n("Ciphertrace"),i(a)])]),e("li",null,[e("a",S,[n("Comply Advantage"),i(a)])]),e("li",null,[e("a",q,[n("Idology"),i(a)])]),e("li",null,[e("a",I,[n("Elementus"),i(a)])]),e("li",null,[e("a",E,[n("DmgBlockchain"),i(a)])]),e("li",null,[e("a",N,[n("ScoreChain"),i(a)])]),e("li",null,[e("a",L,[n("Crystal"),i(a)])]),P])])}const F=c(d,[["render",Y],["__file","TransactionSurveillanceCompanies.html.vue"]]),G=JSON.parse('{"path":"/why-wasabi/TransactionSurveillanceCompanies.html","title":"Transaction Surveillance Companies","lang":"en-US","frontmatter":{"title":"Transaction Surveillance Companies","description":"An explanation of transaction surveillance companies and a list of the most known ones. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Spying technology","slug":"spying-technology","link":"#spying-technology","children":[{"level":3,"title":"AML/KYC information","slug":"aml-kyc-information","link":"#aml-kyc-information","children":[]},{"level":3,"title":"Blockchain analysis","slug":"blockchain-analysis","link":"#blockchain-analysis","children":[]},{"level":3,"title":"Wallet synchronization analysis","slug":"wallet-synchronization-analysis","link":"#wallet-synchronization-analysis","children":[]},{"level":3,"title":"Transaction broadcasting","slug":"transaction-broadcasting","link":"#transaction-broadcasting","children":[]}]},{"level":2,"title":"Criticisms","slug":"criticisms","link":"#criticisms","children":[{"level":3,"title":"Attempt to invade privacy","slug":"attempt-to-invade-privacy","link":"#attempt-to-invade-privacy","children":[]},{"level":3,"title":"Attempt to destroy fungibility","slug":"attempt-to-destroy-fungibility","link":"#attempt-to-destroy-fungibility","children":[]},{"level":3,"title":"No mechanism for oversight or appeal","slug":"no-mechanism-for-oversight-or-appeal","link":"#no-mechanism-for-oversight-or-appeal","children":[]},{"level":3,"title":"Jurisdiction","slug":"jurisdiction","link":"#jurisdiction","children":[]},{"level":3,"title":"Incentivized to oppose bitcoin updates","slug":"incentivized-to-oppose-bitcoin-updates","link":"#incentivized-to-oppose-bitcoin-updates","children":[]},{"level":3,"title":"Oversold effectiveness","slug":"oversold-effectiveness","link":"#oversold-effectiveness","children":[]}]},{"level":2,"title":"Examples","slug":"examples","link":"#examples","children":[]}],"git":{"updatedTime":1720425980000},"filePathRelative":"why-wasabi/TransactionSurveillanceCompanies.md"}');export{F as comp,G as data}; diff --git a/assets/WalletGeneration.html-tKnNedDb.js b/assets/WalletGeneration.html-mAdC83BR.js similarity index 98% rename from assets/WalletGeneration.html-tKnNedDb.js rename to assets/WalletGeneration.html-mAdC83BR.js index b90fd14a7..dc884fc67 100644 --- a/assets/WalletGeneration.html-tKnNedDb.js +++ b/assets/WalletGeneration.html-mAdC83BR.js @@ -1,4 +1,4 @@ -import{_ as d,a as c,b as u}from"./AddWalletAddPassphrase-M0V8PDu3.js";import{_ as h,a as p}from"./AddWalletConfirmRecoveryWords-DoQpsOos.js";import{_ as m}from"./CoinjoinStrategy-BZrDbG5n.js";import{_ as b,r as l,o as v,c as w,a as e,d as a,w as n,b as t,e as o}from"./app-3S7gIoGc.js";const y="/AddWalletSuccessfullyAdded.png",_={},g=e("h1",{id:"wallet-generation",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#wallet-generation"},[e("span",null,"Wallet Generation")])],-1),f={class:"table-of-contents"},k=o('

    Introduction

    With Wasabi you can generate an unlimited number of Bitcoin wallets very quickly, without any cost, and without asking anyone for permission. Each wallet has separate private and public keys in a unique backup, and they are not at all linked to the other wallets generated on the same computer. So, with several wallets, you can conveniently manage your bitcoin for different use cases without worrying about revealing that you control them.

    Generating the wallet step-by-step

    1. Launch Wasabi Wallet. The very first time you run the software the Add Wallet dialog will be open automatically, but you can also access it by clicking on Add Wallet in the NavBar or Searchbar.

    2. Click Create a new wallet to generate a new wallet.

    Add a Bitcoin wallet with Wasabi

    1. Give the wallet a name. This name is not shared with anyone, it is only stored locally on your computer. (If there are no wallets then this step is skipped and the new wallet will automatically be named Wallet) Click Continue.

    Add Wallet Wallet Name

    ',7),W={start:"4"},P=e("strong",null,"together with",-1),x={href:"https://github.com/bitcoin/bips/blob/master/bip-0039.mediawiki",target:"_blank",rel:"noopener noreferrer"},S=e("div",{class:"custom-container danger"},[e("p",{class:"custom-container-title"},"Back up your recovery words!"),e("p",null,"Without the recovery words (Seed phrase) AND the passphrase, you cannot recover your wallet. So, triple-check that you have a proper backup! Make sure the backup of your recovery words is stored separately from the passphrase backup.")],-1),B=e("p",null,[e("img",{src:h,alt:"Wasabi Wallet recovery words",title:"Wasabi Wallet recovery words"})],-1),A=e("ol",{start:"5"},[e("li",null,[t("You must confirm the Recovery Words by clicking on the right word in the right order, as a check to make sure that your Recovery Words are backed up. So, confirm the Recovery Words, and click "),e("code",null,"Continue"),t(".")])],-1),I=e("p",null,[e("img",{src:p,alt:"Wasabi Wallet confirm recovery words",title:"Wasabi Wallet confirm recovery words"})],-1),C={start:"6"},G=e("div",{class:"custom-container danger"},[e("p",{class:"custom-container-title"},"Back up your passphrase!"),e("p",null,"Without the passphrase, you cannot spend your bitcoin or recover your wallet, even if you have the recovery words (Seed phrase). So, triple-check that you have a proper backup!")],-1),N=e("li",null,[e("p",null,[t("Confirm the passphrase and click the "),e("code",null,"Continue"),t(" button.")])],-1),E=o('

    Wasabi Wallet Add Passphrase

    1. Select the coinjoin strategy for this wallet and click Continue.

    Add Wallet Coinjoin Strategy

    1. The wallet is succesfully added and will automatically be opened.

    Wallet Successfully Added

    Important info about your wallet password

    ',6),T={href:"https://github.com/bitcoin/bips/blob/master/bip-0038.mediawiki",target:"_blank",rel:"noopener noreferrer"},R=e("strong",null,"both",-1),L=e("h2",{id:"how-are-the-secrets-created",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-are-the-secrets-created"},[e("span",null,"How are the secrets created")])],-1),V={href:"https://github.com/bitcoin/bips/blob/master/bip-0038.mediawiki",target:"_blank",rel:"noopener noreferrer"},j=o(`
                          +--------------+
    +import{_ as d,a as c,b as u}from"./AddWalletAddPassphrase-M0V8PDu3.js";import{_ as h,a as p}from"./AddWalletConfirmRecoveryWords-DoQpsOos.js";import{_ as m}from"./CoinjoinStrategy-BZrDbG5n.js";import{_ as b,r as l,o as v,c as w,a as e,d as a,w as n,b as t,e as o}from"./app-CwImt2bI.js";const y="/AddWalletSuccessfullyAdded.png",_={},g=e("h1",{id:"wallet-generation",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#wallet-generation"},[e("span",null,"Wallet Generation")])],-1),f={class:"table-of-contents"},k=o('

    Introduction

    With Wasabi you can generate an unlimited number of Bitcoin wallets very quickly, without any cost, and without asking anyone for permission. Each wallet has separate private and public keys in a unique backup, and they are not at all linked to the other wallets generated on the same computer. So, with several wallets, you can conveniently manage your bitcoin for different use cases without worrying about revealing that you control them.

    Generating the wallet step-by-step

    1. Launch Wasabi Wallet. The very first time you run the software the Add Wallet dialog will be open automatically, but you can also access it by clicking on Add Wallet in the NavBar or Searchbar.

    2. Click Create a new wallet to generate a new wallet.

    Add a Bitcoin wallet with Wasabi

    1. Give the wallet a name. This name is not shared with anyone, it is only stored locally on your computer. (If there are no wallets then this step is skipped and the new wallet will automatically be named Wallet) Click Continue.

    Add Wallet Wallet Name

    ',7),W={start:"4"},P=e("strong",null,"together with",-1),x={href:"https://github.com/bitcoin/bips/blob/master/bip-0039.mediawiki",target:"_blank",rel:"noopener noreferrer"},S=e("div",{class:"custom-container danger"},[e("p",{class:"custom-container-title"},"Back up your recovery words!"),e("p",null,"Without the recovery words (Seed phrase) AND the passphrase, you cannot recover your wallet. So, triple-check that you have a proper backup! Make sure the backup of your recovery words is stored separately from the passphrase backup.")],-1),B=e("p",null,[e("img",{src:h,alt:"Wasabi Wallet recovery words",title:"Wasabi Wallet recovery words"})],-1),A=e("ol",{start:"5"},[e("li",null,[t("You must confirm the Recovery Words by clicking on the right word in the right order, as a check to make sure that your Recovery Words are backed up. So, confirm the Recovery Words, and click "),e("code",null,"Continue"),t(".")])],-1),I=e("p",null,[e("img",{src:p,alt:"Wasabi Wallet confirm recovery words",title:"Wasabi Wallet confirm recovery words"})],-1),C={start:"6"},G=e("div",{class:"custom-container danger"},[e("p",{class:"custom-container-title"},"Back up your passphrase!"),e("p",null,"Without the passphrase, you cannot spend your bitcoin or recover your wallet, even if you have the recovery words (Seed phrase). So, triple-check that you have a proper backup!")],-1),N=e("li",null,[e("p",null,[t("Confirm the passphrase and click the "),e("code",null,"Continue"),t(" button.")])],-1),E=o('

    Wasabi Wallet Add Passphrase

    1. Select the coinjoin strategy for this wallet and click Continue.

    Add Wallet Coinjoin Strategy

    1. The wallet is succesfully added and will automatically be opened.

    Wallet Successfully Added

    Important info about your wallet password

    ',6),T={href:"https://github.com/bitcoin/bips/blob/master/bip-0038.mediawiki",target:"_blank",rel:"noopener noreferrer"},R=e("strong",null,"both",-1),L=e("h2",{id:"how-are-the-secrets-created",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-are-the-secrets-created"},[e("span",null,"How are the secrets created")])],-1),V={href:"https://github.com/bitcoin/bips/blob/master/bip-0038.mediawiki",target:"_blank",rel:"noopener noreferrer"},j=o(`
                          +--------------+
                           | Entropy      |
                           +--------------+
       +------------+             |
    @@ -39,4 +39,4 @@ import{_ as d,a as c,b as u}from"./AddWalletAddPassphrase-M0V8PDu3.js";import{_
                       | Fingerprint+ExtPub |
                       +--------------------+
     
    -
    `,1);function H(K,Y){const i=l("router-link"),s=l("ExternalLinkIcon"),r=l("RouteLink");return v(),w("div",null,[g,e("nav",f,[e("ul",null,[e("li",null,[a(i,{to:"#introduction"},{default:n(()=>[t("Introduction")]),_:1})]),e("li",null,[a(i,{to:"#generating-the-wallet-step-by-step"},{default:n(()=>[t("Generating the wallet step-by-step")]),_:1})]),e("li",null,[a(i,{to:"#important-info-about-your-wallet-password"},{default:n(()=>[t("Important info about your wallet password")]),_:1})]),e("li",null,[a(i,{to:"#how-are-the-secrets-created"},{default:n(()=>[t("How are the secrets created")]),_:1})])])]),k,e("ol",W,[e("li",null,[e("p",null,[t("Write down the 12 recovery words (mnemonic seed phrase) in the correct order and store them in a safe place. You have to use this seed phrase "),P,t(" your passphrase to recover your wallet (using Wasabi or another "),e("a",x,[t("BIP 39"),a(s)]),t(" compliant wallet).")]),S])]),B,A,I,e("ol",C,[e("li",null,[e("p",null,[t("Write a long and random passphrase and "),e("strong",null,[a(r,{to:"/using-wasabi/BackupBestPractices.html"},{default:n(()=>[t("back it up")]),_:1})]),t(". It encrypts your secrets, and you will need it every time you want to open the wallet, spend bitcoin from this wallet or recover your wallet.")]),e("p",null,[t("If you are uncertain about how to create a secure passphrase, refer to "),a(r,{to:"/using-wasabi/PasswordBestPractices.html"},{default:n(()=>[t("Password Best Practices")]),_:1}),t(" for helpful information.")]),G]),N]),E,e("p",null,[t("Wasabi integrates "),e("a",T,[t("BIP 38: Password-Protected Private Key"),a(s)]),t(", which means that the secrets needed to spend the bitcoin are encrypted on the computer. If someone has compromised your operating system and hardware and he only has the encrypted secrets, then no bitcoin can be spent by him. You need "),R,t(" the encrypted secrets and the passphrase in order to enable the private key which can sign a spending transaction. This means that the passphrase is your last line of defense against anyone who tries to steal your bitcoin.")]),L,e("p",null,[t("Wasabi uses "),e("a",V,[t("BIP 38: Password-Protected Private Key"),a(s)])]),j])}const J=b(_,[["render",H],["__file","WalletGeneration.html.vue"]]),O=JSON.parse('{"path":"/using-wasabi/WalletGeneration.html","title":"Wallet Generation","lang":"en-US","frontmatter":{"title":"Wallet Generation","description":"A detailed guide about the wallet and the key generation in Wasabi. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Introduction","slug":"introduction","link":"#introduction","children":[]},{"level":2,"title":"Generating the wallet step-by-step","slug":"generating-the-wallet-step-by-step","link":"#generating-the-wallet-step-by-step","children":[]},{"level":2,"title":"Important info about your wallet password","slug":"important-info-about-your-wallet-password","link":"#important-info-about-your-wallet-password","children":[]},{"level":2,"title":"How are the secrets created","slug":"how-are-the-secrets-created","link":"#how-are-the-secrets-created","children":[]}],"git":{"updatedTime":1720425186000},"filePathRelative":"using-wasabi/WalletGeneration.md"}');export{J as comp,O as data}; +
    `,1);function H(K,Y){const i=l("router-link"),s=l("ExternalLinkIcon"),r=l("RouteLink");return v(),w("div",null,[g,e("nav",f,[e("ul",null,[e("li",null,[a(i,{to:"#introduction"},{default:n(()=>[t("Introduction")]),_:1})]),e("li",null,[a(i,{to:"#generating-the-wallet-step-by-step"},{default:n(()=>[t("Generating the wallet step-by-step")]),_:1})]),e("li",null,[a(i,{to:"#important-info-about-your-wallet-password"},{default:n(()=>[t("Important info about your wallet password")]),_:1})]),e("li",null,[a(i,{to:"#how-are-the-secrets-created"},{default:n(()=>[t("How are the secrets created")]),_:1})])])]),k,e("ol",W,[e("li",null,[e("p",null,[t("Write down the 12 recovery words (mnemonic seed phrase) in the correct order and store them in a safe place. You have to use this seed phrase "),P,t(" your passphrase to recover your wallet (using Wasabi or another "),e("a",x,[t("BIP 39"),a(s)]),t(" compliant wallet).")]),S])]),B,A,I,e("ol",C,[e("li",null,[e("p",null,[t("Write a long and random passphrase and "),e("strong",null,[a(r,{to:"/using-wasabi/BackupBestPractices.html"},{default:n(()=>[t("back it up")]),_:1})]),t(". It encrypts your secrets, and you will need it every time you want to open the wallet, spend bitcoin from this wallet or recover your wallet.")]),e("p",null,[t("If you are uncertain about how to create a secure passphrase, refer to "),a(r,{to:"/using-wasabi/PasswordBestPractices.html"},{default:n(()=>[t("Password Best Practices")]),_:1}),t(" for helpful information.")]),G]),N]),E,e("p",null,[t("Wasabi integrates "),e("a",T,[t("BIP 38: Password-Protected Private Key"),a(s)]),t(", which means that the secrets needed to spend the bitcoin are encrypted on the computer. If someone has compromised your operating system and hardware and he only has the encrypted secrets, then no bitcoin can be spent by him. You need "),R,t(" the encrypted secrets and the passphrase in order to enable the private key which can sign a spending transaction. This means that the passphrase is your last line of defense against anyone who tries to steal your bitcoin.")]),L,e("p",null,[t("Wasabi uses "),e("a",V,[t("BIP 38: Password-Protected Private Key"),a(s)])]),j])}const J=b(_,[["render",H],["__file","WalletGeneration.html.vue"]]),O=JSON.parse('{"path":"/using-wasabi/WalletGeneration.html","title":"Wallet Generation","lang":"en-US","frontmatter":{"title":"Wallet Generation","description":"A detailed guide about the wallet and the key generation in Wasabi. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Introduction","slug":"introduction","link":"#introduction","children":[]},{"level":2,"title":"Generating the wallet step-by-step","slug":"generating-the-wallet-step-by-step","link":"#generating-the-wallet-step-by-step","children":[]},{"level":2,"title":"Important info about your wallet password","slug":"important-info-about-your-wallet-password","link":"#important-info-about-your-wallet-password","children":[]},{"level":2,"title":"How are the secrets created","slug":"how-are-the-secrets-created","link":"#how-are-the-secrets-created","children":[]}],"git":{"updatedTime":1720425980000},"filePathRelative":"using-wasabi/WalletGeneration.md"}');export{J as comp,O as data}; diff --git a/assets/WalletLoad.html-sLQIFgev.js b/assets/WalletLoad.html-CTTR-YGw.js similarity index 98% rename from assets/WalletLoad.html-sLQIFgev.js rename to assets/WalletLoad.html-CTTR-YGw.js index f12ff2eb1..68f077ff4 100644 --- a/assets/WalletLoad.html-sLQIFgev.js +++ b/assets/WalletLoad.html-CTTR-YGw.js @@ -1 +1 @@ -import{_ as d}from"./WalletSynchronizing-Bg2Cuco7.js";import{_ as c,r as o,o as h,c as u,a as e,d as a,w as l,b as t,e as i}from"./app-3S7gIoGc.js";const p="/WalletOpen.png",f={},b=e("h1",{id:"wallet-load",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#wallet-load"},[e("span",null,"Wallet Load")])],-1),w={class:"table-of-contents"},y=e("h2",{id:"loading-wallet-step-by-step",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#loading-wallet-step-by-step"},[e("span",null,"Loading wallet step-by-step")])],-1),g=e("p",null,"To load a wallet and start the synchonization process, you need to open your wallet by typing in the passphrase. The first time synchronization of your wallet might take some time depending on the size of its history.",-1),m=e("h3",{id:"wallet-list",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#wallet-list"},[e("span",null,"Wallet list")])],-1),_=e("code",null,"Wallet list",-1),k=i('

    Click the wallet you want to view, type in the passphrase and press Open.

    Type your passphrase to open the wallet

    Synchronization

    Filter download

    ',4),v={href:"https://github.com/bitcoin/bips/blob/master/bip-0158.mediawiki",target:"_blank",rel:"noopener noreferrer"},W=i('

    Wallet is synchronizing itself with the Bitcoin network

    Filter scanning

    When you load a wallet, it checks if the generated addresses within the gap limit hit against a block filter. Most filters do not hit, and then the wallet is certain that this block does not contain a transaction of yours so it will not download it. If a transaction of yours is in a block, then the corresponding filter will always be hit, and the wallet will know this is a relevant block for you. There can be a small chance for a false positive where the filter matches, but the block actually does not contain a transaction.

    Block download

    ',4),T=e("h3",{id:"turbosync",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#turbosync"},[e("span",null,"TurboSync")])],-1),z={href:"https://github.com/WalletWasabi/WalletWasabi/releases/tag/v2.0.4",target:"_blank",rel:"noopener noreferrer"},x=e("em",null,"TurboSync",-1),L=e("em",null,"TurboSync",-1),S=i('

    During a coinjoin, a new address (key) has to be generated for each output. As a result, wallets that use the coinjoin service a lot have a quickly growing set of generated addresses. This is a problem for wallet synchronization: each address has to be tested against each filter, with a small probability of matching as false-positive for every address. As a result, wallets with many derived addresses will have to download many false-positive blocks, making the synchronization more time consuming.

    It leverages a simple heuristic: addresses used as coinjoin outputs or as change (internal keys) should only be used once. In other terms, once an internal address has been used to receive a coin and then this coin was used as input in a new transaction (the coin has been spent), the address should never be used again, and there is no need to test it against the remaining filters.

    Wallets coinjoining a lot will benefit the most from this feature, as the vast majority of their addresses will be skipped, reducing the number of blocks to download because of false-positive matches.

    Once the wallet is opened, the skipped addresses will be tested in the background, in the case that some funds have been received on those addresses. Users in that edge case would see their balance update automatically after some time. Once done the message Wallet is fully synchronized. is written to the logs file to indicate that the verification process has finished.

    You can disable it!

    TurboSync feature shouldn't cause any problem, but you might want to disable it to debug potential issues with the synchronization of your wallet. In that case, go to your wallet file (search for Wallet Folder using Wasabi's searchbar then open the file corresponding to your wallet) and set UseTurboSync to false.

    ',5);function B(I,F){const n=o("router-link"),s=o("RouteLink"),r=o("ExternalLinkIcon");return h(),u("div",null,[b,e("nav",w,[e("ul",null,[e("li",null,[a(n,{to:"#loading-wallet-step-by-step"},{default:l(()=>[t("Loading wallet step-by-step")]),_:1}),e("ul",null,[e("li",null,[a(n,{to:"#wallet-list"},{default:l(()=>[t("Wallet list")]),_:1})])])]),e("li",null,[a(n,{to:"#synchronization"},{default:l(()=>[t("Synchronization")]),_:1}),e("ul",null,[e("li",null,[a(n,{to:"#filter-download"},{default:l(()=>[t("Filter download")]),_:1})]),e("li",null,[a(n,{to:"#filter-scanning"},{default:l(()=>[t("Filter scanning")]),_:1})]),e("li",null,[a(n,{to:"#block-download"},{default:l(()=>[t("Block download")]),_:1})]),e("li",null,[a(n,{to:"#turbosync"},{default:l(()=>[t("TurboSync")]),_:1})])])])])]),y,g,m,e("p",null,[t("On the left side of Wasabi Wallet is the "),_,t(", where you see an alphabetically sorted list of all the previously "),a(s,{to:"/using-wasabi/WalletGeneration.html"},{default:l(()=>[t("generated")]),_:1}),t(" wallets.")]),k,e("p",null,[t("As soon as you start Wasabi, it connects to the backend server with a new Tor identity and requests the "),e("a",v,[t("BIP 158 block filters"),a(r)]),t(". At the first start, this can take a while because all filters need to be downloaded, but for the subsequent starts, this is faster as only the most recent filters are requested.")]),W,e("p",null,[t("When a block filter hits, either a true match or a false positive, then this block is important for you, so the wallet will download it. If you have "),a(s,{to:"/using-wasabi/BitcoinFullNode.html"},{default:l(()=>[t("a Bitcoin full node connected")]),_:1}),t(", then it will fetch the verified block locally. If not, then Wasabi will connect to a random Bitcoin P2P node with a new Tor identity, request only this block for download, and then disconnect. In this step, your Wasabi behaves like any other full node, and cannot be differentiated.")]),T,e("p",null,[t("Since Wasabi version "),e("a",z,[t("2.0.4"),a(r)]),t(" a new feature is added called "),x,t(". "),L,t(" leads to a significant reduction of wallet loading time, especially for a big wallet.")]),S])}const j=c(f,[["render",B],["__file","WalletLoad.html.vue"]]),q=JSON.parse('{"path":"/using-wasabi/WalletLoad.html","title":"Wallet Load","lang":"en-US","frontmatter":{"title":"Wallet Load","description":"A detailed guide about loading multiple wallets in Wasabi. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Loading wallet step-by-step","slug":"loading-wallet-step-by-step","link":"#loading-wallet-step-by-step","children":[{"level":3,"title":"Wallet list","slug":"wallet-list","link":"#wallet-list","children":[]}]},{"level":2,"title":"Synchronization","slug":"synchronization","link":"#synchronization","children":[{"level":3,"title":"Filter download","slug":"filter-download","link":"#filter-download","children":[]},{"level":3,"title":"Filter scanning","slug":"filter-scanning","link":"#filter-scanning","children":[]},{"level":3,"title":"Block download","slug":"block-download","link":"#block-download","children":[]},{"level":3,"title":"TurboSync","slug":"turbosync","link":"#turbosync","children":[]}]}],"git":{"updatedTime":1720425186000},"filePathRelative":"using-wasabi/WalletLoad.md"}');export{j as comp,q as data}; +import{_ as d}from"./WalletSynchronizing-Bg2Cuco7.js";import{_ as c,r as o,o as h,c as u,a as e,d as a,w as l,b as t,e as i}from"./app-CwImt2bI.js";const p="/WalletOpen.png",f={},b=e("h1",{id:"wallet-load",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#wallet-load"},[e("span",null,"Wallet Load")])],-1),w={class:"table-of-contents"},y=e("h2",{id:"loading-wallet-step-by-step",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#loading-wallet-step-by-step"},[e("span",null,"Loading wallet step-by-step")])],-1),g=e("p",null,"To load a wallet and start the synchonization process, you need to open your wallet by typing in the passphrase. The first time synchronization of your wallet might take some time depending on the size of its history.",-1),m=e("h3",{id:"wallet-list",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#wallet-list"},[e("span",null,"Wallet list")])],-1),_=e("code",null,"Wallet list",-1),k=i('

    Click the wallet you want to view, type in the passphrase and press Open.

    Type your passphrase to open the wallet

    Synchronization

    Filter download

    ',4),v={href:"https://github.com/bitcoin/bips/blob/master/bip-0158.mediawiki",target:"_blank",rel:"noopener noreferrer"},W=i('

    Wallet is synchronizing itself with the Bitcoin network

    Filter scanning

    When you load a wallet, it checks if the generated addresses within the gap limit hit against a block filter. Most filters do not hit, and then the wallet is certain that this block does not contain a transaction of yours so it will not download it. If a transaction of yours is in a block, then the corresponding filter will always be hit, and the wallet will know this is a relevant block for you. There can be a small chance for a false positive where the filter matches, but the block actually does not contain a transaction.

    Block download

    ',4),T=e("h3",{id:"turbosync",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#turbosync"},[e("span",null,"TurboSync")])],-1),z={href:"https://github.com/WalletWasabi/WalletWasabi/releases/tag/v2.0.4",target:"_blank",rel:"noopener noreferrer"},x=e("em",null,"TurboSync",-1),L=e("em",null,"TurboSync",-1),S=i('

    During a coinjoin, a new address (key) has to be generated for each output. As a result, wallets that use the coinjoin service a lot have a quickly growing set of generated addresses. This is a problem for wallet synchronization: each address has to be tested against each filter, with a small probability of matching as false-positive for every address. As a result, wallets with many derived addresses will have to download many false-positive blocks, making the synchronization more time consuming.

    It leverages a simple heuristic: addresses used as coinjoin outputs or as change (internal keys) should only be used once. In other terms, once an internal address has been used to receive a coin and then this coin was used as input in a new transaction (the coin has been spent), the address should never be used again, and there is no need to test it against the remaining filters.

    Wallets coinjoining a lot will benefit the most from this feature, as the vast majority of their addresses will be skipped, reducing the number of blocks to download because of false-positive matches.

    Once the wallet is opened, the skipped addresses will be tested in the background, in the case that some funds have been received on those addresses. Users in that edge case would see their balance update automatically after some time. Once done the message Wallet is fully synchronized. is written to the logs file to indicate that the verification process has finished.

    You can disable it!

    TurboSync feature shouldn't cause any problem, but you might want to disable it to debug potential issues with the synchronization of your wallet. In that case, go to your wallet file (search for Wallet Folder using Wasabi's searchbar then open the file corresponding to your wallet) and set UseTurboSync to false.

    ',5);function B(I,F){const n=o("router-link"),s=o("RouteLink"),r=o("ExternalLinkIcon");return h(),u("div",null,[b,e("nav",w,[e("ul",null,[e("li",null,[a(n,{to:"#loading-wallet-step-by-step"},{default:l(()=>[t("Loading wallet step-by-step")]),_:1}),e("ul",null,[e("li",null,[a(n,{to:"#wallet-list"},{default:l(()=>[t("Wallet list")]),_:1})])])]),e("li",null,[a(n,{to:"#synchronization"},{default:l(()=>[t("Synchronization")]),_:1}),e("ul",null,[e("li",null,[a(n,{to:"#filter-download"},{default:l(()=>[t("Filter download")]),_:1})]),e("li",null,[a(n,{to:"#filter-scanning"},{default:l(()=>[t("Filter scanning")]),_:1})]),e("li",null,[a(n,{to:"#block-download"},{default:l(()=>[t("Block download")]),_:1})]),e("li",null,[a(n,{to:"#turbosync"},{default:l(()=>[t("TurboSync")]),_:1})])])])])]),y,g,m,e("p",null,[t("On the left side of Wasabi Wallet is the "),_,t(", where you see an alphabetically sorted list of all the previously "),a(s,{to:"/using-wasabi/WalletGeneration.html"},{default:l(()=>[t("generated")]),_:1}),t(" wallets.")]),k,e("p",null,[t("As soon as you start Wasabi, it connects to the backend server with a new Tor identity and requests the "),e("a",v,[t("BIP 158 block filters"),a(r)]),t(". At the first start, this can take a while because all filters need to be downloaded, but for the subsequent starts, this is faster as only the most recent filters are requested.")]),W,e("p",null,[t("When a block filter hits, either a true match or a false positive, then this block is important for you, so the wallet will download it. If you have "),a(s,{to:"/using-wasabi/BitcoinFullNode.html"},{default:l(()=>[t("a Bitcoin full node connected")]),_:1}),t(", then it will fetch the verified block locally. If not, then Wasabi will connect to a random Bitcoin P2P node with a new Tor identity, request only this block for download, and then disconnect. In this step, your Wasabi behaves like any other full node, and cannot be differentiated.")]),T,e("p",null,[t("Since Wasabi version "),e("a",z,[t("2.0.4"),a(r)]),t(" a new feature is added called "),x,t(". "),L,t(" leads to a significant reduction of wallet loading time, especially for a big wallet.")]),S])}const j=c(f,[["render",B],["__file","WalletLoad.html.vue"]]),q=JSON.parse('{"path":"/using-wasabi/WalletLoad.html","title":"Wallet Load","lang":"en-US","frontmatter":{"title":"Wallet Load","description":"A detailed guide about loading multiple wallets in Wasabi. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Loading wallet step-by-step","slug":"loading-wallet-step-by-step","link":"#loading-wallet-step-by-step","children":[{"level":3,"title":"Wallet list","slug":"wallet-list","link":"#wallet-list","children":[]}]},{"level":2,"title":"Synchronization","slug":"synchronization","link":"#synchronization","children":[{"level":3,"title":"Filter download","slug":"filter-download","link":"#filter-download","children":[]},{"level":3,"title":"Filter scanning","slug":"filter-scanning","link":"#filter-scanning","children":[]},{"level":3,"title":"Block download","slug":"block-download","link":"#block-download","children":[]},{"level":3,"title":"TurboSync","slug":"turbosync","link":"#turbosync","children":[]}]}],"git":{"updatedTime":1720425980000},"filePathRelative":"using-wasabi/WalletLoad.md"}');export{j as comp,q as data}; diff --git a/assets/WalletRecovery.html-CvgB9Wgw.js b/assets/WalletRecovery.html-CU0GMqJf.js similarity index 97% rename from assets/WalletRecovery.html-CvgB9Wgw.js rename to assets/WalletRecovery.html-CU0GMqJf.js index 08f2fff17..8cb872a40 100644 --- a/assets/WalletRecovery.html-CvgB9Wgw.js +++ b/assets/WalletRecovery.html-CU0GMqJf.js @@ -1 +1 @@ -import{_ as n}from"./AddWalletButton-C7JVhQwV.js";import{_ as c,a as d,b as p}from"./AddWalletAddPassphrase-M0V8PDu3.js";import{_ as h,r as l,o as u,c as m,a as e,d as t,w as s,b as a,e as w}from"./app-3S7gIoGc.js";const b="/WalletRecovery.png",_="/WalletRecoveryAdvanced.png",W={},f=e("h1",{id:"recover-a-wallet",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#recover-a-wallet"},[e("span",null,"Recover a Wallet")])],-1),v=e("p",null,"There are two different ways that you can recover an already used wallet in Wasabi.",-1),y={class:"table-of-contents"},g=e("h2",{id:"mnemonic-recovery-words-and-password",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#mnemonic-recovery-words-and-password"},[e("span",null,"Mnemonic Recovery Words and Password")])],-1),k={href:"https://github.com/bitcoin/bips/blob/master/bip-0039.mediawiki",target:"_blank",rel:"noopener noreferrer"},R={href:"https://github.com/bitcoin/bips/blob/master/bip-0032.mediawiki",target:"_blank",rel:"noopener noreferrer"},A=e("strong",null,"Both",-1),x=e("strong",null,"and",-1),P={href:"https://github.com/bitcoin/bips/blob/master/bip-0039/english.txt",target:"_blank",rel:"noopener noreferrer"},B=w('

    To recover a wallet:

    1. Click on Add Wallet at the bottom left corner of the main view.

    Wasabi Wallet Add Wallet

    1. Click on Recover a wallet.

    Wasabi Wallet Add Wallet

    1. Give the wallet a name for future recognition of the wallet.

    Wasabi Wallet Name Wallet

    1. Type in the Recovery Words in the correct order and click Continue.

    Wasabi Wallet Recover Wallet

    1. Type in the Passphrase.

    Add Wallet Add Passphrase

    Now Wasabi will recover your wallet.

    With this, only the private keys are imported, but not the labels of your addresses.

    DANGER

    At recovery, Wasabi is unable to check if your passphrase is correct or not. If you type a wrong passphrase a completely different wallet will be recovered.

    You can also use the Advanced Recovery Options to specify the gap limit. The gap limit is about how far Wasabi will check the HD wallet structure for consecutive addresses that have no coins, in some cases, you may want to increase this limit.

    Wasabi Wallet Recovery Advanced

    TIP

    With this method, you can recover a wallet that was generated with any BIP39 compatible software, not just a Wasabi generated wallet.

    Back up Wallet File and Password

    ',18),N=e("code",null,"WalletBackups",-1),I=e("code",null,"Add Wallet",-1),T=e("code",null,"Import a wallet",-1),C=e("p",null,[a("Alternitavely: copy the wallet file to the "),e("code",null,"Wallets"),a(" folder, and upon the next restart of Wasabi, it will show this wallet in the "),e("code",null,"NavBar"),a(", from there you can open it as usual.")],-1),F=e("p",null,"Using this method will also backup your address labels and cluster history.",-1),E=e("div",{class:"custom-container warning"},[e("p",{class:"custom-container-title"},"WARNING"),e("p",null,"Make sure to back up your passphrase separately because it is necessary to spend your bitcoin.")],-1);function L(M,V){const r=l("router-link"),o=l("ExternalLinkIcon"),i=l("RouteLink");return u(),m("div",null,[f,v,e("nav",y,[e("ul",null,[e("li",null,[t(r,{to:"#mnemonic-recovery-words-and-password"},{default:s(()=>[a("Mnemonic Recovery Words and Password")]),_:1})]),e("li",null,[t(r,{to:"#back-up-wallet-file-and-password"},{default:s(()=>[a("Back up Wallet File and Password")]),_:1})])])]),g,e("p",null,[a("Wasabi uses the "),e("a",k,[a("BIP 39"),t(o)]),a(" mnemonic code for generating "),e("a",R,[a("BIP 32"),t(o)]),a(" hierarchical deterministic wallets. "),A,a(" your passphrase "),x,a(" the generated 12 mnemonic recovery words are the necessary secrets to recover your wallet. The recovery words are spell checked based on the "),e("a",P,[a("official wordlist"),t(o)]),a(", with the right word shown below the text box.")]),B,e("p",null,[a("Wasabi Wallet creates a backup of your wallet file inside "),N,a(" in your "),t(i,{to:"/FAQ/FAQ-UseWasabi.html#where-can-i-find-the-wasabi-data-folder"},{default:s(()=>[a("Wasabi data folder")]),_:1}),a(". If you have done a backup of this file, then you can import it at "),I,a(", by clicking on "),T,a(".")]),C,F,E])}const D=h(W,[["render",L],["__file","WalletRecovery.html.vue"]]),O=JSON.parse('{"path":"/using-wasabi/WalletRecovery.html","title":"Recover a Wallet","lang":"en-US","frontmatter":{"title":"Recover a Wallet","description":"A detailed guide about restoring a wallet in Wasabi. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Mnemonic Recovery Words and Password","slug":"mnemonic-recovery-words-and-password","link":"#mnemonic-recovery-words-and-password","children":[]},{"level":2,"title":"Back up Wallet File and Password","slug":"back-up-wallet-file-and-password","link":"#back-up-wallet-file-and-password","children":[]}],"git":{"updatedTime":1720425186000},"filePathRelative":"using-wasabi/WalletRecovery.md"}');export{D as comp,O as data}; +import{_ as n}from"./AddWalletButton-C7JVhQwV.js";import{_ as c,a as d,b as p}from"./AddWalletAddPassphrase-M0V8PDu3.js";import{_ as h,r as l,o as u,c as m,a as e,d as t,w as s,b as a,e as w}from"./app-CwImt2bI.js";const b="/WalletRecovery.png",_="/WalletRecoveryAdvanced.png",W={},f=e("h1",{id:"recover-a-wallet",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#recover-a-wallet"},[e("span",null,"Recover a Wallet")])],-1),v=e("p",null,"There are two different ways that you can recover an already used wallet in Wasabi.",-1),y={class:"table-of-contents"},g=e("h2",{id:"mnemonic-recovery-words-and-password",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#mnemonic-recovery-words-and-password"},[e("span",null,"Mnemonic Recovery Words and Password")])],-1),k={href:"https://github.com/bitcoin/bips/blob/master/bip-0039.mediawiki",target:"_blank",rel:"noopener noreferrer"},R={href:"https://github.com/bitcoin/bips/blob/master/bip-0032.mediawiki",target:"_blank",rel:"noopener noreferrer"},A=e("strong",null,"Both",-1),x=e("strong",null,"and",-1),P={href:"https://github.com/bitcoin/bips/blob/master/bip-0039/english.txt",target:"_blank",rel:"noopener noreferrer"},B=w('

    To recover a wallet:

    1. Click on Add Wallet at the bottom left corner of the main view.

    Wasabi Wallet Add Wallet

    1. Click on Recover a wallet.

    Wasabi Wallet Add Wallet

    1. Give the wallet a name for future recognition of the wallet.

    Wasabi Wallet Name Wallet

    1. Type in the Recovery Words in the correct order and click Continue.

    Wasabi Wallet Recover Wallet

    1. Type in the Passphrase.

    Add Wallet Add Passphrase

    Now Wasabi will recover your wallet.

    With this, only the private keys are imported, but not the labels of your addresses.

    DANGER

    At recovery, Wasabi is unable to check if your passphrase is correct or not. If you type a wrong passphrase a completely different wallet will be recovered.

    You can also use the Advanced Recovery Options to specify the gap limit. The gap limit is about how far Wasabi will check the HD wallet structure for consecutive addresses that have no coins, in some cases, you may want to increase this limit.

    Wasabi Wallet Recovery Advanced

    TIP

    With this method, you can recover a wallet that was generated with any BIP39 compatible software, not just a Wasabi generated wallet.

    Back up Wallet File and Password

    ',18),N=e("code",null,"WalletBackups",-1),I=e("code",null,"Add Wallet",-1),T=e("code",null,"Import a wallet",-1),C=e("p",null,[a("Alternitavely: copy the wallet file to the "),e("code",null,"Wallets"),a(" folder, and upon the next restart of Wasabi, it will show this wallet in the "),e("code",null,"NavBar"),a(", from there you can open it as usual.")],-1),F=e("p",null,"Using this method will also backup your address labels and cluster history.",-1),E=e("div",{class:"custom-container warning"},[e("p",{class:"custom-container-title"},"WARNING"),e("p",null,"Make sure to back up your passphrase separately because it is necessary to spend your bitcoin.")],-1);function L(M,V){const r=l("router-link"),o=l("ExternalLinkIcon"),i=l("RouteLink");return u(),m("div",null,[f,v,e("nav",y,[e("ul",null,[e("li",null,[t(r,{to:"#mnemonic-recovery-words-and-password"},{default:s(()=>[a("Mnemonic Recovery Words and Password")]),_:1})]),e("li",null,[t(r,{to:"#back-up-wallet-file-and-password"},{default:s(()=>[a("Back up Wallet File and Password")]),_:1})])])]),g,e("p",null,[a("Wasabi uses the "),e("a",k,[a("BIP 39"),t(o)]),a(" mnemonic code for generating "),e("a",R,[a("BIP 32"),t(o)]),a(" hierarchical deterministic wallets. "),A,a(" your passphrase "),x,a(" the generated 12 mnemonic recovery words are the necessary secrets to recover your wallet. The recovery words are spell checked based on the "),e("a",P,[a("official wordlist"),t(o)]),a(", with the right word shown below the text box.")]),B,e("p",null,[a("Wasabi Wallet creates a backup of your wallet file inside "),N,a(" in your "),t(i,{to:"/FAQ/FAQ-UseWasabi.html#where-can-i-find-the-wasabi-data-folder"},{default:s(()=>[a("Wasabi data folder")]),_:1}),a(". If you have done a backup of this file, then you can import it at "),I,a(", by clicking on "),T,a(".")]),C,F,E])}const D=h(W,[["render",L],["__file","WalletRecovery.html.vue"]]),O=JSON.parse('{"path":"/using-wasabi/WalletRecovery.html","title":"Recover a Wallet","lang":"en-US","frontmatter":{"title":"Recover a Wallet","description":"A detailed guide about restoring a wallet in Wasabi. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Mnemonic Recovery Words and Password","slug":"mnemonic-recovery-words-and-password","link":"#mnemonic-recovery-words-and-password","children":[]},{"level":2,"title":"Back up Wallet File and Password","slug":"back-up-wallet-file-and-password","link":"#back-up-wallet-file-and-password","children":[]}],"git":{"updatedTime":1720425980000},"filePathRelative":"using-wasabi/WalletRecovery.md"}');export{D as comp,O as data}; diff --git a/assets/WasabiSetupVM.html-xF8KcB87.js b/assets/WasabiSetupVM.html-CivLF5Jv.js similarity index 99% rename from assets/WasabiSetupVM.html-xF8KcB87.js rename to assets/WasabiSetupVM.html-CivLF5Jv.js index d2e483830..ecd3daa1d 100644 --- a/assets/WasabiSetupVM.html-xF8KcB87.js +++ b/assets/WasabiSetupVM.html-CivLF5Jv.js @@ -1,4 +1,4 @@ -import{_ as u,r,o as d,c,a as e,d as n,w as t,b as a,e as l}from"./app-3S7gIoGc.js";const p="/Virtualbox.png",h={},m=e("h1",{id:"wasabi-setup-in-virtual-machines",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#wasabi-setup-in-virtual-machines"},[e("span",null,"Wasabi Setup in Virtual Machines")])],-1),b={class:"table-of-contents"},v=l('

    Benefits of Virtual Machines

    Virtualization allows you to create and run as many virtual machines (VMs) on a single computer at one time as desired. The only constraints are the amount of RAM and hard disk space available on the host computer.

    Each VM is isolated from the host machine. Therefore, such things as corrupted files, configuration errors, malware, etc., encountered during the use of a VM do not affect the host computer.

    If you are a developer, using virtual machines gives you several powerful features. You can easily:

    • Create snapshots of a VM's state at any time. These snapshots can be restored later if a problem or undesired condition arises in the current state of the VM.

    • Set up a template VM with a desired development environment or configuration, and then quickly create lightweight, disposable clones of the template for specific tests.

    • Develop and/or test applications in Windows, Linux, and macOS at the same time, on the same computer. You can link them together in a customizable internal network if desired.

    For developers, the use of virtual machines offers some of the basic version control features of git but applied to operating systems rather than files or projects.

    Qubes

    ',7),g={href:"https://www.qubes-os.org/",target:"_blank",rel:"noopener noreferrer"},f={href:"https://www.qubes-os.org/downloads/",target:"_blank",rel:"noopener noreferrer"},k={href:"https://www.qubes-os.org/doc/installation-guide/",target:"_blank",rel:"noopener noreferrer"},w=e("h3",{id:"generate-template-vm",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#generate-template-vm"},[e("span",null,"Generate Template VM")])],-1),_=e("code",null,"dom0",-1),y=l(`
    [user@dom0 ~]$ qvm-clone debian-12-xfce template-wasabi
    +import{_ as u,r,o as d,c,a as e,d as n,w as t,b as a,e as l}from"./app-CwImt2bI.js";const p="/Virtualbox.png",h={},m=e("h1",{id:"wasabi-setup-in-virtual-machines",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#wasabi-setup-in-virtual-machines"},[e("span",null,"Wasabi Setup in Virtual Machines")])],-1),b={class:"table-of-contents"},v=l('

    Benefits of Virtual Machines

    Virtualization allows you to create and run as many virtual machines (VMs) on a single computer at one time as desired. The only constraints are the amount of RAM and hard disk space available on the host computer.

    Each VM is isolated from the host machine. Therefore, such things as corrupted files, configuration errors, malware, etc., encountered during the use of a VM do not affect the host computer.

    If you are a developer, using virtual machines gives you several powerful features. You can easily:

    • Create snapshots of a VM's state at any time. These snapshots can be restored later if a problem or undesired condition arises in the current state of the VM.

    • Set up a template VM with a desired development environment or configuration, and then quickly create lightweight, disposable clones of the template for specific tests.

    • Develop and/or test applications in Windows, Linux, and macOS at the same time, on the same computer. You can link them together in a customizable internal network if desired.

    For developers, the use of virtual machines offers some of the basic version control features of git but applied to operating systems rather than files or projects.

    Qubes

    ',7),g={href:"https://www.qubes-os.org/",target:"_blank",rel:"noopener noreferrer"},f={href:"https://www.qubes-os.org/downloads/",target:"_blank",rel:"noopener noreferrer"},k={href:"https://www.qubes-os.org/doc/installation-guide/",target:"_blank",rel:"noopener noreferrer"},w=e("h3",{id:"generate-template-vm",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#generate-template-vm"},[e("span",null,"Generate Template VM")])],-1),_=e("code",null,"dom0",-1),y=l(`
    [user@dom0 ~]$ qvm-clone debian-12-xfce template-wasabi
     

    Install Dependencies

    Start the gnome-terminal of template-wasabi.

    [user@dom0 ~]$ qvm-run -a template-wasabi gnome-terminal
     

    Update the template-wasabi.

    [user@template-wasabi ~]$ sudo apt update
     [user@template-wasabi ~]$ sudo apt upgrade
    @@ -25,4 +25,4 @@ your@vm:~$ dotnet run
     your@vm:~$ git fetch nopara73
     your@vm:~$ git checkout <development branch>
     

    Pull the latest commits.

    your@vm:~$ git pull
    -
    `,8),J={href:"https://git-scm.com/",target:"_blank",rel:"noopener noreferrer"},X=e("h3",{id:"install-latest-package",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#install-latest-package"},[e("span",null,"Install Latest Package")])],-1),Z=e("p",null,"Alternatively, you can also install the package in a new VM. This is a stable version suitable to use on mainnet and is separated from the development VM. There are no additional dependencies required to run this version.",-1),ee=e("code",null,"Wasabi-2.0.8.1",-1),ae=e("p",null,[e("strong",null,"Have fun, and please consider contributing to the Wasabi project!")],-1);function ne(te,se){const s=r("router-link"),i=r("ExternalLinkIcon"),o=r("RouteLink");return d(),c("div",null,[m,e("nav",b,[e("ul",null,[e("li",null,[n(s,{to:"#benefits-of-virtual-machines"},{default:t(()=>[a("Benefits of Virtual Machines")]),_:1})]),e("li",null,[n(s,{to:"#qubes"},{default:t(()=>[a("Qubes")]),_:1}),e("ul",null,[e("li",null,[n(s,{to:"#generate-template-vm"},{default:t(()=>[a("Generate Template VM")]),_:1})]),e("li",null,[n(s,{to:"#install-dependencies"},{default:t(()=>[a("Install Dependencies")]),_:1})]),e("li",null,[n(s,{to:"#generate-app-vm"},{default:t(()=>[a("Generate App VM")]),_:1})]),e("li",null,[n(s,{to:"#compile-and-run-wasabi"},{default:t(()=>[a("Compile and Run Wasabi")]),_:1})]),e("li",null,[n(s,{to:"#install-package-in-app-vm"},{default:t(()=>[a("Install Package in App VM")]),_:1})])])]),e("li",null,[n(s,{to:"#virtualbox"},{default:t(()=>[a("VirtualBox")]),_:1}),e("ul",null,[e("li",null,[n(s,{to:"#create-your-first-virtual-machine"},{default:t(()=>[a("Create Your First Virtual Machine")]),_:1})]),e("li",null,[n(s,{to:"#generate-a-template-vm"},{default:t(()=>[a("Generate a Template VM")]),_:1})]),e("li",null,[n(s,{to:"#install-required-dependencies"},{default:t(()=>[a("Install Required Dependencies")]),_:1})]),e("li",null,[n(s,{to:"#cloning-a-virtual-machine"},{default:t(()=>[a("Cloning a Virtual Machine")]),_:1})]),e("li",null,[n(s,{to:"#how-to-create-a-linked-clone"},{default:t(()=>[a("How to Create a Linked Clone")]),_:1})]),e("li",null,[n(s,{to:"#compile-and-run-wasabi-in-your-vm"},{default:t(()=>[a("Compile and Run Wasabi in Your VM")]),_:1})]),e("li",null,[n(s,{to:"#install-latest-package"},{default:t(()=>[a("Install Latest Package")]),_:1})])])])])]),v,e("p",null,[e("a",g,[a("Qubes"),n(i)]),a(" is a free and open-source security-oriented operating system meant for single-user desktop computing. Qubes OS leverages xen-based virtualization to allow for the creation and management of isolated virtual machines (VMs) called qubes. This is valuable for users of high security software like Wasabi Wallet, and especially useful for testers of cutting edge developer branches. There is a separation of the virtual machines running Wasabi on testnet, and those running on mainnet with valuable private keys. If a reviewer compiles a malicious developer branch, then his mainnet private keys are secure in a different qube.")]),e("p",null,[a("This is a step-by-step guide on how to properly compile Wasabi Wallet from source in independent qubes. For tutorials on how to "),e("a",f,[a("download"),n(i)]),a(" and "),e("a",k,[a("install"),n(i)]),a(" Qubes, please see their exhaustive documentation.")]),w,e("p",null,[a("The dependencies to "),n(o,{to:"/using-wasabi/BuildSource.html"},{default:t(()=>[a("compile Wasabi from source")]),_:1}),a(" will be downloaded and installed in a new template VM, which is generated by cloning the Debian template from the "),_,a(" terminal.")]),y,e("p",null,[a("Install "),e("a",V,[a(".NET 8.0 SDK"),n(i)]),a(' for "Build apps" in '),x,a(".")]),M,e("p",null,[n(o,{to:"/using-wasabi/InstallPackage.html#debian-and-ubuntu"},{default:t(()=>[a("Download, verify and install")]),_:1}),a(" the latest "),W,a(" package in "),T,a(", then start Wasabi.")]),q,e("p",null,[e("a",S,[a("VirtualBox"),n(i)]),a(' is a lightweight, powerful free and open-source virtualization tool that allows you to run one or more independent operating systems as "virtual machines" (VMs) on your computer. The computer on which VirtualBox is installed is referred to as the "host" machine, and the VMs that are created are referred to as "guests".')]),I,e("p",null,[a("You can download the latest Virtualbox binary for your host OS "),e("a",C,[a("here"),n(i)]),a(".")]),B,O,e("p",null,[a("Detailed instructions for installing VirtualBox on your host computer can be found "),e("a",$,[a("here"),n(i)]),a(".")]),e("p",null,[a("If you run into trouble or have special requirements, the complete User Manual can be found "),e("a",E,[a("here"),n(i)]),a(".")]),D,e("p",null,[a("Detailed instructions for creating various types of virtual machines can be found "),e("a",A,[a("here"),n(i)]),a(".")]),L,N,P,e("ul",null,[e("li",null,[a('Optional, but strongly recommended: Enable the built-in "Guest Additions" functions of Virtualbox. This step will give you a full-sized display, and make the usage of your mouse seamless when switching between different VMs that are running at the same time. Instruction for enabling "Guest Additions" can be found '),e("a",R,[a("here"),n(i)]),a(".")])]),Y,G,e("p",null,[a("Next, the dependencies to "),n(o,{to:"/using-wasabi/BuildSource.html"},{default:t(()=>[a("compile Wasabi from source")]),_:1}),a(" will be downloaded and installed in a new template VM, which can be based on your preferred OS.")]),U,F,z,e("p",null,[a("Install "),e("a",Q,[a(".NET 8.0 SDK"),n(i)]),a(' for "Build apps".')]),j,e("p",null,[a("Instructions on how to create linked clones in VirtualBox can be found "),e("a",H,[a("here"),n(i)]),a(".")]),K,e("p",null,[a("If you are comfortable with "),e("a",J,[a("Git"),n(i)]),a(", you can now have several versions of Wasabi running for testing purposes, at the same time, on the same computer.")]),X,Z,e("p",null,[n(o,{to:"/using-wasabi/InstallPackage.html"},{default:t(()=>[a("Download, verify and install")]),_:1}),a(" the latest "),ee,a(" package in your VM, then start Wasabi.")]),ae])}const le=u(h,[["render",ne],["__file","WasabiSetupVM.html.vue"]]),oe=JSON.parse('{"path":"/using-wasabi/WasabiSetupVM.html","title":"Wasabi Setup in Virtual Machines","lang":"en-US","frontmatter":{"title":"Wasabi Setup in Virtual Machines","description":"A step by step guide on how to use Wasabi Wallet in virtual machines like Qubes OS or VirtualBox. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Benefits of Virtual Machines","slug":"benefits-of-virtual-machines","link":"#benefits-of-virtual-machines","children":[]},{"level":2,"title":"Qubes","slug":"qubes","link":"#qubes","children":[{"level":3,"title":"Generate Template VM","slug":"generate-template-vm","link":"#generate-template-vm","children":[]},{"level":3,"title":"Install Dependencies","slug":"install-dependencies","link":"#install-dependencies","children":[]},{"level":3,"title":"Generate App VM","slug":"generate-app-vm","link":"#generate-app-vm","children":[]},{"level":3,"title":"Compile and Run Wasabi","slug":"compile-and-run-wasabi","link":"#compile-and-run-wasabi","children":[]},{"level":3,"title":"Install Package in App VM","slug":"install-package-in-app-vm","link":"#install-package-in-app-vm","children":[]}]},{"level":2,"title":"VirtualBox","slug":"virtualbox","link":"#virtualbox","children":[{"level":3,"title":"Create Your First Virtual Machine","slug":"create-your-first-virtual-machine","link":"#create-your-first-virtual-machine","children":[]},{"level":3,"title":"Generate a Template VM","slug":"generate-a-template-vm","link":"#generate-a-template-vm","children":[]},{"level":3,"title":"Install Required Dependencies","slug":"install-required-dependencies","link":"#install-required-dependencies","children":[]},{"level":3,"title":"Cloning a Virtual Machine","slug":"cloning-a-virtual-machine","link":"#cloning-a-virtual-machine","children":[]},{"level":3,"title":"How to Create a Linked Clone","slug":"how-to-create-a-linked-clone","link":"#how-to-create-a-linked-clone","children":[]},{"level":3,"title":"Compile and Run Wasabi in Your VM","slug":"compile-and-run-wasabi-in-your-vm","link":"#compile-and-run-wasabi-in-your-vm","children":[]},{"level":3,"title":"Install Latest Package","slug":"install-latest-package","link":"#install-latest-package","children":[]}]}],"git":{"updatedTime":1720425186000},"filePathRelative":"using-wasabi/WasabiSetupVM.md"}');export{le as comp,oe as data}; +
    `,8),J={href:"https://git-scm.com/",target:"_blank",rel:"noopener noreferrer"},X=e("h3",{id:"install-latest-package",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#install-latest-package"},[e("span",null,"Install Latest Package")])],-1),Z=e("p",null,"Alternatively, you can also install the package in a new VM. This is a stable version suitable to use on mainnet and is separated from the development VM. There are no additional dependencies required to run this version.",-1),ee=e("code",null,"Wasabi-2.0.8.1",-1),ae=e("p",null,[e("strong",null,"Have fun, and please consider contributing to the Wasabi project!")],-1);function ne(te,se){const s=r("router-link"),i=r("ExternalLinkIcon"),o=r("RouteLink");return d(),c("div",null,[m,e("nav",b,[e("ul",null,[e("li",null,[n(s,{to:"#benefits-of-virtual-machines"},{default:t(()=>[a("Benefits of Virtual Machines")]),_:1})]),e("li",null,[n(s,{to:"#qubes"},{default:t(()=>[a("Qubes")]),_:1}),e("ul",null,[e("li",null,[n(s,{to:"#generate-template-vm"},{default:t(()=>[a("Generate Template VM")]),_:1})]),e("li",null,[n(s,{to:"#install-dependencies"},{default:t(()=>[a("Install Dependencies")]),_:1})]),e("li",null,[n(s,{to:"#generate-app-vm"},{default:t(()=>[a("Generate App VM")]),_:1})]),e("li",null,[n(s,{to:"#compile-and-run-wasabi"},{default:t(()=>[a("Compile and Run Wasabi")]),_:1})]),e("li",null,[n(s,{to:"#install-package-in-app-vm"},{default:t(()=>[a("Install Package in App VM")]),_:1})])])]),e("li",null,[n(s,{to:"#virtualbox"},{default:t(()=>[a("VirtualBox")]),_:1}),e("ul",null,[e("li",null,[n(s,{to:"#create-your-first-virtual-machine"},{default:t(()=>[a("Create Your First Virtual Machine")]),_:1})]),e("li",null,[n(s,{to:"#generate-a-template-vm"},{default:t(()=>[a("Generate a Template VM")]),_:1})]),e("li",null,[n(s,{to:"#install-required-dependencies"},{default:t(()=>[a("Install Required Dependencies")]),_:1})]),e("li",null,[n(s,{to:"#cloning-a-virtual-machine"},{default:t(()=>[a("Cloning a Virtual Machine")]),_:1})]),e("li",null,[n(s,{to:"#how-to-create-a-linked-clone"},{default:t(()=>[a("How to Create a Linked Clone")]),_:1})]),e("li",null,[n(s,{to:"#compile-and-run-wasabi-in-your-vm"},{default:t(()=>[a("Compile and Run Wasabi in Your VM")]),_:1})]),e("li",null,[n(s,{to:"#install-latest-package"},{default:t(()=>[a("Install Latest Package")]),_:1})])])])])]),v,e("p",null,[e("a",g,[a("Qubes"),n(i)]),a(" is a free and open-source security-oriented operating system meant for single-user desktop computing. Qubes OS leverages xen-based virtualization to allow for the creation and management of isolated virtual machines (VMs) called qubes. This is valuable for users of high security software like Wasabi Wallet, and especially useful for testers of cutting edge developer branches. There is a separation of the virtual machines running Wasabi on testnet, and those running on mainnet with valuable private keys. If a reviewer compiles a malicious developer branch, then his mainnet private keys are secure in a different qube.")]),e("p",null,[a("This is a step-by-step guide on how to properly compile Wasabi Wallet from source in independent qubes. For tutorials on how to "),e("a",f,[a("download"),n(i)]),a(" and "),e("a",k,[a("install"),n(i)]),a(" Qubes, please see their exhaustive documentation.")]),w,e("p",null,[a("The dependencies to "),n(o,{to:"/using-wasabi/BuildSource.html"},{default:t(()=>[a("compile Wasabi from source")]),_:1}),a(" will be downloaded and installed in a new template VM, which is generated by cloning the Debian template from the "),_,a(" terminal.")]),y,e("p",null,[a("Install "),e("a",V,[a(".NET 8.0 SDK"),n(i)]),a(' for "Build apps" in '),x,a(".")]),M,e("p",null,[n(o,{to:"/using-wasabi/InstallPackage.html#debian-and-ubuntu"},{default:t(()=>[a("Download, verify and install")]),_:1}),a(" the latest "),W,a(" package in "),T,a(", then start Wasabi.")]),q,e("p",null,[e("a",S,[a("VirtualBox"),n(i)]),a(' is a lightweight, powerful free and open-source virtualization tool that allows you to run one or more independent operating systems as "virtual machines" (VMs) on your computer. The computer on which VirtualBox is installed is referred to as the "host" machine, and the VMs that are created are referred to as "guests".')]),I,e("p",null,[a("You can download the latest Virtualbox binary for your host OS "),e("a",C,[a("here"),n(i)]),a(".")]),B,O,e("p",null,[a("Detailed instructions for installing VirtualBox on your host computer can be found "),e("a",$,[a("here"),n(i)]),a(".")]),e("p",null,[a("If you run into trouble or have special requirements, the complete User Manual can be found "),e("a",E,[a("here"),n(i)]),a(".")]),D,e("p",null,[a("Detailed instructions for creating various types of virtual machines can be found "),e("a",A,[a("here"),n(i)]),a(".")]),L,N,P,e("ul",null,[e("li",null,[a('Optional, but strongly recommended: Enable the built-in "Guest Additions" functions of Virtualbox. This step will give you a full-sized display, and make the usage of your mouse seamless when switching between different VMs that are running at the same time. Instruction for enabling "Guest Additions" can be found '),e("a",R,[a("here"),n(i)]),a(".")])]),Y,G,e("p",null,[a("Next, the dependencies to "),n(o,{to:"/using-wasabi/BuildSource.html"},{default:t(()=>[a("compile Wasabi from source")]),_:1}),a(" will be downloaded and installed in a new template VM, which can be based on your preferred OS.")]),U,F,z,e("p",null,[a("Install "),e("a",Q,[a(".NET 8.0 SDK"),n(i)]),a(' for "Build apps".')]),j,e("p",null,[a("Instructions on how to create linked clones in VirtualBox can be found "),e("a",H,[a("here"),n(i)]),a(".")]),K,e("p",null,[a("If you are comfortable with "),e("a",J,[a("Git"),n(i)]),a(", you can now have several versions of Wasabi running for testing purposes, at the same time, on the same computer.")]),X,Z,e("p",null,[n(o,{to:"/using-wasabi/InstallPackage.html"},{default:t(()=>[a("Download, verify and install")]),_:1}),a(" the latest "),ee,a(" package in your VM, then start Wasabi.")]),ae])}const le=u(h,[["render",ne],["__file","WasabiSetupVM.html.vue"]]),oe=JSON.parse('{"path":"/using-wasabi/WasabiSetupVM.html","title":"Wasabi Setup in Virtual Machines","lang":"en-US","frontmatter":{"title":"Wasabi Setup in Virtual Machines","description":"A step by step guide on how to use Wasabi Wallet in virtual machines like Qubes OS or VirtualBox. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Benefits of Virtual Machines","slug":"benefits-of-virtual-machines","link":"#benefits-of-virtual-machines","children":[]},{"level":2,"title":"Qubes","slug":"qubes","link":"#qubes","children":[{"level":3,"title":"Generate Template VM","slug":"generate-template-vm","link":"#generate-template-vm","children":[]},{"level":3,"title":"Install Dependencies","slug":"install-dependencies","link":"#install-dependencies","children":[]},{"level":3,"title":"Generate App VM","slug":"generate-app-vm","link":"#generate-app-vm","children":[]},{"level":3,"title":"Compile and Run Wasabi","slug":"compile-and-run-wasabi","link":"#compile-and-run-wasabi","children":[]},{"level":3,"title":"Install Package in App VM","slug":"install-package-in-app-vm","link":"#install-package-in-app-vm","children":[]}]},{"level":2,"title":"VirtualBox","slug":"virtualbox","link":"#virtualbox","children":[{"level":3,"title":"Create Your First Virtual Machine","slug":"create-your-first-virtual-machine","link":"#create-your-first-virtual-machine","children":[]},{"level":3,"title":"Generate a Template VM","slug":"generate-a-template-vm","link":"#generate-a-template-vm","children":[]},{"level":3,"title":"Install Required Dependencies","slug":"install-required-dependencies","link":"#install-required-dependencies","children":[]},{"level":3,"title":"Cloning a Virtual Machine","slug":"cloning-a-virtual-machine","link":"#cloning-a-virtual-machine","children":[]},{"level":3,"title":"How to Create a Linked Clone","slug":"how-to-create-a-linked-clone","link":"#how-to-create-a-linked-clone","children":[]},{"level":3,"title":"Compile and Run Wasabi in Your VM","slug":"compile-and-run-wasabi-in-your-vm","link":"#compile-and-run-wasabi-in-your-vm","children":[]},{"level":3,"title":"Install Latest Package","slug":"install-latest-package","link":"#install-latest-package","children":[]}]}],"git":{"updatedTime":1720425980000},"filePathRelative":"using-wasabi/WasabiSetupVM.md"}');export{le as comp,oe as data}; diff --git a/assets/WhyFinancialPrivacy.html-BvkR2YhS.js b/assets/WhyFinancialPrivacy.html-DIgudC3m.js similarity index 98% rename from assets/WhyFinancialPrivacy.html-BvkR2YhS.js rename to assets/WhyFinancialPrivacy.html-DIgudC3m.js index e77bf4e55..d2d29f284 100644 --- a/assets/WhyFinancialPrivacy.html-BvkR2YhS.js +++ b/assets/WhyFinancialPrivacy.html-DIgudC3m.js @@ -1 +1 @@ -import{_ as r,r as s,o as c,c as l,a as e,b as t,d as o,w as n,e as h}from"./app-3S7gIoGc.js";const d="/InfographicWhyWasabi.png",y={},u=e("h1",{id:"why-financial-privacy-is-especially-important",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#why-financial-privacy-is-especially-important"},[e("span",null,"Why Financial Privacy is Especially Important")])],-1),p=e("blockquote",null,[e("p",null,"The possibility to be anonymous or pseudonymous relies on you not revealing any identifying information about yourself in connection with the bitcoin addresses you use. If you post your bitcoin address on the web, then you're associating that address and any transactions with it with the name you posted under. If you posted under a handle that you haven't associated with your real identity, then you're still pseudonymous. For greater privacy, it's best to use bitcoin addresses only once.")],-1),m={href:"https://bitcointalk.org/index.php?topic=8.msg34#msg34",target:"_blank",rel:"noopener noreferrer"},f=e("p",null,[e("img",{src:d,alt:"Gaining privacy with Wasabi Wallet for Bitcoin transactions",title:"Wasabi Wallet infographic"})],-1),w={class:"table-of-contents"},v=h('

    Why it is important to keep your funds private

    One of the apparent contradictions of Bitcoin is the notion that your transactions can be private but have a public transaction record.

    As a financial system, Bitcoin functions completely differently from the established banking network. Bitcoin allows you to store funds yourself, without the need for a third party and therefore places the burden on you of keeping said funds secure and accessible.

    While opening an account with a traditional bank or other financial institution requires significant cost and effort, creating a Bitcoin wallet is quick and easy to do on your home computer. This speedy process makes it possible to create hundreds of separate wallets if you wish.

    Two aspects —in particular privacy and identity— function very differently with Bitcoin than in the legacy financial system.

    Pseudonyms protect your identity in Bitcoin

    A bank account, PayPal account, or credit card is always tied to a real identity, making it difficult for many people to open one. Bitcoin doesn't require any identity to be part of this network.

    Being able to use the internet anonymously or pseudonymously is the only way for many people to truly be themselves. Hundreds of millions of people around the globe are not accepted in their societies for reasons they cannot control.

    Maintaining an identity with a large following might require paid services such as blogs, logo designs, stock photos, VPNs, or translations. Without the ability to pay for these services anonymously, you would be forced to reveal your true identity in order to maintain your pseudonym situation. This clearly makes no sense and has potentially dangerous ramifications.

    How Bitcoin empowers anonymity

    Bitcoin is an important, empowering technology. Using Bitcoin protects your right to remain anonymous on the internet. It allows anonymous or pseudonymous fundraising. Groups can collectively control Bitcoin accounts and choose to either hide or reveal financial information at will.

    There are many positive reasons for a private and secure banking system like Bitcoin.

    For example, a workers' rights group could raise funds with Bitcoin. The money could be used for servers, flyers, remote helpers… and all without tying any transaction to the real identities of the volunteers.

    Likewise, a domestic abuse victim might use Bitcoin to securely stack away funds to prepare for an independent life.

    Privacy through pseudonymous accounts

    Privacy in traditional banking is guaranteed by the institutions that make up the system, such as banks, credit card companies, and governments. They (try to) ensure that your bank balance stays a secret. This puts them in a powerful position, where only they have complete oversight as to what is going on.

    In the Bitcoin ecosystem, everyone can see the history and balance of every address, but they cannot necessarily see who controls it. All addresses and transactions are recorded in Bitcoin's publicly distributed database, the blockchain. The addresses do not have names or IP addresses attached to them, so it is not always possible to know which transaction belongs to which individual.

    Threat model

    When considering privacy you need to think about exactly who you're hiding from. You must examine how a hypothetical adversary could spy on you, what kind of information is most important to you and which technology you need to use to protect your privacy. The kind of behaviour needed to protect your privacy therefore depends on your threat model.

    Newcomers to privacy often think that they can simply download some software and all their privacy concerns will be solved. This is not so. Privacy requires a change in behaviour, however slight. For example, imagine if you had a perfectly private internet where who you're communicating with and what you say are completely private. You could still use this to communicate with a social media website to write your real name, upload a selfie and talk about what you're doing right now. Anybody on the internet could view that information so your privacy would be ruined even though you were using perfectly private technology.

    ',21),g={href:"https://www.slideshare.net/grugq/opsec-for-hackers",target:"_blank",rel:"noopener noreferrer"},b=e("p",null,"Most of the time plausible deniability is not good enough because lots of spying methods only need to work on a statistical level (e.g. targeted advertising).",-1);function k(_,B){const a=s("ExternalLinkIcon"),i=s("router-link");return c(),l("div",null,[u,p,e("p",null,[t("By Satoshi Nakamoto in "),e("a",m,[t("How anonymous are bitcoins? - Bitcointalk"),o(a)])]),f,e("nav",w,[e("ul",null,[e("li",null,[o(i,{to:"#why-it-is-important-to-keep-your-funds-private"},{default:n(()=>[t("Why it is important to keep your funds private")]),_:1})]),e("li",null,[o(i,{to:"#pseudonyms-protect-your-identity-in-bitcoin"},{default:n(()=>[t("Pseudonyms protect your identity in Bitcoin")]),_:1})]),e("li",null,[o(i,{to:"#how-bitcoin-empowers-anonymity"},{default:n(()=>[t("How Bitcoin empowers anonymity")]),_:1})]),e("li",null,[o(i,{to:"#privacy-through-pseudonymous-accounts"},{default:n(()=>[t("Privacy through pseudonymous accounts")]),_:1})]),e("li",null,[o(i,{to:"#threat-model"},{default:n(()=>[t("Threat model")]),_:1})])])]),v,e("p",null,[t("For details read the talk "),e("a",g,[t("Opsec for Hackers by grugq"),o(a)]),t(". The talk is aimed mostly at political activists who need privacy from governments, but the advice generally applies to all of us.")]),b])}const W=r(y,[["render",k],["__file","WhyFinancialPrivacy.html.vue"]]),x=JSON.parse('{"path":"/why-wasabi/WhyFinancialPrivacy.html","title":"Why Financial Privacy is Especially Important","lang":"en-US","frontmatter":{"title":"Why Financial Privacy is Especially Important","description":"An introduction to the positive and negative side of Privacy in Bitcoin today. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Why it is important to keep your funds private","slug":"why-it-is-important-to-keep-your-funds-private","link":"#why-it-is-important-to-keep-your-funds-private","children":[]},{"level":2,"title":"Pseudonyms protect your identity in Bitcoin","slug":"pseudonyms-protect-your-identity-in-bitcoin","link":"#pseudonyms-protect-your-identity-in-bitcoin","children":[]},{"level":2,"title":"How Bitcoin empowers anonymity","slug":"how-bitcoin-empowers-anonymity","link":"#how-bitcoin-empowers-anonymity","children":[]},{"level":2,"title":"Privacy through pseudonymous accounts","slug":"privacy-through-pseudonymous-accounts","link":"#privacy-through-pseudonymous-accounts","children":[]},{"level":2,"title":"Threat model","slug":"threat-model","link":"#threat-model","children":[]}],"git":{"updatedTime":1720425186000},"filePathRelative":"why-wasabi/WhyFinancialPrivacy.md"}');export{W as comp,x as data}; +import{_ as r,r as s,o as c,c as l,a as e,b as t,d as o,w as n,e as h}from"./app-CwImt2bI.js";const d="/InfographicWhyWasabi.png",y={},u=e("h1",{id:"why-financial-privacy-is-especially-important",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#why-financial-privacy-is-especially-important"},[e("span",null,"Why Financial Privacy is Especially Important")])],-1),p=e("blockquote",null,[e("p",null,"The possibility to be anonymous or pseudonymous relies on you not revealing any identifying information about yourself in connection with the bitcoin addresses you use. If you post your bitcoin address on the web, then you're associating that address and any transactions with it with the name you posted under. If you posted under a handle that you haven't associated with your real identity, then you're still pseudonymous. For greater privacy, it's best to use bitcoin addresses only once.")],-1),m={href:"https://bitcointalk.org/index.php?topic=8.msg34#msg34",target:"_blank",rel:"noopener noreferrer"},f=e("p",null,[e("img",{src:d,alt:"Gaining privacy with Wasabi Wallet for Bitcoin transactions",title:"Wasabi Wallet infographic"})],-1),w={class:"table-of-contents"},v=h('

    Why it is important to keep your funds private

    One of the apparent contradictions of Bitcoin is the notion that your transactions can be private but have a public transaction record.

    As a financial system, Bitcoin functions completely differently from the established banking network. Bitcoin allows you to store funds yourself, without the need for a third party and therefore places the burden on you of keeping said funds secure and accessible.

    While opening an account with a traditional bank or other financial institution requires significant cost and effort, creating a Bitcoin wallet is quick and easy to do on your home computer. This speedy process makes it possible to create hundreds of separate wallets if you wish.

    Two aspects —in particular privacy and identity— function very differently with Bitcoin than in the legacy financial system.

    Pseudonyms protect your identity in Bitcoin

    A bank account, PayPal account, or credit card is always tied to a real identity, making it difficult for many people to open one. Bitcoin doesn't require any identity to be part of this network.

    Being able to use the internet anonymously or pseudonymously is the only way for many people to truly be themselves. Hundreds of millions of people around the globe are not accepted in their societies for reasons they cannot control.

    Maintaining an identity with a large following might require paid services such as blogs, logo designs, stock photos, VPNs, or translations. Without the ability to pay for these services anonymously, you would be forced to reveal your true identity in order to maintain your pseudonym situation. This clearly makes no sense and has potentially dangerous ramifications.

    How Bitcoin empowers anonymity

    Bitcoin is an important, empowering technology. Using Bitcoin protects your right to remain anonymous on the internet. It allows anonymous or pseudonymous fundraising. Groups can collectively control Bitcoin accounts and choose to either hide or reveal financial information at will.

    There are many positive reasons for a private and secure banking system like Bitcoin.

    For example, a workers' rights group could raise funds with Bitcoin. The money could be used for servers, flyers, remote helpers… and all without tying any transaction to the real identities of the volunteers.

    Likewise, a domestic abuse victim might use Bitcoin to securely stack away funds to prepare for an independent life.

    Privacy through pseudonymous accounts

    Privacy in traditional banking is guaranteed by the institutions that make up the system, such as banks, credit card companies, and governments. They (try to) ensure that your bank balance stays a secret. This puts them in a powerful position, where only they have complete oversight as to what is going on.

    In the Bitcoin ecosystem, everyone can see the history and balance of every address, but they cannot necessarily see who controls it. All addresses and transactions are recorded in Bitcoin's publicly distributed database, the blockchain. The addresses do not have names or IP addresses attached to them, so it is not always possible to know which transaction belongs to which individual.

    Threat model

    When considering privacy you need to think about exactly who you're hiding from. You must examine how a hypothetical adversary could spy on you, what kind of information is most important to you and which technology you need to use to protect your privacy. The kind of behaviour needed to protect your privacy therefore depends on your threat model.

    Newcomers to privacy often think that they can simply download some software and all their privacy concerns will be solved. This is not so. Privacy requires a change in behaviour, however slight. For example, imagine if you had a perfectly private internet where who you're communicating with and what you say are completely private. You could still use this to communicate with a social media website to write your real name, upload a selfie and talk about what you're doing right now. Anybody on the internet could view that information so your privacy would be ruined even though you were using perfectly private technology.

    ',21),g={href:"https://www.slideshare.net/grugq/opsec-for-hackers",target:"_blank",rel:"noopener noreferrer"},b=e("p",null,"Most of the time plausible deniability is not good enough because lots of spying methods only need to work on a statistical level (e.g. targeted advertising).",-1);function k(_,B){const a=s("ExternalLinkIcon"),i=s("router-link");return c(),l("div",null,[u,p,e("p",null,[t("By Satoshi Nakamoto in "),e("a",m,[t("How anonymous are bitcoins? - Bitcointalk"),o(a)])]),f,e("nav",w,[e("ul",null,[e("li",null,[o(i,{to:"#why-it-is-important-to-keep-your-funds-private"},{default:n(()=>[t("Why it is important to keep your funds private")]),_:1})]),e("li",null,[o(i,{to:"#pseudonyms-protect-your-identity-in-bitcoin"},{default:n(()=>[t("Pseudonyms protect your identity in Bitcoin")]),_:1})]),e("li",null,[o(i,{to:"#how-bitcoin-empowers-anonymity"},{default:n(()=>[t("How Bitcoin empowers anonymity")]),_:1})]),e("li",null,[o(i,{to:"#privacy-through-pseudonymous-accounts"},{default:n(()=>[t("Privacy through pseudonymous accounts")]),_:1})]),e("li",null,[o(i,{to:"#threat-model"},{default:n(()=>[t("Threat model")]),_:1})])])]),v,e("p",null,[t("For details read the talk "),e("a",g,[t("Opsec for Hackers by grugq"),o(a)]),t(". The talk is aimed mostly at political activists who need privacy from governments, but the advice generally applies to all of us.")]),b])}const W=r(y,[["render",k],["__file","WhyFinancialPrivacy.html.vue"]]),x=JSON.parse('{"path":"/why-wasabi/WhyFinancialPrivacy.html","title":"Why Financial Privacy is Especially Important","lang":"en-US","frontmatter":{"title":"Why Financial Privacy is Especially Important","description":"An introduction to the positive and negative side of Privacy in Bitcoin today. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Why it is important to keep your funds private","slug":"why-it-is-important-to-keep-your-funds-private","link":"#why-it-is-important-to-keep-your-funds-private","children":[]},{"level":2,"title":"Pseudonyms protect your identity in Bitcoin","slug":"pseudonyms-protect-your-identity-in-bitcoin","link":"#pseudonyms-protect-your-identity-in-bitcoin","children":[]},{"level":2,"title":"How Bitcoin empowers anonymity","slug":"how-bitcoin-empowers-anonymity","link":"#how-bitcoin-empowers-anonymity","children":[]},{"level":2,"title":"Privacy through pseudonymous accounts","slug":"privacy-through-pseudonymous-accounts","link":"#privacy-through-pseudonymous-accounts","children":[]},{"level":2,"title":"Threat model","slug":"threat-model","link":"#threat-model","children":[]}],"git":{"updatedTime":1720425980000},"filePathRelative":"why-wasabi/WhyFinancialPrivacy.md"}');export{W as comp,x as data}; diff --git a/assets/WhyPrivacyImportant.html-BVdMCAaf.js b/assets/WhyPrivacyImportant.html-BCWac2YZ.js similarity index 98% rename from assets/WhyPrivacyImportant.html-BVdMCAaf.js rename to assets/WhyPrivacyImportant.html-BCWac2YZ.js index 5fe7bd334..42b4776cf 100644 --- a/assets/WhyPrivacyImportant.html-BVdMCAaf.js +++ b/assets/WhyPrivacyImportant.html-BCWac2YZ.js @@ -1 +1 @@ -import{_ as s}from"./Logo_without_text_with_bg_dark_with_yt-D8lqXhN0.js";import{_ as l,r,o as h,c as d,a as e,d as o,w as i,b as t}from"./app-3S7gIoGc.js";const c={},u=e("h1",{id:"why-privacy-is-important",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#why-privacy-is-important"},[e("span",null,"Why Privacy is Important")])],-1),p=e("blockquote",null,[e("p",null,"It's not that I have something to hide. It's that I have nothing to share.")],-1),y=e("p",null,"Privacy is the selective revealing of your Self to your peers. You have many thoughts in your mind which you choose to never tell anyone, and many of your actions are never witnessed by another person. The ability to keep a secret is an essential part of the human experience.",-1),m=e("ul",null,[e("li",null,"Why do you draw the curtains at night?"),e("li",null,"Why do you close the door when in the shower?"),e("li",null,"Why do you send your love letters only to your spouse?")],-1),w={href:"https://youtu.be/laem7G6LPAM",target:"_blank",rel:"noopener noreferrer"},g=e("img",{src:s,alt:"Watch the video"},null,-1),_=e("p",null,"Economic trade of goods and services is based on mutual beneficial voluntary action. But when an outside authority demands that the peers reveal the details of their exchange, then they must beg for permission of every act. Yet individuals can use the tools of self-defense at their disposal to regain their sovereignty.",-1),v=e("blockquote",null,[e("p",null,"Without financial privacy, there is no human dignity.")],-1),f={class:"table-of-contents"},b=e("h2",{id:"privacy-i-don-t-have-anything-to-hide",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#privacy-i-don-t-have-anything-to-hide"},[e("span",null,"Privacy? I don't have anything to hide")])],-1),k={href:"https://www.ted.com/talks/glenn_greenwald_why_privacy_matters",target:"_blank",rel:"noopener noreferrer"},I={href:"https://github.com/cryptoseb/CryptoPaper#let-me-explain-further",target:"_blank",rel:"noopener noreferrer"},x=e("h2",{id:"read-also",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#read-also"},[e("span",null,"Read also")])],-1),W={href:"https://en.wikipedia.org/wiki/Nothing_to_hide_argument",target:"_blank",rel:"noopener noreferrer"},P={href:"https://www.reddit.com/r/privacy/comments/3hynvp/how_do_you_counter_the_i_have_nothing_to_hide/",target:"_blank",rel:"noopener noreferrer"},q={href:"https://papers.ssrn.com/sol3/papers.cfm?abstract_id=998565",target:"_blank",rel:"noopener noreferrer"},T=e("h2",{id:"quotes",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#quotes"},[e("span",null,"Quotes")])],-1),N={href:"https://www.reddit.com/r/IAmA/comments/36ru89/just_days_left_to_kill_mass_surveillance_under/crglgh2",target:"_blank",rel:"noopener noreferrer"},E={href:"https://www.theguardian.com/world/2013/jun/09/nsa-whistleblower-edward-snowden-why",target:"_blank",rel:"noopener noreferrer"},S={href:"https://www.huffingtonpost.com/2014/06/20/glenn-greenwald-privacy_n_5509704.html",target:"_blank",rel:"noopener noreferrer"},A=e("iframe",{src:"https://anchor.fm/podcast-8f267c0/embed/episodes/Privacy-Matters-with-Max-Hillebrand-BEC008-e3e0qt/a-abhd5q",height:"102px",width:"400px",frameborder:"0",scrolling:"no"},null,-1);function G(j,B){const n=r("ExternalLinkIcon"),a=r("router-link");return h(),d("div",null,[u,p,y,m,e("p",null,[e("a",w,[g,o(n)])]),_,v,e("nav",f,[e("ul",null,[e("li",null,[o(a,{to:"#privacy-i-don-t-have-anything-to-hide"},{default:i(()=>[t("Privacy? I don't have anything to hide")]),_:1})]),e("li",null,[o(a,{to:"#read-also"},{default:i(()=>[t("Read also")]),_:1})]),e("li",null,[o(a,{to:"#quotes"},{default:i(()=>[t("Quotes")]),_:1})])])]),b,e("blockquote",null,[e("p",null,[t(`Over the last 16 months, as I've debated this issue around the world, every single time somebody has said to me, "I don't really worry about invasions of privacy because I don't have anything to hide." I always say the same thing to them. I get out a pen, I write down my email address. I say, "Here's my email address. What I want you to do when you get home is email me the passwords to all of your email accounts, not just the nice, respectable work one in your name, but all of them, because I want to be able to just troll through what it is you're doing online, read what I want to read and publish whatever I find interesting. After all, if you're not a bad person, if you're doing nothing wrong, you should have nothing to hide." Not a single person has taken me up on that offer. - Glenn Greenwald in `),e("a",k,[t("Why privacy matters - TED Talk"),o(n)])])]),e("blockquote",null,[e("p",null,[t("The primary reason for window curtains in our house, is to stop people from being able to see in. The reason we don’t want them to see in is because we consider much of what we do inside our homes to be private. Whether that be having dinner at the table, watching a movie with your kids, or even engaging in intimate or sexual acts with your partner. None of these things are illegal by any means but even knowing this, we still keep the curtains and blinds on our windows. We clearly have this strong desire for privacy when it comes to our personal life and the public. - Joshua in "),e("a",I,[t("The Crypto Paper"),o(n)])])]),x,e("ul",null,[e("li",null,[e("a",W,[t("Nothing to hide argument (Wikipedia)"),o(n)])]),e("li",null,[e("a",P,[t('How do you counter the "I have nothing to hide?" argument? (reddit.com)'),o(n)])]),e("li",null,[e("a",q,[t("'I've Got Nothing to Hide' and Other Misunderstandings of Privacy (Daniel J. Solove - San Diego Law Review)"),o(n)])])]),T,e("blockquote",null,[e("p",null,[t("Arguing that you don't care about the right to privacy because you have nothing to hide is no different than saying you don't care about free speech because you have nothing to say. - Edward Snowden on "),e("a",N,[t("Reddit"),o(n)])])]),e("blockquote",null,[e("p",null,[t("The NSA has built an infrastructure that allows it to intercept almost everything. With this capability, the vast majority of human communications are automatically ingested without targeting. If I wanted to see your emails or your wife's phone, all I have to do is use intercepts. I can get your emails, passwords, phone records, credit cards. I don't want to live in a society that does these sort of things... I do not want to live in a world where everything I do and say is recorded. That is not something I am willing to support or live under. - Edward Snowden in "),e("a",E,[t("The Guardian"),o(n)])])]),e("blockquote",null,[e("p",null,[t("We all need places where we can go to explore without the judgmental eyes of other people being cast upon us, only in a realm where we're not being watched can we really test the limits of who we want to be. It's really in the private realm where dissent, creativity and personal exploration lie. - Glenn Greenwald in "),e("a",S,[t("Huffington Post"),o(n)])])]),A])}const H=l(c,[["render",G],["__file","WhyPrivacyImportant.html.vue"]]),L=JSON.parse(`{"path":"/why-wasabi/WhyPrivacyImportant.html","title":"Why Privacy is Important","lang":"en-US","frontmatter":{"title":"Why Privacy is Important","description":"An explanation of why Privacy is a fundamental human right, and why financial privacy is worth fighting for. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Privacy? I don't have anything to hide","slug":"privacy-i-don-t-have-anything-to-hide","link":"#privacy-i-don-t-have-anything-to-hide","children":[]},{"level":2,"title":"Read also","slug":"read-also","link":"#read-also","children":[]},{"level":2,"title":"Quotes","slug":"quotes","link":"#quotes","children":[]}],"git":{"updatedTime":1720425186000},"filePathRelative":"why-wasabi/WhyPrivacyImportant.md"}`);export{H as comp,L as data}; +import{_ as s}from"./Logo_without_text_with_bg_dark_with_yt-D8lqXhN0.js";import{_ as l,r,o as h,c as d,a as e,d as o,w as i,b as t}from"./app-CwImt2bI.js";const c={},u=e("h1",{id:"why-privacy-is-important",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#why-privacy-is-important"},[e("span",null,"Why Privacy is Important")])],-1),p=e("blockquote",null,[e("p",null,"It's not that I have something to hide. It's that I have nothing to share.")],-1),y=e("p",null,"Privacy is the selective revealing of your Self to your peers. You have many thoughts in your mind which you choose to never tell anyone, and many of your actions are never witnessed by another person. The ability to keep a secret is an essential part of the human experience.",-1),m=e("ul",null,[e("li",null,"Why do you draw the curtains at night?"),e("li",null,"Why do you close the door when in the shower?"),e("li",null,"Why do you send your love letters only to your spouse?")],-1),w={href:"https://youtu.be/laem7G6LPAM",target:"_blank",rel:"noopener noreferrer"},g=e("img",{src:s,alt:"Watch the video"},null,-1),_=e("p",null,"Economic trade of goods and services is based on mutual beneficial voluntary action. But when an outside authority demands that the peers reveal the details of their exchange, then they must beg for permission of every act. Yet individuals can use the tools of self-defense at their disposal to regain their sovereignty.",-1),v=e("blockquote",null,[e("p",null,"Without financial privacy, there is no human dignity.")],-1),f={class:"table-of-contents"},b=e("h2",{id:"privacy-i-don-t-have-anything-to-hide",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#privacy-i-don-t-have-anything-to-hide"},[e("span",null,"Privacy? I don't have anything to hide")])],-1),k={href:"https://www.ted.com/talks/glenn_greenwald_why_privacy_matters",target:"_blank",rel:"noopener noreferrer"},I={href:"https://github.com/cryptoseb/CryptoPaper#let-me-explain-further",target:"_blank",rel:"noopener noreferrer"},x=e("h2",{id:"read-also",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#read-also"},[e("span",null,"Read also")])],-1),W={href:"https://en.wikipedia.org/wiki/Nothing_to_hide_argument",target:"_blank",rel:"noopener noreferrer"},P={href:"https://www.reddit.com/r/privacy/comments/3hynvp/how_do_you_counter_the_i_have_nothing_to_hide/",target:"_blank",rel:"noopener noreferrer"},q={href:"https://papers.ssrn.com/sol3/papers.cfm?abstract_id=998565",target:"_blank",rel:"noopener noreferrer"},T=e("h2",{id:"quotes",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#quotes"},[e("span",null,"Quotes")])],-1),N={href:"https://www.reddit.com/r/IAmA/comments/36ru89/just_days_left_to_kill_mass_surveillance_under/crglgh2",target:"_blank",rel:"noopener noreferrer"},E={href:"https://www.theguardian.com/world/2013/jun/09/nsa-whistleblower-edward-snowden-why",target:"_blank",rel:"noopener noreferrer"},S={href:"https://www.huffingtonpost.com/2014/06/20/glenn-greenwald-privacy_n_5509704.html",target:"_blank",rel:"noopener noreferrer"},A=e("iframe",{src:"https://anchor.fm/podcast-8f267c0/embed/episodes/Privacy-Matters-with-Max-Hillebrand-BEC008-e3e0qt/a-abhd5q",height:"102px",width:"400px",frameborder:"0",scrolling:"no"},null,-1);function G(j,B){const n=r("ExternalLinkIcon"),a=r("router-link");return h(),d("div",null,[u,p,y,m,e("p",null,[e("a",w,[g,o(n)])]),_,v,e("nav",f,[e("ul",null,[e("li",null,[o(a,{to:"#privacy-i-don-t-have-anything-to-hide"},{default:i(()=>[t("Privacy? I don't have anything to hide")]),_:1})]),e("li",null,[o(a,{to:"#read-also"},{default:i(()=>[t("Read also")]),_:1})]),e("li",null,[o(a,{to:"#quotes"},{default:i(()=>[t("Quotes")]),_:1})])])]),b,e("blockquote",null,[e("p",null,[t(`Over the last 16 months, as I've debated this issue around the world, every single time somebody has said to me, "I don't really worry about invasions of privacy because I don't have anything to hide." I always say the same thing to them. I get out a pen, I write down my email address. I say, "Here's my email address. What I want you to do when you get home is email me the passwords to all of your email accounts, not just the nice, respectable work one in your name, but all of them, because I want to be able to just troll through what it is you're doing online, read what I want to read and publish whatever I find interesting. After all, if you're not a bad person, if you're doing nothing wrong, you should have nothing to hide." Not a single person has taken me up on that offer. - Glenn Greenwald in `),e("a",k,[t("Why privacy matters - TED Talk"),o(n)])])]),e("blockquote",null,[e("p",null,[t("The primary reason for window curtains in our house, is to stop people from being able to see in. The reason we don’t want them to see in is because we consider much of what we do inside our homes to be private. Whether that be having dinner at the table, watching a movie with your kids, or even engaging in intimate or sexual acts with your partner. None of these things are illegal by any means but even knowing this, we still keep the curtains and blinds on our windows. We clearly have this strong desire for privacy when it comes to our personal life and the public. - Joshua in "),e("a",I,[t("The Crypto Paper"),o(n)])])]),x,e("ul",null,[e("li",null,[e("a",W,[t("Nothing to hide argument (Wikipedia)"),o(n)])]),e("li",null,[e("a",P,[t('How do you counter the "I have nothing to hide?" argument? (reddit.com)'),o(n)])]),e("li",null,[e("a",q,[t("'I've Got Nothing to Hide' and Other Misunderstandings of Privacy (Daniel J. Solove - San Diego Law Review)"),o(n)])])]),T,e("blockquote",null,[e("p",null,[t("Arguing that you don't care about the right to privacy because you have nothing to hide is no different than saying you don't care about free speech because you have nothing to say. - Edward Snowden on "),e("a",N,[t("Reddit"),o(n)])])]),e("blockquote",null,[e("p",null,[t("The NSA has built an infrastructure that allows it to intercept almost everything. With this capability, the vast majority of human communications are automatically ingested without targeting. If I wanted to see your emails or your wife's phone, all I have to do is use intercepts. I can get your emails, passwords, phone records, credit cards. I don't want to live in a society that does these sort of things... I do not want to live in a world where everything I do and say is recorded. That is not something I am willing to support or live under. - Edward Snowden in "),e("a",E,[t("The Guardian"),o(n)])])]),e("blockquote",null,[e("p",null,[t("We all need places where we can go to explore without the judgmental eyes of other people being cast upon us, only in a realm where we're not being watched can we really test the limits of who we want to be. It's really in the private realm where dissent, creativity and personal exploration lie. - Glenn Greenwald in "),e("a",S,[t("Huffington Post"),o(n)])])]),A])}const H=l(c,[["render",G],["__file","WhyPrivacyImportant.html.vue"]]),L=JSON.parse(`{"path":"/why-wasabi/WhyPrivacyImportant.html","title":"Why Privacy is Important","lang":"en-US","frontmatter":{"title":"Why Privacy is Important","description":"An explanation of why Privacy is a fundamental human right, and why financial privacy is worth fighting for. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Privacy? I don't have anything to hide","slug":"privacy-i-don-t-have-anything-to-hide","link":"#privacy-i-don-t-have-anything-to-hide","children":[]},{"level":2,"title":"Read also","slug":"read-also","link":"#read-also","children":[]},{"level":2,"title":"Quotes","slug":"quotes","link":"#quotes","children":[]}],"git":{"updatedTime":1720425980000},"filePathRelative":"why-wasabi/WhyPrivacyImportant.md"}`);export{H as comp,L as data}; diff --git a/assets/app-3S7gIoGc.js b/assets/app-CwImt2bI.js similarity index 98% rename from assets/app-3S7gIoGc.js rename to assets/app-CwImt2bI.js index 25571fd19..2bd78613e 100644 --- a/assets/app-3S7gIoGc.js +++ b/assets/app-CwImt2bI.js @@ -14,7 +14,7 @@ * @vue/runtime-dom v3.4.19 * (c) 2018-present Yuxi (Evan) You and Vue contributors * @license MIT -**/const lu="http://www.w3.org/2000/svg",ou="http://www.w3.org/1998/Math/MathML",At=typeof document<"u"?document:null,Ho=At&&At.createElement("template"),su={insert:(e,t,n)=>{t.insertBefore(e,n||null)},remove:e=>{const t=e.parentNode;t&&t.removeChild(e)},createElement:(e,t,n,i)=>{const l=t==="svg"?At.createElementNS(lu,e):t==="mathml"?At.createElementNS(ou,e):At.createElement(e,n?{is:n}:void 0);return e==="select"&&i&&i.multiple!=null&&l.setAttribute("multiple",i.multiple),l},createText:e=>At.createTextNode(e),createComment:e=>At.createComment(e),setText:(e,t)=>{e.nodeValue=t},setElementText:(e,t)=>{e.textContent=t},parentNode:e=>e.parentNode,nextSibling:e=>e.nextSibling,querySelector:e=>At.querySelector(e),setScopeId(e,t){e.setAttribute(t,"")},insertStaticContent(e,t,n,i,l,o){const s=n?n.previousSibling:t.lastChild;if(l&&(l===o||l.nextSibling))for(;t.insertBefore(l.cloneNode(!0),n),!(l===o||!(l=l.nextSibling)););else{Ho.innerHTML=i==="svg"?`${e}`:i==="mathml"?`${e}`:e;const r=Ho.content;if(i==="svg"||i==="mathml"){const a=r.firstChild;for(;a.firstChild;)r.appendChild(a.firstChild);r.removeChild(a)}t.insertBefore(r,n)}return[s?s.nextSibling:t.firstChild,n?n.previousSibling:t.lastChild]}},xt="transition",En="animation",Dn=Symbol("_vtc"),ei=(e,{slots:t})=>ce(hc,ru(e),t);ei.displayName="Transition";const _r={name:String,type:String,css:{type:Boolean,default:!0},duration:[String,Number,Object],enterFromClass:String,enterActiveClass:String,enterToClass:String,appearFromClass:String,appearActiveClass:String,appearToClass:String,leaveFromClass:String,leaveActiveClass:String,leaveToClass:String};ei.props=Ae({},ir,_r);const Dt=(e,t=[])=>{ne(e)?e.forEach(n=>n(...t)):e&&e(...t)},Fo=e=>e?ne(e)?e.some(t=>t.length>1):e.length>1:!1;function ru(e){const t={};for(const C in e)C in _r||(t[C]=e[C]);if(e.css===!1)return t;const{name:n="v",type:i,duration:l,enterFromClass:o=`${n}-enter-from`,enterActiveClass:s=`${n}-enter-active`,enterToClass:r=`${n}-enter-to`,appearFromClass:a=o,appearActiveClass:c=s,appearToClass:u=r,leaveFromClass:d=`${n}-leave-from`,leaveActiveClass:h=`${n}-leave-active`,leaveToClass:g=`${n}-leave-to`}=e,m=au(l),y=m&&m[0],k=m&&m[1],{onBeforeEnter:x,onEnter:I,onEnterCancelled:v,onLeave:_,onLeaveCancelled:$,onBeforeAppear:W=x,onAppear:F=I,onAppearCancelled:b=v}=t,M=(C,H,te)=>{Nt(C,H?u:r),Nt(C,H?c:s),te&&te()},P=(C,H)=>{C._isLeaving=!1,Nt(C,d),Nt(C,g),Nt(C,h),H&&H()},q=C=>(H,te)=>{const le=C?F:I,T=()=>M(H,C,te);Dt(le,[H,T]),Mo(()=>{Nt(H,C?a:o),St(H,C?u:r),Fo(le)||Bo(H,i,y,T)})};return Ae(t,{onBeforeEnter(C){Dt(x,[C]),St(C,o),St(C,s)},onBeforeAppear(C){Dt(W,[C]),St(C,a),St(C,c)},onEnter:q(!1),onAppear:q(!0),onLeave(C,H){C._isLeaving=!0;const te=()=>P(C,H);St(C,d),du(),St(C,h),Mo(()=>{C._isLeaving&&(Nt(C,d),St(C,g),Fo(_)||Bo(C,i,k,te))}),Dt(_,[C,te])},onEnterCancelled(C){M(C,!1),Dt(v,[C])},onAppearCancelled(C){M(C,!0),Dt(b,[C])},onLeaveCancelled(C){P(C),Dt($,[C])}})}function au(e){if(e==null)return null;if(_e(e))return[il(e.enter),il(e.leave)];{const t=il(e);return[t,t]}}function il(e){return ua(e)}function St(e,t){t.split(/\s+/).forEach(n=>n&&e.classList.add(n)),(e[Dn]||(e[Dn]=new Set)).add(t)}function Nt(e,t){t.split(/\s+/).forEach(i=>i&&e.classList.remove(i));const n=e[Dn];n&&(n.delete(t),n.size||(e[Dn]=void 0))}function Mo(e){requestAnimationFrame(()=>{requestAnimationFrame(e)})}let cu=0;function Bo(e,t,n,i){const l=e._endId=++cu,o=()=>{l===e._endId&&i()};if(n)return setTimeout(o,n);const{type:s,timeout:r,propCount:a}=uu(e,t);if(!s)return i();const c=s+"end";let u=0;const d=()=>{e.removeEventListener(c,h),o()},h=g=>{g.target===e&&++u>=a&&d()};setTimeout(()=>{u(n[m]||"").split(", "),l=i(`${xt}Delay`),o=i(`${xt}Duration`),s=$o(l,o),r=i(`${En}Delay`),a=i(`${En}Duration`),c=$o(r,a);let u=null,d=0,h=0;t===xt?s>0&&(u=xt,d=s,h=o.length):t===En?c>0&&(u=En,d=c,h=a.length):(d=Math.max(s,c),u=d>0?s>c?xt:En:null,h=u?u===xt?o.length:a.length:0);const g=u===xt&&/\b(transform|all)(,|$)/.test(i(`${xt}Property`).toString());return{type:u,timeout:d,propCount:h,hasTransform:g}}function $o(e,t){for(;e.lengthDo(n)+Do(e[i])))}function Do(e){return e==="auto"?0:Number(e.slice(0,-1).replace(",","."))*1e3}function du(){return document.body.offsetHeight}function hu(e,t,n){const i=e[Dn];i&&(t=(t?[t,...i]:[...i]).join(" ")),t==null?e.removeAttribute("class"):n?e.setAttribute("class",t):e.className=t}const Nn=Symbol("_vod"),Pi={beforeMount(e,{value:t},{transition:n}){e[Nn]=e.style.display==="none"?"":e.style.display,n&&t?n.beforeEnter(e):xn(e,t)},mounted(e,{value:t},{transition:n}){n&&t&&n.enter(e)},updated(e,{value:t,oldValue:n},{transition:i}){!t==!n&&(e.style.display===e[Nn]||!t)||(i?t?(i.beforeEnter(e),xn(e,!0),i.enter(e)):i.leave(e,()=>{xn(e,!1)}):xn(e,t))},beforeUnmount(e,{value:t}){xn(e,t)}};function xn(e,t){e.style.display=t?e[Nn]:"none"}const fu=Symbol(""),pu=/(^|;)\s*display\s*:/;function gu(e,t,n){const i=e.style,l=Le(n),o=i.display;let s=!1;if(n&&!l){if(t&&!Le(t))for(const r in t)n[r]==null&&Sl(i,r,"");for(const r in n)r==="display"&&(s=!0),Sl(i,r,n[r])}else if(l){if(t!==n){const r=i[fu];r&&(n+=";"+r),i.cssText=n,s=pu.test(n)}}else t&&e.removeAttribute("style");Nn in e&&(e[Nn]=s?i.display:"",i.display=o)}const No=/\s*!important$/;function Sl(e,t,n){if(ne(n))n.forEach(i=>Sl(e,t,i));else if(n==null&&(n=""),t.startsWith("--"))e.setProperty(t,n);else{const i=mu(e,t);No.test(n)?e.setProperty(Zt(i),n.replace(No,""),"important"):e[i]=n}}const zo=["Webkit","Moz","ms"],ll={};function mu(e,t){const n=ll[t];if(n)return n;let i=nt(t);if(i!=="filter"&&i in e)return ll[t]=i;i=qn(i);for(let l=0;lol||(Cu.then(()=>ol=0),ol=Date.now());function xu(e,t){const n=i=>{if(!i._vts)i._vts=Date.now();else if(i._vts<=n.attached)return;tt(Su(i,n.value),t,5,[i])};return n.value=e,n.attached=Eu(),n}function Su(e,t){if(ne(t)){const n=e.stopImmediatePropagation;return e.stopImmediatePropagation=()=>{n.call(e),e._stopped=!0},t.map(i=>l=>!l._stopped&&i&&i(l))}else return t}const qo=e=>e.charCodeAt(0)===111&&e.charCodeAt(1)===110&&e.charCodeAt(2)>96&&e.charCodeAt(2)<123,Lu=(e,t,n,i,l,o,s,r,a)=>{const c=l==="svg";t==="class"?hu(e,i,c):t==="style"?gu(e,n,i):Gn(t)?Wl(t)||ku(e,t,n,i,s):(t[0]==="."?(t=t.slice(1),!0):t[0]==="^"?(t=t.slice(1),!1):Iu(e,t,i,c))?bu(e,t,i,o,s,r,a):(t==="true-value"?e._trueValue=i:t==="false-value"&&(e._falseValue=i),vu(e,t,i,c))};function Iu(e,t,n,i){if(i)return!!(t==="innerHTML"||t==="textContent"||t in e&&qo(t)&&se(n));if(t==="spellcheck"||t==="draggable"||t==="translate"||t==="form"||t==="list"&&e.tagName==="INPUT"||t==="type"&&e.tagName==="TEXTAREA")return!1;if(t==="width"||t==="height"){const l=e.tagName;if(l==="IMG"||l==="VIDEO"||l==="CANVAS"||l==="SOURCE")return!1}return qo(t)&&Le(n)?!1:t in e}const Pu={esc:"escape",space:" ",up:"arrow-up",left:"arrow-left",right:"arrow-right",down:"arrow-down",delete:"backspace"},Au=(e,t)=>{const n=e._withKeys||(e._withKeys={}),i=t.join(".");return n[i]||(n[i]=l=>{if(!("key"in l))return;const o=Zt(l.key);if(t.some(s=>s===o||Pu[s]===o))return e(l)})},Tu=Ae({patchProp:Lu},su);let sl,Ko=!1;function Wu(){return sl=Ko?sl:$c(Tu),Ko=!0,sl}const Ru=(...e)=>{const t=Wu().createApp(...e),{mount:n}=t;return t.mount=i=>{const l=ju(i);if(l)return n(l,!0,Ou(l))},t};function Ou(e){if(e instanceof SVGElement)return"svg";if(typeof MathMLElement=="function"&&e instanceof MathMLElement)return"mathml"}function ju(e){return Le(e)?document.querySelector(e):e}var Hu=["link","meta","script","style","noscript","template"],Fu=["title","base"],Mu=([e,t,n])=>Fu.includes(e)?e:Hu.includes(e)?e==="meta"&&t.name?`${e}.${t.name}`:e==="template"&&t.id?`${e}.${t.id}`:JSON.stringify([e,Object.entries(t).map(([i,l])=>typeof l=="boolean"?l?[i,""]:null:[i,l]).filter(i=>i!=null).sort(([i],[l])=>i.localeCompare(l)),n]):null,Bu=e=>{const t=new Set,n=[];return e.forEach(i=>{const l=Mu(i);l&&!t.has(l)&&(t.add(l),n.push(i))}),n},ti=e=>/^(https?:)?\/\//.test(e),$u=e=>/^[a-z][a-z0-9+.-]*:/.test(e),Kl=e=>Object.prototype.toString.call(e)==="[object Object]",Du=e=>{const[t,...n]=e.split(/(\?|#)/);if(!t||t.endsWith("/"))return e;let i=t.replace(/(^|\/)README.md$/i,"$1index.html");return i.endsWith(".md")?i=i.substring(0,i.length-3)+".html":i.endsWith(".html")||(i=i+".html"),i.endsWith("/index.html")&&(i=i.substring(0,i.length-10)),i+n.join("")},Cr=e=>e[e.length-1]==="/"?e.slice(0,-1):e,Er=e=>e[0]==="/"?e.slice(1):e,xr=(e,t)=>{const n=Object.keys(e).sort((i,l)=>{const o=l.split("/").length-i.split("/").length;return o!==0?o:l.length-i.length});for(const i of n)if(t.startsWith(i))return i;return"/"},dt=e=>typeof e=="string";const Nu="modulepreload",zu=function(e){return"/"+e},Qo={},ee=function(t,n,i){let l=Promise.resolve();return n&&n.length>0&&(document.getElementsByTagName("link"),l=Promise.all(n.map(o=>{if(o=zu(o),o in Qo)return;Qo[o]=!0;const s=o.endsWith(".css"),r=s?'[rel="stylesheet"]':"";if(document.querySelector(`link[href="${o}"]${r}`))return;const a=document.createElement("link");if(a.rel=s?"stylesheet":Nu,s||(a.as="script",a.crossOrigin=""),a.href=o,document.head.appendChild(a),s)return new Promise((c,u)=>{a.addEventListener("load",c),a.addEventListener("error",()=>u(new Error(`Unable to preload CSS for ${o}`)))})}))),l.then(()=>t()).catch(o=>{const s=new Event("vite:preloadError",{cancelable:!0});if(s.payload=o,window.dispatchEvent(s),!s.defaultPrevented)throw o})},Vu=JSON.parse("{}"),Uu=Object.fromEntries([["/",{loader:()=>ee(()=>import("./index.html-B57YoAW6.js"),__vite__mapDeps([])),meta:{title:""}}],["/FAQ/FAQ-Contribution.html",{loader:()=>ee(()=>import("./FAQ-Contribution.html-CJS80rgG.js"),__vite__mapDeps([])),meta:{title:"Contribution FAQ"}}],["/FAQ/FAQ-GeneralBitcoinPrivacy.html",{loader:()=>ee(()=>import("./FAQ-GeneralBitcoinPrivacy.html-AkZkt5So.js"),__vite__mapDeps([])),meta:{title:"Bitcoin Privacy FAQ"}}],["/FAQ/FAQ-Installation.html",{loader:()=>ee(()=>import("./FAQ-Installation.html-LTT39ng4.js"),__vite__mapDeps([0,1,2])),meta:{title:"Installation FAQ"}}],["/FAQ/FAQ-Introduction.html",{loader:()=>ee(()=>import("./FAQ-Introduction.html-D5iJx8Cs.js"),__vite__mapDeps([3,1])),meta:{title:"Introduction FAQ"}}],["/FAQ/FAQ-UseWasabi.html",{loader:()=>ee(()=>import("./FAQ-UseWasabi.html-noM30uxn.js"),__vite__mapDeps([4,5,6,7,8,9,10,11,1,12,13,14])),meta:{title:"Use of Wasabi FAQ"}}],["/FAQ/",{loader:()=>ee(()=>import("./index.html-Bwp9TkQs.js"),__vite__mapDeps([])),meta:{title:"Frequently Asked Questions"}}],["/building-wasabi/ContributionChecklist.html",{loader:()=>ee(()=>import("./ContributionChecklist.html-Drz65i8W.js"),__vite__mapDeps([])),meta:{title:"Contribution Checklist"}}],["/building-wasabi/LICENSE.html",{loader:()=>ee(()=>import("./LICENSE.html-CcYHu7n7.js"),__vite__mapDeps([])),meta:{title:"MIT License"}}],["/building-wasabi/",{loader:()=>ee(()=>import("./index.html-CuyL9paf.js"),__vite__mapDeps([])),meta:{title:"Building Wasabi"}}],["/building-wasabi/Security.html",{loader:()=>ee(()=>import("./Security.html-zR3z54mc.js"),__vite__mapDeps([])),meta:{title:"Security Policy"}}],["/getting-started/",{loader:()=>ee(()=>import("./index.html-C8GknQiE.js"),__vite__mapDeps([])),meta:{title:"Getting Started"}}],["/glossary/Glossary-GeneralBitcoin.html",{loader:()=>ee(()=>import("./Glossary-GeneralBitcoin.html-B-_tRKqz.js"),__vite__mapDeps([])),meta:{title:"Bitcoin in general"}}],["/glossary/Glossary-PrivacyWasabi.html",{loader:()=>ee(()=>import("./Glossary-PrivacyWasabi.html-BiXCt2At.js"),__vite__mapDeps([])),meta:{title:"Privacy and Wasabi"}}],["/glossary/",{loader:()=>ee(()=>import("./index.html-piASmjtj.js"),__vite__mapDeps([])),meta:{title:"Glossary"}}],["/using-wasabi/BIPs.html",{loader:()=>ee(()=>import("./BIPs.html-D5zJfk6V.js"),__vite__mapDeps([])),meta:{title:"Supported BIPs"}}],["/using-wasabi/BackupBestPractices.html",{loader:()=>ee(()=>import("./BackupBestPractices.html-O2Wi4N0t.js"),__vite__mapDeps([])),meta:{title:"Wasabi Backup Best Practices"}}],["/using-wasabi/BitcoinFullNode.html",{loader:()=>ee(()=>import("./BitcoinFullNode.html-BStS9Wl_.js"),__vite__mapDeps([15,13])),meta:{title:"Bitcoin Full Node"}}],["/using-wasabi/BuildSource.html",{loader:()=>ee(()=>import("./BuildSource.html-Dj6lYZQa.js"),__vite__mapDeps([])),meta:{title:"Build from source code"}}],["/using-wasabi/ChangeCoins.html",{loader:()=>ee(()=>import("./ChangeCoins.html-DN004OvY.js"),__vite__mapDeps([])),meta:{title:"Change Coins"}}],["/using-wasabi/CoinJoin.html",{loader:()=>ee(()=>import("./CoinJoin.html-Dh9ky-gL.js"),__vite__mapDeps([16,12,8])),meta:{title:"Coinjoin"}}],["/using-wasabi/ColdWasabi.html",{loader:()=>ee(()=>import("./ColdWasabi.html-DTuOXsd-.js"),__vite__mapDeps([])),meta:{title:"Hardware Wallet"}}],["/using-wasabi/Daemon.html",{loader:()=>ee(()=>import("./Daemon.html-C329pe91.js"),__vite__mapDeps([])),meta:{title:"Headless Wasabi Daemon"}}],["/using-wasabi/DeterministicBuild.html",{loader:()=>ee(()=>import("./DeterministicBuild.html-jKw4SlJ8.js"),__vite__mapDeps([])),meta:{title:"Deterministic Build"}}],["/using-wasabi/DiscreetMode.html",{loader:()=>ee(()=>import("./DiscreetMode.html-FvOse1pm.js"),__vite__mapDeps([17,14])),meta:{title:"Discreet Mode"}}],["/using-wasabi/ELI5.html",{loader:()=>ee(()=>import("./ELI5.html-DfDF-Qvi.js"),__vite__mapDeps([])),meta:{title:"Explain Wasabi like I'm 5"}}],["/using-wasabi/ExternalRestore.html",{loader:()=>ee(()=>import("./ExternalRestore.html-CRS-Huqd.js"),__vite__mapDeps([])),meta:{title:"Restoring Wasabi Wallet in Other Wallets"}}],["/using-wasabi/InstallPackage.html",{loader:()=>ee(()=>import("./InstallPackage.html-D4f2GNqt.js"),__vite__mapDeps([18,2,1])),meta:{title:"Install-package"}}],["/using-wasabi/PasswordBestPractices.html",{loader:()=>ee(()=>import("./PasswordBestPractices.html-BLh76ZwZ.js"),__vite__mapDeps([])),meta:{title:"Password Best Practices"}}],["/using-wasabi/PayJoin.html",{loader:()=>ee(()=>import("./PayJoin.html-CDKaUHzz.js"),__vite__mapDeps([])),meta:{title:"PayJoin"}}],["/using-wasabi/",{loader:()=>ee(()=>import("./index.html-CUUtnbsu.js"),__vite__mapDeps([])),meta:{title:"Using Wasabi"}}],["/using-wasabi/RPC.html",{loader:()=>ee(()=>import("./RPC.html-CWcUhsmq.js"),__vite__mapDeps([])),meta:{title:"RPC Interface"}}],["/using-wasabi/Receive.html",{loader:()=>ee(()=>import("./Receive.html-DJ-IChEN.js"),__vite__mapDeps([19,1,10])),meta:{title:"Receive"}}],["/using-wasabi/Send.html",{loader:()=>ee(()=>import("./Send.html-D0pe3AOm.js"),__vite__mapDeps([20,1,11,8])),meta:{title:"Send"}}],["/using-wasabi/StartupParameters.html",{loader:()=>ee(()=>import("./StartupParameters.html-DmpGxDRn.js"),__vite__mapDeps([])),meta:{title:"Starting Wasabi with parameters"}}],["/using-wasabi/Testnet.html",{loader:()=>ee(()=>import("./Testnet.html-p9vBqYtC.js"),__vite__mapDeps([])),meta:{title:"Testnet"}}],["/using-wasabi/WalletGeneration.html",{loader:()=>ee(()=>import("./WalletGeneration.html-tKnNedDb.js"),__vite__mapDeps([21,6,7,8])),meta:{title:"Wallet Generation"}}],["/using-wasabi/WalletLoad.html",{loader:()=>ee(()=>import("./WalletLoad.html-sLQIFgev.js"),__vite__mapDeps([22,9])),meta:{title:"Wallet Load"}}],["/using-wasabi/WalletRecovery.html",{loader:()=>ee(()=>import("./WalletRecovery.html-CvgB9Wgw.js"),__vite__mapDeps([23,5,6])),meta:{title:"Recover a Wallet"}}],["/using-wasabi/WasabiSetupVM.html",{loader:()=>ee(()=>import("./WasabiSetupVM.html-xF8KcB87.js"),__vite__mapDeps([])),meta:{title:"Wasabi Setup in Virtual Machines"}}],["/why-wasabi/AddressReuse.html",{loader:()=>ee(()=>import("./AddressReuse.html-DbG97EUQ.js"),__vite__mapDeps([])),meta:{title:"Address Reuse"}}],["/why-wasabi/Coins.html",{loader:()=>ee(()=>import("./Coins.html-Cskm5RN2.js"),__vite__mapDeps([])),meta:{title:"Coins"}}],["/why-wasabi/LegalConcern.html",{loader:()=>ee(()=>import("./LegalConcern.html-CCv43Rfj.js"),__vite__mapDeps([])),meta:{title:"CoinJoin Legal Concern"}}],["/why-wasabi/NetworkLevelPrivacy.html",{loader:()=>ee(()=>import("./NetworkLevelPrivacy.html-BkVkjp52.js"),__vite__mapDeps([24,1])),meta:{title:"Network-Level Privacy"}}],["/why-wasabi/",{loader:()=>ee(()=>import("./index.html-D5H6XWPL.js"),__vite__mapDeps([])),meta:{title:"Why Wasabi"}}],["/why-wasabi/TransactionGraph.html",{loader:()=>ee(()=>import("./TransactionGraph.html-5x7EW62O.js"),__vite__mapDeps([])),meta:{title:"Transaction Graph"}}],["/why-wasabi/TransactionSurveillanceCompanies.html",{loader:()=>ee(()=>import("./TransactionSurveillanceCompanies.html-rwuC602A.js"),__vite__mapDeps([])),meta:{title:"Transaction Surveillance Companies"}}],["/why-wasabi/WhyFinancialPrivacy.html",{loader:()=>ee(()=>import("./WhyFinancialPrivacy.html-BvkR2YhS.js"),__vite__mapDeps([])),meta:{title:"Why Financial Privacy is Especially Important"}}],["/why-wasabi/WhyPrivacyImportant.html",{loader:()=>ee(()=>import("./WhyPrivacyImportant.html-BVdMCAaf.js"),__vite__mapDeps([25,1])),meta:{title:"Why Privacy is Important"}}],["/404.html",{loader:()=>ee(()=>import("./404.html-CSa7Nz9_.js"),__vite__mapDeps([])),meta:{title:""}}]]);/*! +**/const lu="http://www.w3.org/2000/svg",ou="http://www.w3.org/1998/Math/MathML",At=typeof document<"u"?document:null,Ho=At&&At.createElement("template"),su={insert:(e,t,n)=>{t.insertBefore(e,n||null)},remove:e=>{const t=e.parentNode;t&&t.removeChild(e)},createElement:(e,t,n,i)=>{const l=t==="svg"?At.createElementNS(lu,e):t==="mathml"?At.createElementNS(ou,e):At.createElement(e,n?{is:n}:void 0);return e==="select"&&i&&i.multiple!=null&&l.setAttribute("multiple",i.multiple),l},createText:e=>At.createTextNode(e),createComment:e=>At.createComment(e),setText:(e,t)=>{e.nodeValue=t},setElementText:(e,t)=>{e.textContent=t},parentNode:e=>e.parentNode,nextSibling:e=>e.nextSibling,querySelector:e=>At.querySelector(e),setScopeId(e,t){e.setAttribute(t,"")},insertStaticContent(e,t,n,i,l,o){const s=n?n.previousSibling:t.lastChild;if(l&&(l===o||l.nextSibling))for(;t.insertBefore(l.cloneNode(!0),n),!(l===o||!(l=l.nextSibling)););else{Ho.innerHTML=i==="svg"?`${e}`:i==="mathml"?`${e}`:e;const r=Ho.content;if(i==="svg"||i==="mathml"){const a=r.firstChild;for(;a.firstChild;)r.appendChild(a.firstChild);r.removeChild(a)}t.insertBefore(r,n)}return[s?s.nextSibling:t.firstChild,n?n.previousSibling:t.lastChild]}},xt="transition",En="animation",Dn=Symbol("_vtc"),ei=(e,{slots:t})=>ce(hc,ru(e),t);ei.displayName="Transition";const _r={name:String,type:String,css:{type:Boolean,default:!0},duration:[String,Number,Object],enterFromClass:String,enterActiveClass:String,enterToClass:String,appearFromClass:String,appearActiveClass:String,appearToClass:String,leaveFromClass:String,leaveActiveClass:String,leaveToClass:String};ei.props=Ae({},ir,_r);const Dt=(e,t=[])=>{ne(e)?e.forEach(n=>n(...t)):e&&e(...t)},Fo=e=>e?ne(e)?e.some(t=>t.length>1):e.length>1:!1;function ru(e){const t={};for(const C in e)C in _r||(t[C]=e[C]);if(e.css===!1)return t;const{name:n="v",type:i,duration:l,enterFromClass:o=`${n}-enter-from`,enterActiveClass:s=`${n}-enter-active`,enterToClass:r=`${n}-enter-to`,appearFromClass:a=o,appearActiveClass:c=s,appearToClass:u=r,leaveFromClass:d=`${n}-leave-from`,leaveActiveClass:h=`${n}-leave-active`,leaveToClass:g=`${n}-leave-to`}=e,m=au(l),y=m&&m[0],k=m&&m[1],{onBeforeEnter:x,onEnter:I,onEnterCancelled:v,onLeave:_,onLeaveCancelled:$,onBeforeAppear:W=x,onAppear:F=I,onAppearCancelled:b=v}=t,M=(C,H,te)=>{Nt(C,H?u:r),Nt(C,H?c:s),te&&te()},P=(C,H)=>{C._isLeaving=!1,Nt(C,d),Nt(C,g),Nt(C,h),H&&H()},q=C=>(H,te)=>{const le=C?F:I,T=()=>M(H,C,te);Dt(le,[H,T]),Mo(()=>{Nt(H,C?a:o),St(H,C?u:r),Fo(le)||Bo(H,i,y,T)})};return Ae(t,{onBeforeEnter(C){Dt(x,[C]),St(C,o),St(C,s)},onBeforeAppear(C){Dt(W,[C]),St(C,a),St(C,c)},onEnter:q(!1),onAppear:q(!0),onLeave(C,H){C._isLeaving=!0;const te=()=>P(C,H);St(C,d),du(),St(C,h),Mo(()=>{C._isLeaving&&(Nt(C,d),St(C,g),Fo(_)||Bo(C,i,k,te))}),Dt(_,[C,te])},onEnterCancelled(C){M(C,!1),Dt(v,[C])},onAppearCancelled(C){M(C,!0),Dt(b,[C])},onLeaveCancelled(C){P(C),Dt($,[C])}})}function au(e){if(e==null)return null;if(_e(e))return[il(e.enter),il(e.leave)];{const t=il(e);return[t,t]}}function il(e){return ua(e)}function St(e,t){t.split(/\s+/).forEach(n=>n&&e.classList.add(n)),(e[Dn]||(e[Dn]=new Set)).add(t)}function Nt(e,t){t.split(/\s+/).forEach(i=>i&&e.classList.remove(i));const n=e[Dn];n&&(n.delete(t),n.size||(e[Dn]=void 0))}function Mo(e){requestAnimationFrame(()=>{requestAnimationFrame(e)})}let cu=0;function Bo(e,t,n,i){const l=e._endId=++cu,o=()=>{l===e._endId&&i()};if(n)return setTimeout(o,n);const{type:s,timeout:r,propCount:a}=uu(e,t);if(!s)return i();const c=s+"end";let u=0;const d=()=>{e.removeEventListener(c,h),o()},h=g=>{g.target===e&&++u>=a&&d()};setTimeout(()=>{u(n[m]||"").split(", "),l=i(`${xt}Delay`),o=i(`${xt}Duration`),s=$o(l,o),r=i(`${En}Delay`),a=i(`${En}Duration`),c=$o(r,a);let u=null,d=0,h=0;t===xt?s>0&&(u=xt,d=s,h=o.length):t===En?c>0&&(u=En,d=c,h=a.length):(d=Math.max(s,c),u=d>0?s>c?xt:En:null,h=u?u===xt?o.length:a.length:0);const g=u===xt&&/\b(transform|all)(,|$)/.test(i(`${xt}Property`).toString());return{type:u,timeout:d,propCount:h,hasTransform:g}}function $o(e,t){for(;e.lengthDo(n)+Do(e[i])))}function Do(e){return e==="auto"?0:Number(e.slice(0,-1).replace(",","."))*1e3}function du(){return document.body.offsetHeight}function hu(e,t,n){const i=e[Dn];i&&(t=(t?[t,...i]:[...i]).join(" ")),t==null?e.removeAttribute("class"):n?e.setAttribute("class",t):e.className=t}const Nn=Symbol("_vod"),Pi={beforeMount(e,{value:t},{transition:n}){e[Nn]=e.style.display==="none"?"":e.style.display,n&&t?n.beforeEnter(e):xn(e,t)},mounted(e,{value:t},{transition:n}){n&&t&&n.enter(e)},updated(e,{value:t,oldValue:n},{transition:i}){!t==!n&&(e.style.display===e[Nn]||!t)||(i?t?(i.beforeEnter(e),xn(e,!0),i.enter(e)):i.leave(e,()=>{xn(e,!1)}):xn(e,t))},beforeUnmount(e,{value:t}){xn(e,t)}};function xn(e,t){e.style.display=t?e[Nn]:"none"}const fu=Symbol(""),pu=/(^|;)\s*display\s*:/;function gu(e,t,n){const i=e.style,l=Le(n),o=i.display;let s=!1;if(n&&!l){if(t&&!Le(t))for(const r in t)n[r]==null&&Sl(i,r,"");for(const r in n)r==="display"&&(s=!0),Sl(i,r,n[r])}else if(l){if(t!==n){const r=i[fu];r&&(n+=";"+r),i.cssText=n,s=pu.test(n)}}else t&&e.removeAttribute("style");Nn in e&&(e[Nn]=s?i.display:"",i.display=o)}const No=/\s*!important$/;function Sl(e,t,n){if(ne(n))n.forEach(i=>Sl(e,t,i));else if(n==null&&(n=""),t.startsWith("--"))e.setProperty(t,n);else{const i=mu(e,t);No.test(n)?e.setProperty(Zt(i),n.replace(No,""),"important"):e[i]=n}}const zo=["Webkit","Moz","ms"],ll={};function mu(e,t){const n=ll[t];if(n)return n;let i=nt(t);if(i!=="filter"&&i in e)return ll[t]=i;i=qn(i);for(let l=0;lol||(Cu.then(()=>ol=0),ol=Date.now());function xu(e,t){const n=i=>{if(!i._vts)i._vts=Date.now();else if(i._vts<=n.attached)return;tt(Su(i,n.value),t,5,[i])};return n.value=e,n.attached=Eu(),n}function Su(e,t){if(ne(t)){const n=e.stopImmediatePropagation;return e.stopImmediatePropagation=()=>{n.call(e),e._stopped=!0},t.map(i=>l=>!l._stopped&&i&&i(l))}else return t}const qo=e=>e.charCodeAt(0)===111&&e.charCodeAt(1)===110&&e.charCodeAt(2)>96&&e.charCodeAt(2)<123,Lu=(e,t,n,i,l,o,s,r,a)=>{const c=l==="svg";t==="class"?hu(e,i,c):t==="style"?gu(e,n,i):Gn(t)?Wl(t)||ku(e,t,n,i,s):(t[0]==="."?(t=t.slice(1),!0):t[0]==="^"?(t=t.slice(1),!1):Iu(e,t,i,c))?bu(e,t,i,o,s,r,a):(t==="true-value"?e._trueValue=i:t==="false-value"&&(e._falseValue=i),vu(e,t,i,c))};function Iu(e,t,n,i){if(i)return!!(t==="innerHTML"||t==="textContent"||t in e&&qo(t)&&se(n));if(t==="spellcheck"||t==="draggable"||t==="translate"||t==="form"||t==="list"&&e.tagName==="INPUT"||t==="type"&&e.tagName==="TEXTAREA")return!1;if(t==="width"||t==="height"){const l=e.tagName;if(l==="IMG"||l==="VIDEO"||l==="CANVAS"||l==="SOURCE")return!1}return qo(t)&&Le(n)?!1:t in e}const Pu={esc:"escape",space:" ",up:"arrow-up",left:"arrow-left",right:"arrow-right",down:"arrow-down",delete:"backspace"},Au=(e,t)=>{const n=e._withKeys||(e._withKeys={}),i=t.join(".");return n[i]||(n[i]=l=>{if(!("key"in l))return;const o=Zt(l.key);if(t.some(s=>s===o||Pu[s]===o))return e(l)})},Tu=Ae({patchProp:Lu},su);let sl,Ko=!1;function Wu(){return sl=Ko?sl:$c(Tu),Ko=!0,sl}const Ru=(...e)=>{const t=Wu().createApp(...e),{mount:n}=t;return t.mount=i=>{const l=ju(i);if(l)return n(l,!0,Ou(l))},t};function Ou(e){if(e instanceof SVGElement)return"svg";if(typeof MathMLElement=="function"&&e instanceof MathMLElement)return"mathml"}function ju(e){return Le(e)?document.querySelector(e):e}var Hu=["link","meta","script","style","noscript","template"],Fu=["title","base"],Mu=([e,t,n])=>Fu.includes(e)?e:Hu.includes(e)?e==="meta"&&t.name?`${e}.${t.name}`:e==="template"&&t.id?`${e}.${t.id}`:JSON.stringify([e,Object.entries(t).map(([i,l])=>typeof l=="boolean"?l?[i,""]:null:[i,l]).filter(i=>i!=null).sort(([i],[l])=>i.localeCompare(l)),n]):null,Bu=e=>{const t=new Set,n=[];return e.forEach(i=>{const l=Mu(i);l&&!t.has(l)&&(t.add(l),n.push(i))}),n},ti=e=>/^(https?:)?\/\//.test(e),$u=e=>/^[a-z][a-z0-9+.-]*:/.test(e),Kl=e=>Object.prototype.toString.call(e)==="[object Object]",Du=e=>{const[t,...n]=e.split(/(\?|#)/);if(!t||t.endsWith("/"))return e;let i=t.replace(/(^|\/)README.md$/i,"$1index.html");return i.endsWith(".md")?i=i.substring(0,i.length-3)+".html":i.endsWith(".html")||(i=i+".html"),i.endsWith("/index.html")&&(i=i.substring(0,i.length-10)),i+n.join("")},Cr=e=>e[e.length-1]==="/"?e.slice(0,-1):e,Er=e=>e[0]==="/"?e.slice(1):e,xr=(e,t)=>{const n=Object.keys(e).sort((i,l)=>{const o=l.split("/").length-i.split("/").length;return o!==0?o:l.length-i.length});for(const i of n)if(t.startsWith(i))return i;return"/"},dt=e=>typeof e=="string";const Nu="modulepreload",zu=function(e){return"/"+e},Qo={},ee=function(t,n,i){let l=Promise.resolve();return n&&n.length>0&&(document.getElementsByTagName("link"),l=Promise.all(n.map(o=>{if(o=zu(o),o in Qo)return;Qo[o]=!0;const s=o.endsWith(".css"),r=s?'[rel="stylesheet"]':"";if(document.querySelector(`link[href="${o}"]${r}`))return;const a=document.createElement("link");if(a.rel=s?"stylesheet":Nu,s||(a.as="script",a.crossOrigin=""),a.href=o,document.head.appendChild(a),s)return new Promise((c,u)=>{a.addEventListener("load",c),a.addEventListener("error",()=>u(new Error(`Unable to preload CSS for ${o}`)))})}))),l.then(()=>t()).catch(o=>{const s=new Event("vite:preloadError",{cancelable:!0});if(s.payload=o,window.dispatchEvent(s),!s.defaultPrevented)throw o})},Vu=JSON.parse("{}"),Uu=Object.fromEntries([["/",{loader:()=>ee(()=>import("./index.html-DbNou2qf.js"),__vite__mapDeps([])),meta:{title:""}}],["/FAQ/FAQ-Contribution.html",{loader:()=>ee(()=>import("./FAQ-Contribution.html-BuaDVOGH.js"),__vite__mapDeps([])),meta:{title:"Contribution FAQ"}}],["/FAQ/FAQ-GeneralBitcoinPrivacy.html",{loader:()=>ee(()=>import("./FAQ-GeneralBitcoinPrivacy.html-H_B_tf1u.js"),__vite__mapDeps([])),meta:{title:"Bitcoin Privacy FAQ"}}],["/FAQ/FAQ-Installation.html",{loader:()=>ee(()=>import("./FAQ-Installation.html-a94aUrlk.js"),__vite__mapDeps([0,1,2])),meta:{title:"Installation FAQ"}}],["/FAQ/FAQ-Introduction.html",{loader:()=>ee(()=>import("./FAQ-Introduction.html-CmWmFBw4.js"),__vite__mapDeps([3,1])),meta:{title:"Introduction FAQ"}}],["/FAQ/FAQ-UseWasabi.html",{loader:()=>ee(()=>import("./FAQ-UseWasabi.html-uYBqV63A.js"),__vite__mapDeps([4,5,6,7,8,9,10,11,1,12,13,14])),meta:{title:"Use of Wasabi FAQ"}}],["/FAQ/",{loader:()=>ee(()=>import("./index.html-qf-rUQCE.js"),__vite__mapDeps([])),meta:{title:"Frequently Asked Questions"}}],["/building-wasabi/ContributionChecklist.html",{loader:()=>ee(()=>import("./ContributionChecklist.html-PJh7KuO7.js"),__vite__mapDeps([])),meta:{title:"Contribution Checklist"}}],["/building-wasabi/LICENSE.html",{loader:()=>ee(()=>import("./LICENSE.html-tEi9Cyzl.js"),__vite__mapDeps([])),meta:{title:"MIT License"}}],["/building-wasabi/",{loader:()=>ee(()=>import("./index.html-CpUxP59l.js"),__vite__mapDeps([])),meta:{title:"Building Wasabi"}}],["/building-wasabi/Security.html",{loader:()=>ee(()=>import("./Security.html-CjcZ0NtV.js"),__vite__mapDeps([])),meta:{title:"Security Policy"}}],["/getting-started/",{loader:()=>ee(()=>import("./index.html-QAa_NRbX.js"),__vite__mapDeps([])),meta:{title:"Getting Started"}}],["/glossary/Glossary-GeneralBitcoin.html",{loader:()=>ee(()=>import("./Glossary-GeneralBitcoin.html-ckdZxJsG.js"),__vite__mapDeps([])),meta:{title:"Bitcoin in general"}}],["/glossary/Glossary-PrivacyWasabi.html",{loader:()=>ee(()=>import("./Glossary-PrivacyWasabi.html-DqfNKkbh.js"),__vite__mapDeps([])),meta:{title:"Privacy and Wasabi"}}],["/glossary/",{loader:()=>ee(()=>import("./index.html-BQ4xlI3R.js"),__vite__mapDeps([])),meta:{title:"Glossary"}}],["/using-wasabi/BIPs.html",{loader:()=>ee(()=>import("./BIPs.html-Dwwh4MNK.js"),__vite__mapDeps([])),meta:{title:"Supported BIPs"}}],["/using-wasabi/BackupBestPractices.html",{loader:()=>ee(()=>import("./BackupBestPractices.html-DMW1-yKl.js"),__vite__mapDeps([])),meta:{title:"Wasabi Backup Best Practices"}}],["/using-wasabi/BitcoinFullNode.html",{loader:()=>ee(()=>import("./BitcoinFullNode.html-Bs7E4TRd.js"),__vite__mapDeps([15,13])),meta:{title:"Bitcoin Full Node"}}],["/using-wasabi/BuildSource.html",{loader:()=>ee(()=>import("./BuildSource.html-CB8LFRd2.js"),__vite__mapDeps([])),meta:{title:"Build from source code"}}],["/using-wasabi/ChangeCoins.html",{loader:()=>ee(()=>import("./ChangeCoins.html-BFdFQMtC.js"),__vite__mapDeps([])),meta:{title:"Change Coins"}}],["/using-wasabi/CoinJoin.html",{loader:()=>ee(()=>import("./CoinJoin.html-5YDCAxeA.js"),__vite__mapDeps([16,12,8])),meta:{title:"Coinjoin"}}],["/using-wasabi/ColdWasabi.html",{loader:()=>ee(()=>import("./ColdWasabi.html-BDOafOTR.js"),__vite__mapDeps([])),meta:{title:"Hardware Wallet"}}],["/using-wasabi/Daemon.html",{loader:()=>ee(()=>import("./Daemon.html-I1RPJ_3x.js"),__vite__mapDeps([])),meta:{title:"Headless Wasabi Daemon"}}],["/using-wasabi/DeterministicBuild.html",{loader:()=>ee(()=>import("./DeterministicBuild.html-RoLg3UQY.js"),__vite__mapDeps([])),meta:{title:"Deterministic Build"}}],["/using-wasabi/DiscreetMode.html",{loader:()=>ee(()=>import("./DiscreetMode.html-tr5KQw1O.js"),__vite__mapDeps([17,14])),meta:{title:"Discreet Mode"}}],["/using-wasabi/ELI5.html",{loader:()=>ee(()=>import("./ELI5.html-DR7wgsW5.js"),__vite__mapDeps([])),meta:{title:"Explain Wasabi like I'm 5"}}],["/using-wasabi/ExternalRestore.html",{loader:()=>ee(()=>import("./ExternalRestore.html-DfRPUUKG.js"),__vite__mapDeps([])),meta:{title:"Restoring Wasabi Wallet in Other Wallets"}}],["/using-wasabi/InstallPackage.html",{loader:()=>ee(()=>import("./InstallPackage.html-B2XMhgob.js"),__vite__mapDeps([18,2,1])),meta:{title:"Install-package"}}],["/using-wasabi/PasswordBestPractices.html",{loader:()=>ee(()=>import("./PasswordBestPractices.html-DeqmX9LQ.js"),__vite__mapDeps([])),meta:{title:"Password Best Practices"}}],["/using-wasabi/PayJoin.html",{loader:()=>ee(()=>import("./PayJoin.html-CYU7F1JU.js"),__vite__mapDeps([])),meta:{title:"PayJoin"}}],["/using-wasabi/",{loader:()=>ee(()=>import("./index.html-DsCPaNFb.js"),__vite__mapDeps([])),meta:{title:"Using Wasabi"}}],["/using-wasabi/RPC.html",{loader:()=>ee(()=>import("./RPC.html-DAODCFkf.js"),__vite__mapDeps([])),meta:{title:"RPC Interface"}}],["/using-wasabi/Receive.html",{loader:()=>ee(()=>import("./Receive.html-B3vnDoLn.js"),__vite__mapDeps([19,1,10])),meta:{title:"Receive"}}],["/using-wasabi/Send.html",{loader:()=>ee(()=>import("./Send.html-D3Odg27s.js"),__vite__mapDeps([20,1,11,8])),meta:{title:"Send"}}],["/using-wasabi/StartupParameters.html",{loader:()=>ee(()=>import("./StartupParameters.html-C0HQ6Gu6.js"),__vite__mapDeps([])),meta:{title:"Starting Wasabi with parameters"}}],["/using-wasabi/Testnet.html",{loader:()=>ee(()=>import("./Testnet.html-DRlHBRt4.js"),__vite__mapDeps([])),meta:{title:"Testnet"}}],["/using-wasabi/WalletGeneration.html",{loader:()=>ee(()=>import("./WalletGeneration.html-mAdC83BR.js"),__vite__mapDeps([21,6,7,8])),meta:{title:"Wallet Generation"}}],["/using-wasabi/WalletLoad.html",{loader:()=>ee(()=>import("./WalletLoad.html-CTTR-YGw.js"),__vite__mapDeps([22,9])),meta:{title:"Wallet Load"}}],["/using-wasabi/WalletRecovery.html",{loader:()=>ee(()=>import("./WalletRecovery.html-CU0GMqJf.js"),__vite__mapDeps([23,5,6])),meta:{title:"Recover a Wallet"}}],["/using-wasabi/WasabiSetupVM.html",{loader:()=>ee(()=>import("./WasabiSetupVM.html-CivLF5Jv.js"),__vite__mapDeps([])),meta:{title:"Wasabi Setup in Virtual Machines"}}],["/why-wasabi/AddressReuse.html",{loader:()=>ee(()=>import("./AddressReuse.html-BZIIpGTg.js"),__vite__mapDeps([])),meta:{title:"Address Reuse"}}],["/why-wasabi/Coins.html",{loader:()=>ee(()=>import("./Coins.html-DccT-AZB.js"),__vite__mapDeps([])),meta:{title:"Coins"}}],["/why-wasabi/LegalConcern.html",{loader:()=>ee(()=>import("./LegalConcern.html-p1dtNiIf.js"),__vite__mapDeps([])),meta:{title:"CoinJoin Legal Concern"}}],["/why-wasabi/NetworkLevelPrivacy.html",{loader:()=>ee(()=>import("./NetworkLevelPrivacy.html-yEBz1wzp.js"),__vite__mapDeps([24,1])),meta:{title:"Network-Level Privacy"}}],["/why-wasabi/",{loader:()=>ee(()=>import("./index.html-CW5NWqvN.js"),__vite__mapDeps([])),meta:{title:"Why Wasabi"}}],["/why-wasabi/TransactionGraph.html",{loader:()=>ee(()=>import("./TransactionGraph.html-DKr0EbYV.js"),__vite__mapDeps([])),meta:{title:"Transaction Graph"}}],["/why-wasabi/TransactionSurveillanceCompanies.html",{loader:()=>ee(()=>import("./TransactionSurveillanceCompanies.html-BC3VvVts.js"),__vite__mapDeps([])),meta:{title:"Transaction Surveillance Companies"}}],["/why-wasabi/WhyFinancialPrivacy.html",{loader:()=>ee(()=>import("./WhyFinancialPrivacy.html-DIgudC3m.js"),__vite__mapDeps([])),meta:{title:"Why Financial Privacy is Especially Important"}}],["/why-wasabi/WhyPrivacyImportant.html",{loader:()=>ee(()=>import("./WhyPrivacyImportant.html-BCWac2YZ.js"),__vite__mapDeps([25,1])),meta:{title:"Why Privacy is Important"}}],["/404.html",{loader:()=>ee(()=>import("./404.html-DGGa0TW_.js"),__vite__mapDeps([])),meta:{title:""}}]]);/*! * vue-router v4.2.5 * (c) 2023 Eduardo San Martin Morote * @license MIT @@ -26,7 +26,7 @@ See: https://github.com/francoischalifour/medium-zoom`)}},nf=function(t){var n=d */const de={settings:{minimum:.08,easing:"ease",speed:200,trickle:!0,trickleRate:.02,trickleSpeed:800,barSelector:'[role="bar"]',parent:"body",template:'
    '},status:null,set:e=>{const t=de.isStarted();e=hl(e,de.settings.minimum,1),de.status=e===1?null:e;const n=de.render(!t),i=n.querySelector(de.settings.barSelector),l=de.settings.speed,o=de.settings.easing;return n.offsetWidth,pf(s=>{gi(i,{transform:"translate3d("+vs(e)+"%,0,0)",transition:"all "+l+"ms "+o}),e===1?(gi(n,{transition:"none",opacity:"1"}),n.offsetWidth,setTimeout(function(){gi(n,{transition:"all "+l+"ms linear",opacity:"0"}),setTimeout(function(){de.remove(),s()},l)},l)):setTimeout(()=>s(),l)}),de},isStarted:()=>typeof de.status=="number",start:()=>{de.status||de.set(0);const e=()=>{setTimeout(()=>{de.status&&(de.trickle(),e())},de.settings.trickleSpeed)};return de.settings.trickle&&e(),de},done:e=>!e&&!de.status?de:de.inc(.3+.5*Math.random()).set(1),inc:e=>{let t=de.status;return t?(typeof e!="number"&&(e=(1-t)*hl(Math.random()*t,.1,.95)),t=hl(t+e,0,.994),de.set(t)):de.start()},trickle:()=>de.inc(Math.random()*de.settings.trickleRate),render:e=>{if(de.isRendered())return document.getElementById("nprogress");bs(document.documentElement,"nprogress-busy");const t=document.createElement("div");t.id="nprogress",t.innerHTML=de.settings.template;const n=t.querySelector(de.settings.barSelector),i=e?"-100":vs(de.status||0),l=document.querySelector(de.settings.parent);return gi(n,{transition:"all 0 linear",transform:"translate3d("+i+"%,0,0)"}),l!==document.body&&bs(l,"nprogress-custom-parent"),l==null||l.appendChild(t),t},remove:()=>{ws(document.documentElement,"nprogress-busy"),ws(document.querySelector(de.settings.parent),"nprogress-custom-parent");const e=document.getElementById("nprogress");e&&gf(e)},isRendered:()=>!!document.getElementById("nprogress")},hl=(e,t,n)=>en?n:e,vs=e=>(-1+e)*100,pf=function(){const e=[];function t(){const n=e.shift();n&&n(t)}return function(n){e.push(n),e.length===1&&t()}}(),gi=function(){const e=["Webkit","O","Moz","ms"],t={};function n(s){return s.replace(/^-ms-/,"ms-").replace(/-([\da-z])/gi,function(r,a){return a.toUpperCase()})}function i(s){const r=document.body.style;if(s in r)return s;let a=e.length;const c=s.charAt(0).toUpperCase()+s.slice(1);let u;for(;a--;)if(u=e[a]+c,u in r)return u;return s}function l(s){return s=n(s),t[s]??(t[s]=i(s))}function o(s,r,a){r=l(r),s.style[r]=a}return function(s,r){for(const a in r){const c=r[a];c!==void 0&&Object.prototype.hasOwnProperty.call(r,a)&&o(s,a,c)}}}(),Ur=(e,t)=>(typeof e=="string"?e:io(e)).indexOf(" "+t+" ")>=0,bs=(e,t)=>{const n=io(e),i=n+t;Ur(n,t)||(e.className=i.substring(1))},ws=(e,t)=>{const n=io(e);if(!Ur(e,t))return;const i=n.replace(" "+t+" "," ");e.className=i.substring(1,i.length-1)},io=e=>(" "+(e.className||"")+" ").replace(/\s+/gi," "),gf=e=>{e&&e.parentNode&&e.parentNode.removeChild(e)},mf=()=>{Ve(()=>{const e=nn(),t=new Set;t.add(e.currentRoute.value.path),e.beforeEach(n=>{t.has(n.path)||de.start()}),e.afterEach(n=>{t.add(n.path),de.done()})})},vf=yt({setup(){mf()}}),bf=JSON.parse(`{"logo":"/Logo_without_text_dark.png","logoDark":"/Logo_without_text.png","docsRepo":"https://github.com/WalletWasabi/WasabiDoc","docsBranch":"master","docsDir":"docs","editLinks":true,"contributors":false,"colorMode":"dark","algolia":{"indexName":"wasabiwallet","apiKey":"c9d9b7688e0f9e6d0ed534655321a424","algoliaOptions":{"hitsPerPage":25},"autocompleteOptions":{"openOnFocus":true}},"head":[["link",{"rel":"icon","href":"/favicon.ico"}],["link",{"rel":"apple-touch-icon","href":"/apple-touch-icon.png","sizes":"180x180"}],["link",{"rel":"manifest","href":"/site.webmanifest"}],["link",{"rel":"mask-icon","href":"/safari-pinned-tab.svg","color":"#211b24"}],["link",{"rel":"stylesheet","href":"https://fonts.googleapis.com/css?family=Inconsolata:400,700|Playfair+Display:700&display=swap"}],["meta",{"name":"msapplication-TileColor","content":"#211b24"}],["meta",{"name":"theme-color","content":"#211b24"}]],"navbar":[{"text":"Getting Started","link":"/getting-started/"},{"text":"Why Wasabi","link":"/why-wasabi/"},{"text":"Using Wasabi","link":"/using-wasabi/"},{"text":"Building Wasabi","link":"/building-wasabi/"},{"text":"FAQ","link":"/FAQ/"},{"text":"Glossary","link":"/glossary/"}],"sidebar":{"/why-wasabi/":[{"text":"Why Privacy","collapsable":false,"sidebarDepth":2,"children":["/why-wasabi/WhyPrivacyImportant.md","/why-wasabi/WhyFinancialPrivacy.md","/why-wasabi/LegalConcern.md"]},{"text":"Privacy in Bitcoin","collapsable":false,"sidebarDepth":2,"children":["/why-wasabi/Coins.md","/why-wasabi/AddressReuse.md","/why-wasabi/TransactionGraph.md","/why-wasabi/NetworkLevelPrivacy.md","/why-wasabi/TransactionSurveillanceCompanies.md"]}],"/using-wasabi/":[{"text":"Introducing Wasabi","collapsable":false,"sidebarDepth":2,"children":["/using-wasabi/ELI5.md"]},{"text":"Installing Wasabi","collapsable":false,"sidebarDepth":2,"children":["/using-wasabi/InstallPackage.md"]},{"text":"Using Wasabi","collapsable":false,"sidebarDepth":2,"children":["/using-wasabi/WalletGeneration.md","/using-wasabi/WalletLoad.md","/using-wasabi/Receive.md","/using-wasabi/CoinJoin.md","/using-wasabi/Send.md","/using-wasabi/ColdWasabi.md","/using-wasabi/BitcoinFullNode.md"]},{"text":"Best Practices","collapsable":false,"sidebarDepth":2,"children":["/using-wasabi/PasswordBestPractices.md","/using-wasabi/BackupBestPractices.md","/using-wasabi/ChangeCoins.md"]},{"text":"Restoring Wasabi","collapsable":false,"sidebarDepth":2,"children":["/using-wasabi/WalletRecovery.md","/using-wasabi/ExternalRestore.md"]},{"text":"Advanced Installing Wasabi","collapsable":false,"sidebarDepth":2,"children":["/using-wasabi/BuildSource.md","/using-wasabi/DeterministicBuild.md","/using-wasabi/WasabiSetupVM.md"]},{"text":"Advanced Using Wasabi","collapsable":false,"sidebarDepth":2,"children":["/using-wasabi/DiscreetMode.md","/using-wasabi/Testnet.md","/using-wasabi/PayJoin.md","/using-wasabi/Daemon.md","/using-wasabi/StartupParameters.md","/using-wasabi/RPC.md","/using-wasabi/BIPs.md"]}],"/building-wasabi/":[{"text":"Contributing to Wasabi","collapsable":false,"sidebarDepth":2,"children":["/building-wasabi/ContributionChecklist.md"]},{"text":"Advanced","collapsable":false,"sidebarDepth":2,"children":["/building-wasabi/Security.md","/building-wasabi/LICENSE.md"]}],"/FAQ/":[{"text":"Frequently Asked Questions","collapsable":false,"sidebarDepth":2,"children":["/FAQ/FAQ-Introduction.md","/FAQ/FAQ-Installation.md","/FAQ/FAQ-UseWasabi.md","/FAQ/FAQ-GeneralBitcoinPrivacy.md","/FAQ/FAQ-Contribution.md"]}],"/glossary/":[{"text":"Glossary","collapsable":false,"sidebarDepth":2,"children":["/glossary/Glossary-GeneralBitcoin.md","/glossary/Glossary-PrivacyWasabi.md"]}]},"locales":{"/":{"selectLanguageName":"English"}},"colorModeSwitch":true,"repo":null,"selectLanguageText":"Languages","selectLanguageAriaLabel":"Select language","sidebarDepth":2,"editLink":true,"editLinkText":"Edit this page","lastUpdated":true,"lastUpdatedText":"Last Updated","contributorsText":"Contributors","notFound":["There's nothing here.","How did we get here?","That's a Four-Oh-Four.","Looks like we've got some broken links."],"backToHome":"Take me home","openInNewWindow":"open in new window","toggleColorMode":"toggle color mode","toggleSidebar":"toggle sidebar"}`),wf=re(bf),Gr=()=>wf,qr=Symbol(""),yf=()=>{const e=ze(qr);if(!e)throw new Error("useThemeLocaleData() is called without provider.");return e},kf=(e,t)=>{const{locales:n,...i}=e;return{...i,...n==null?void 0:n[t]}},_f=yt({enhance({app:e}){const t=Gr(),n=e._context.provides[Yl],i=R(()=>kf(t.value,n.routeLocale.value));e.provide(qr,i),Object.defineProperties(e.config.globalProperties,{$theme:{get(){return t.value}},$themeLocale:{get(){return i.value}}})}}),Cf=ge({__name:"Badge",props:{type:{type:String,required:!1,default:"tip"},text:{type:String,required:!1,default:""},vertical:{type:String,required:!1,default:void 0}},setup(e){return(t,n)=>(z(),X("span",{class:qe(["badge",e.type]),style:Kn({verticalAlign:e.vertical})},[we(t.$slots,"default",{},()=>[Ft(Ie(e.text),1)])],6))}}),Ee=(e,t)=>{const n=e.__vccOpts||e;for(const[i,l]of t)n[i]=l;return n},Ef=Ee(Cf,[["__file","Badge.vue"]]),xf=ge({name:"CodeGroup",slots:Object,setup(e,{slots:t}){const n=re([]),i=re(-1),l=zr("vuepress-code-group",{}),o=R(()=>n.value.map(c=>c.innerText).join(","));Ve(()=>{Me(()=>l.value[o.value],(c=-1)=>{i.value!==c&&(i.value=c)},{immediate:!0}),Me(i,c=>{l.value[o.value]!==c&&(l.value[o.value]=c)})});const s=(c=i.value)=>{c{c>0?i.value=c-1:i.value=n.value.length-1,n.value[i.value].focus()},a=(c,u)=>{c.key===" "||c.key==="Enter"?(c.preventDefault(),i.value=u):c.key==="ArrowRight"?(c.preventDefault(),s(u)):c.key==="ArrowLeft"&&(c.preventDefault(),r(u))};return()=>{var u;const c=(((u=t.default)==null?void 0:u.call(t))||[]).filter(d=>d.type.name==="CodeGroupItem").map(d=>(d.props===null&&(d.props={}),d));return c.length===0?null:(i.value<0||i.value>c.length-1?(i.value=c.findIndex(d=>d.props.active===""||d.props.active===!0),i.value===-1&&(i.value=0)):c.forEach((d,h)=>{d.props.active=h===i.value}),ce("div",{class:"code-group"},[ce("div",{class:"code-group__nav",role:"tablist"},c.map((d,h)=>{const g=h===i.value;return ce("button",{ref:m=>{m&&(n.value[h]=m)},class:{"code-group__nav-tab":!0,"code-group__nav-tab-active":g},role:"tab",ariaSelected:g,onClick:()=>i.value=h,onKeydown:m=>a(m,h)},d.props.title)})),c]))}}}),Sf=ge({name:"CodeGroupItem",__name:"CodeGroupItem",props:{title:{type:String,required:!0},active:{type:Boolean,required:!1,default:!1}},setup(e){return(t,n)=>(z(),X("div",{class:qe(["code-group-item",{"code-group-item__active":e.active}]),role:"tabpanel"},[we(t.$slots,"default")],2))}}),Lf=Ee(Sf,[["__file","CodeGroupItem.vue"]]),If=()=>Gr(),Fe=()=>yf(),Kr=Symbol(""),lo=()=>{const e=ze(Kr);if(!e)throw new Error("useDarkMode() is called without provider.");return e},Pf=()=>{const e=Fe(),t=Eh(),n=zr("vuepress-color-scheme",e.value.colorMode),i=R({get(){return e.value.colorModeSwitch?n.value==="auto"?t.value:n.value==="dark":e.value.colorMode==="dark"},set(l){l===t.value?n.value="auto":n.value=l?"dark":"light"}});Yt(Kr,i),Af(i)},Af=e=>{const t=(n=e.value)=>{const i=window==null?void 0:window.document.querySelector("html");i==null||i.classList.toggle("dark",n)};Ve(()=>{Me(e,t,{immediate:!0})}),$i(()=>t())};let fl=null,Ln=null;const Tf={wait:()=>fl,pending:()=>{fl=new Promise(e=>Ln=e)},resolve:()=>{Ln==null||Ln(),fl=null,Ln=null}},Qr=()=>Tf,oo=e=>{const{notFound:t,meta:n,path:i}=Zl(e);return t?{text:i,link:i}:{text:n.title||i,link:i}},ys=e=>decodeURI(e).replace(/#.*$/,"").replace(/(index)?\.(md|html)$/,""),Wf=(e,t)=>{if(t.hash===e)return!0;const n=ys(t.path),i=ys(e);return n===i},Jr=(e,t)=>e.link&&Wf(e.link,t)?!0:e.children?e.children.some(n=>Jr(n,t)):!1,Yr=e=>!ti(e)||/github\.com/.test(e)?"GitHub":/bitbucket\.org/.test(e)?"Bitbucket":/gitlab\.com/.test(e)?"GitLab":/gitee\.com/.test(e)?"Gitee":null,Rf={GitHub:":repo/edit/:branch/:path",GitLab:":repo/-/edit/:branch/:path",Gitee:":repo/edit/:branch/:path",Bitbucket:":repo/src/:branch/:path?mode=edit&spa=0&at=:branch&fileviewer=file-view-default"},Of=({docsRepo:e,editLinkPattern:t})=>{if(t)return t;const n=Yr(e);return n!==null?Rf[n]:null},jf=({docsRepo:e,docsBranch:t,docsDir:n,filePathRelative:i,editLinkPattern:l})=>{if(!i)return null;const o=Of({docsRepo:e,editLinkPattern:l});return o?o.replace(/:repo/,ti(e)?e:`https://github.com/${e}`).replace(/:branch/,t).replace(/:path/,Er(`${Cr(n)}/${i}`)):null},Xr=Symbol("sidebarItems"),so=()=>{const e=ze(Xr);if(!e)throw new Error("useSidebarItems() is called without provider.");return e},Hf=()=>{const e=Fe(),t=ht(),n=pn(),i=ln(),l=R(()=>Ff(t.value,e.value,n.value,i.path));Yt(Xr,l)},Ff=(e,t,n,i)=>{const l=e.sidebar??t.sidebar??"auto",o=e.sidebarDepth??t.sidebarDepth??2;return e.home||l===!1?[]:l==="auto"?Zr(n,o):Array.isArray(l)?ea(n,i,l,o):Kl(l)?Bf(n,i,l,o):[]},Mf=(e,t)=>({text:e.title,link:e.link,children:ro(e.children,t)}),ro=(e,t)=>t>0?e.map(n=>Mf(n,t-1)):[],Zr=(e,t)=>[{text:e.title,children:ro(e.headers,t)}],ea=(e,t,n,i)=>{const l=o=>{var r;let s;if(dt(o)?s=oo(o):s=o,s.children)return{...s,children:s.children.map(a=>l(a))};if(s.link===t){const a=((r=e.headers[0])==null?void 0:r.level)===1?e.headers[0].children:e.headers;return{...s,children:ro(a,i)}}return s};return n.map(o=>l(o))},Bf=(e,t,n,i)=>{const l=xr(n,t),o=n[l]??[];return o==="heading"?Zr(e,i):ea(e,t,o,i)},$f="979px",Df={mobile:$f};var Un;(function(e){e.MOBILE="mobile"})(Un||(Un={}));var Cs;const Nf={[Un.MOBILE]:Number.parseInt((Cs=Df.mobile)==null?void 0:Cs.replace("px",""),10)},ta=(e,t)=>{const n=Nf[e];Number.isInteger(n)&&Ve(()=>{t(n),window.addEventListener("resize",()=>t(n),!1),window.addEventListener("orientationchange",()=>t(n),!1)})},zf={},Vf={class:"theme-default-content"};function Uf(e,t){const n=Xt("Content");return z(),X("div",Vf,[ie(n)])}const Gf=Ee(zf,[["render",Uf],["__file","HomeContent.vue"]]),qf={key:0,class:"features"},Kf=ge({__name:"HomeFeatures",setup(e){const t=ht(),n=R(()=>Array.isArray(t.value.features)?t.value.features:[]);return(i,l)=>n.value.length?(z(),X("div",qf,[(z(!0),X(ye,null,jt(n.value,o=>(z(),X("div",{key:o.title,class:"feature"},[fe("h2",null,Ie(o.title),1),fe("p",null,Ie(o.details),1)]))),128))])):Se("",!0)}}),Qf=Ee(Kf,[["__file","HomeFeatures.vue"]]),Jf=["innerHTML"],Yf=["textContent"],Xf=ge({__name:"HomeFooter",setup(e){const t=ht(),n=R(()=>t.value.footer),i=R(()=>t.value.footerHtml);return(l,o)=>n.value?(z(),X(ye,{key:0},[i.value?(z(),X("div",{key:0,class:"footer",innerHTML:n.value},null,8,Jf)):(z(),X("div",{key:1,class:"footer",textContent:Ie(n.value)},null,8,Yf))],64)):Se("",!0)}}),Zf=Ee(Xf,[["__file","HomeFooter.vue"]]),ep=["href","rel","target","aria-label"],tp=ge({inheritAttrs:!1,__name:"AutoLink",props:{item:{type:Object,required:!0}},setup(e){const t=e,n=ln(),i=Hr(),{item:l}=ji(t),o=R(()=>ti(l.value.link)),s=R(()=>!o.value&&$u(l.value.link)),r=R(()=>{if(!s.value){if(l.value.target)return l.value.target;if(o.value)return"_blank"}}),a=R(()=>r.value==="_blank"),c=R(()=>!o.value&&!s.value&&!a.value),u=R(()=>{if(!s.value){if(l.value.rel)return l.value.rel;if(a.value)return"noopener noreferrer"}}),d=R(()=>l.value.ariaLabel||l.value.text),h=R(()=>{const y=Object.keys(i.value.locales);return y.length?!y.some(k=>k===l.value.link):l.value.link!=="/"}),g=R(()=>h.value?n.path.startsWith(l.value.link):!1),m=R(()=>c.value?l.value.activeMatch?new RegExp(l.value.activeMatch).test(n.path):g.value:!1);return(y,k)=>{const x=Xt("RouteLink"),I=Xt("AutoLinkExternalIcon");return c.value?(z(),xe(x,El({key:0,active:m.value,to:Y(l).link,"aria-label":d.value},y.$attrs),{default:He(()=>[we(y.$slots,"before"),Ft(" "+Ie(Y(l).text)+" ",1),we(y.$slots,"after")]),_:3},16,["active","to","aria-label"])):(z(),X("a",El({key:1,class:"external-link",href:Y(l).link,rel:u.value,target:r.value,"aria-label":d.value},y.$attrs),[we(y.$slots,"before"),Ft(" "+Ie(Y(l).text)+" ",1),a.value?(z(),xe(I,{key:0})):Se("",!0),we(y.$slots,"after")],16,ep))}}}),bt=Ee(tp,[["__file","AutoLink.vue"]]),np={class:"hero"},ip={key:0,id:"main-title"},lp={key:1,class:"description"},op={key:2,class:"actions"},sp=ge({__name:"HomeHero",setup(e){const t=ht(),n=Xl(),i=lo(),l=R(()=>i.value&&t.value.heroImageDark!==void 0?t.value.heroImageDark:t.value.heroImage),o=R(()=>t.value.heroAlt||r.value||"hero"),s=R(()=>t.value.heroHeight||280),r=R(()=>t.value.heroText===null?null:t.value.heroText||n.value.title||"Hello"),a=R(()=>t.value.tagline===null?null:t.value.tagline||n.value.description||"Welcome to your VuePress site"),c=R(()=>Array.isArray(t.value.actions)?t.value.actions.map(({text:d,link:h,type:g="primary"})=>({text:d,link:h,type:g})):[]),u=()=>{if(!l.value)return null;const d=ce("img",{src:Gi(l.value),alt:o.value,height:s.value});return t.value.heroImageDark===void 0?d:ce(eo,()=>d)};return(d,h)=>(z(),X("header",np,[ie(u),r.value?(z(),X("h1",ip,Ie(r.value),1)):Se("",!0),a.value?(z(),X("p",lp,Ie(a.value),1)):Se("",!0),c.value.length?(z(),X("p",op,[(z(!0),X(ye,null,jt(c.value,g=>(z(),xe(bt,{key:g.text,class:qe(["action-button",[g.type]]),item:g},null,8,["class","item"]))),128))])):Se("",!0)]))}}),rp=Ee(sp,[["__file","HomeHero.vue"]]),ap={class:"home"},cp=ge({__name:"Home",setup(e){return(t,n)=>(z(),X("main",ap,[ie(rp),ie(Qf),ie(Gf),ie(Zf)]))}}),up=Ee(cp,[["__file","Home.vue"]]),dp=["aria-hidden"],hp=ge({__name:"NavbarBrand",setup(e){const t=_n(),n=Xl(),i=Fe(),l=lo(),o=R(()=>i.value.home||t.value),s=R(()=>n.value.title),r=R(()=>l.value&&i.value.logoDark!==void 0?i.value.logoDark:i.value.logo),a=R(()=>i.value.logoAlt??s.value),c=R(()=>s.value.toLocaleUpperCase().trim()===a.value.toLocaleUpperCase().trim()),u=()=>{if(!r.value)return null;const d=ce("img",{class:"logo",src:Gi(r.value),alt:a.value});return i.value.logoDark===void 0?d:ce(eo,()=>d)};return(d,h)=>(z(),xe(Y(ni),{to:o.value},{default:He(()=>[ie(u),s.value?(z(),X("span",{key:0,class:qe(["site-name",{"can-hide":r.value}]),"aria-hidden":c.value},Ie(s.value),11,dp)):Se("",!0)]),_:1},8,["to"]))}}),fp=Ee(hp,[["__file","NavbarBrand.vue"]]),pp=ge({__name:"DropdownTransition",setup(e){const t=i=>{i.style.height=i.scrollHeight+"px"},n=i=>{i.style.height=""};return(i,l)=>(z(),xe(ei,{name:"dropdown",onEnter:t,onAfterEnter:n,onBeforeLeave:t},{default:He(()=>[we(i.$slots,"default")]),_:3}))}}),na=Ee(pp,[["__file","DropdownTransition.vue"]]),gp=["aria-label"],mp={class:"title"},vp=fe("span",{class:"arrow down"},null,-1),bp=["aria-label"],wp={class:"title"},yp={class:"navbar-dropdown"},kp={class:"navbar-dropdown-subtitle"},_p={key:1},Cp={class:"navbar-dropdown-subitem-wrapper"},Ep=ge({__name:"NavbarDropdown",props:{item:{type:Object,required:!0}},setup(e){const t=e,{item:n}=ji(t),i=R(()=>n.value.ariaLabel||n.value.text),l=re(!1),o=ln();Me(()=>o.path,()=>{l.value=!1});const s=a=>{a.detail===0?l.value=!l.value:l.value=!1},r=(a,c)=>c[c.length-1]===a;return(a,c)=>(z(),X("div",{class:qe(["navbar-dropdown-wrapper",{open:l.value}])},[fe("button",{class:"navbar-dropdown-title",type:"button","aria-label":i.value,onClick:s},[fe("span",mp,Ie(Y(n).text),1),vp],8,gp),fe("button",{class:"navbar-dropdown-title-mobile",type:"button","aria-label":i.value,onClick:c[0]||(c[0]=u=>l.value=!l.value)},[fe("span",wp,Ie(Y(n).text),1),fe("span",{class:qe(["arrow",l.value?"down":"right"])},null,2)],8,bp),ie(na,null,{default:He(()=>[Ei(fe("ul",yp,[(z(!0),X(ye,null,jt(Y(n).children,u=>(z(),X("li",{key:u.text,class:"navbar-dropdown-item"},[u.children?(z(),X(ye,{key:0},[fe("h4",kp,[u.link?(z(),xe(bt,{key:0,item:u,onFocusout:d=>r(u,Y(n).children)&&u.children.length===0&&(l.value=!1)},null,8,["item","onFocusout"])):(z(),X("span",_p,Ie(u.text),1))]),fe("ul",Cp,[(z(!0),X(ye,null,jt(u.children,d=>(z(),X("li",{key:d.link,class:"navbar-dropdown-subitem"},[ie(bt,{item:d,onFocusout:h=>r(d,u.children)&&r(u,Y(n).children)&&(l.value=!1)},null,8,["item","onFocusout"])]))),128))])],64)):(z(),xe(bt,{key:1,item:u,onFocusout:d=>r(u,Y(n).children)&&(l.value=!1)},null,8,["item","onFocusout"]))]))),128))],512),[[Pi,l.value]])]),_:1})],2))}}),xp=Ee(Ep,[["__file","NavbarDropdown.vue"]]),Sp=["aria-label"],Lp=ge({__name:"NavbarItems",setup(e){const t=()=>{const d=ln(),h=jh(),g=_n(),m=Hr(),y=Xl(),k=If(),x=Fe();return R(()=>{const I=Object.keys(m.value.locales);if(I.length<2)return[];const v=d.path,_=d.fullPath;return[{text:`${x.value.selectLanguageText}`,ariaLabel:`${x.value.selectLanguageAriaLabel??x.value.selectLanguageText}`,children:I.map(W=>{var C,H;const F=((C=m.value.locales)==null?void 0:C[W])??{},b=((H=k.value.locales)==null?void 0:H[W])??{},M=`${F.lang}`,P=b.selectLanguageName??M;let q;if(M===y.value.lang)q=_;else{const te=v.replace(g.value,W);h.value.some(le=>le===te)?q=_.replace(v,te):q=b.home??W}return{text:P,link:q}})}]})},n=()=>{const d=Fe(),h=R(()=>d.value.repo),g=R(()=>h.value?Yr(h.value):null),m=R(()=>h.value&&!ti(h.value)?`https://github.com/${h.value}`:h.value),y=R(()=>m.value?d.value.repoLabel?d.value.repoLabel:g.value===null?"Source":g.value:null);return R(()=>!m.value||!y.value?[]:[{text:y.value,link:m.value}])},i=d=>dt(d)?oo(d):d.children?{...d,children:d.children.map(h=>i(h))}:d,l=()=>{const d=Fe();return R(()=>(d.value.navbar||[]).map(h=>i(h)))},o=re(!1),s=l(),r=t(),a=n(),c=R(()=>[...s.value,...r.value,...a.value]);ta(Un.MOBILE,d=>{window.innerWidthFe().value.navbarLabel??"site navigation");return(d,h)=>c.value.length?(z(),X("nav",{key:0,class:"navbar-items","aria-label":u.value},[(z(!0),X(ye,null,jt(c.value,g=>(z(),X("div",{key:g.text,class:"navbar-item"},["children"in g?(z(),xe(xp,{key:0,item:g,class:qe(o.value?"mobile":"")},null,8,["item","class"])):(z(),xe(bt,{key:1,item:g},null,8,["item"]))]))),128))],8,Sp)):Se("",!0)}}),ia=Ee(Lp,[["__file","NavbarItems.vue"]]),Ip=["title"],Pp={class:"icon",focusable:"false",viewBox:"0 0 32 32"},Ap=qc('',9),Tp=[Ap],Wp={class:"icon",focusable:"false",viewBox:"0 0 32 32"},Rp=fe("path",{d:"M13.502 5.414a15.075 15.075 0 0 0 11.594 18.194a11.113 11.113 0 0 1-7.975 3.39c-.138 0-.278.005-.418 0a11.094 11.094 0 0 1-3.2-21.584M14.98 3a1.002 1.002 0 0 0-.175.016a13.096 13.096 0 0 0 1.825 25.981c.164.006.328 0 .49 0a13.072 13.072 0 0 0 10.703-5.555a1.01 1.01 0 0 0-.783-1.565A13.08 13.08 0 0 1 15.89 4.38A1.015 1.015 0 0 0 14.98 3z",fill:"currentColor"},null,-1),Op=[Rp],jp=ge({__name:"ToggleColorModeButton",setup(e){const t=Fe(),n=lo(),i=()=>{n.value=!n.value};return(l,o)=>(z(),X("button",{class:"toggle-color-mode-button",title:Y(t).toggleColorMode,onClick:i},[Ei((z(),X("svg",Pp,Tp,512)),[[Pi,!Y(n)]]),Ei((z(),X("svg",Wp,Op,512)),[[Pi,Y(n)]])],8,Ip))}}),Hp=Ee(jp,[["__file","ToggleColorModeButton.vue"]]),Fp=["title"],Mp=fe("div",{class:"icon","aria-hidden":"true"},[fe("span"),fe("span"),fe("span")],-1),Bp=[Mp],$p=ge({__name:"ToggleSidebarButton",emits:["toggle"],setup(e){const t=Fe();return(n,i)=>(z(),X("div",{class:"toggle-sidebar-button",title:Y(t).toggleSidebar,"aria-expanded":"false",role:"button",tabindex:"0",onClick:i[0]||(i[0]=l=>n.$emit("toggle"))},Bp,8,Fp))}}),Dp=Ee($p,[["__file","ToggleSidebarButton.vue"]]),Np=ge({__name:"Navbar",emits:["toggle-sidebar"],setup(e){const t=Fe(),n=re(null),i=re(null),l=re(0),o=R(()=>l.value?{maxWidth:l.value+"px"}:{});ta(Un.MOBILE,r=>{var c;const a=s(n.value,"paddingLeft")+s(n.value,"paddingRight");window.innerWidth{const c=Xt("NavbarSearch");return z(),X("header",{ref_key:"navbar",ref:n,class:"navbar"},[ie(Dp,{onToggle:a[0]||(a[0]=u=>r.$emit("toggle-sidebar"))}),fe("span",{ref_key:"navbarBrand",ref:i},[ie(fp)],512),fe("div",{class:"navbar-items-wrapper",style:Kn(o.value)},[we(r.$slots,"before"),ie(ia,{class:"can-hide"}),we(r.$slots,"after"),Y(t).colorModeSwitch?(z(),xe(Hp,{key:0})):Se("",!0),ie(c)],4)],512)}}}),zp=Ee(Np,[["__file","Navbar.vue"]]),Vp={class:"page-meta"},Up={key:0,class:"meta-item edit-link"},Gp={key:1,class:"meta-item last-updated"},qp={class:"meta-item-label"},Kp={class:"meta-item-info"},Qp={key:2,class:"meta-item contributors"},Jp={class:"meta-item-label"},Yp={class:"meta-item-info"},Xp=["title"],Zp=ge({__name:"PageMeta",setup(e){const t=()=>{const a=Fe(),c=pn(),u=ht();return R(()=>{if(!(u.value.editLink??a.value.editLink??!0))return null;const{repo:h,docsRepo:g=h,docsBranch:m="main",docsDir:y="",editLinkText:k}=a.value;if(!g)return null;const x=jf({docsRepo:g,docsBranch:m,docsDir:y,filePathRelative:c.value.filePathRelative,editLinkPattern:u.value.editLinkPattern??a.value.editLinkPattern});return x?{text:k??"Edit this page",link:x}:null})},n=()=>{const a=Fe(),c=pn(),u=ht();return R(()=>{var g,m;return!(u.value.lastUpdated??a.value.lastUpdated??!0)||!((g=c.value.git)!=null&&g.updatedTime)?null:new Date((m=c.value.git)==null?void 0:m.updatedTime).toLocaleString()})},i=()=>{const a=Fe(),c=pn(),u=ht();return R(()=>{var h;return u.value.contributors??a.value.contributors??!0?((h=c.value.git)==null?void 0:h.contributors)??null:null})},l=Fe(),o=t(),s=n(),r=i();return(a,c)=>{const u=Xt("ClientOnly");return z(),X("footer",Vp,[Y(o)?(z(),X("div",Up,[ie(bt,{class:"meta-item-label",item:Y(o)},null,8,["item"])])):Se("",!0),Y(s)?(z(),X("div",Gp,[fe("span",qp,Ie(Y(l).lastUpdatedText)+": ",1),ie(u,null,{default:He(()=>[fe("span",Kp,Ie(Y(s)),1)]),_:1})])):Se("",!0),Y(r)&&Y(r).length?(z(),X("div",Qp,[fe("span",Jp,Ie(Y(l).contributorsText)+": ",1),fe("span",Yp,[(z(!0),X(ye,null,jt(Y(r),(d,h)=>(z(),X(ye,{key:h},[fe("span",{class:"contributor",title:`email: ${d.email}`},Ie(d.name),9,Xp),h!==Y(r).length-1?(z(),X(ye,{key:0},[Ft(", ")],64)):Se("",!0)],64))),128))])])):Se("",!0)])}}}),eg=Ee(Zp,[["__file","PageMeta.vue"]]),tg=["aria-label"],ng={class:"inner"},ig={key:0,class:"prev"},lg={key:1,class:"next"},og=ge({__name:"PageNav",setup(e){const t=(u,d)=>d===!1?null:dt(d)?oo(u):Kl(d)?d:!1,n=(u,d,h)=>{const g=u.findIndex(m=>m.link===d);if(g!==-1){const m=u[g+h];return m!=null&&m.link?m:null}for(const m of u)if(m.children){const y=n(m.children,d,h);if(y)return y}return null},i=ht(),l=so(),o=ln(),s=nn(),r=R(()=>{const u=t(s,i.value.prev);return u!==!1?u:n(l.value,o.path,-1)}),a=R(()=>{const u=t(s,i.value.next);return u!==!1?u:n(l.value,o.path,1)}),c=R(()=>Fe().value.pageNavbarLabel??"page navigation");return(u,d)=>r.value||a.value?(z(),X("nav",{key:0,class:"page-nav","aria-label":c.value},[fe("p",ng,[r.value?(z(),X("span",ig,[ie(bt,{item:r.value},null,8,["item"])])):Se("",!0),a.value?(z(),X("span",lg,[ie(bt,{item:a.value},null,8,["item"])])):Se("",!0)])],8,tg)):Se("",!0)}}),sg=Ee(og,[["__file","PageNav.vue"]]),rg={class:"page"},ag={class:"theme-default-content"},cg=ge({__name:"Page",setup(e){return(t,n)=>{const i=Xt("Content");return z(),X("main",rg,[we(t.$slots,"top"),fe("div",ag,[we(t.$slots,"content-top"),ie(i),we(t.$slots,"content-bottom")]),ie(eg),ie(sg),we(t.$slots,"bottom")])}}}),ug=Ee(cg,[["__file","Page.vue"]]),dg={class:"sidebar-item-children"},hg=ge({__name:"SidebarItem",props:{item:{type:Object,required:!0},depth:{type:Number,required:!1,default:0}},setup(e){const t=e,{item:n,depth:i}=ji(t),l=ln(),o=nn(),s=R(()=>Jr(n.value,l)),r=R(()=>({"sidebar-item":!0,"sidebar-heading":i.value===0,active:s.value,collapsible:n.value.collapsible})),a=R(()=>n.value.collapsible?s.value:!0),[c,u]=mh(a.value),d=g=>{n.value.collapsible&&(g.preventDefault(),u())},h=o.afterEach(g=>{kn(()=>{c.value=a.value})});return Bi(()=>{h()}),(g,m)=>{var k;const y=Xt("SidebarItem",!0);return z(),X("li",null,[Y(n).link?(z(),xe(bt,{key:0,class:qe(r.value),item:Y(n)},null,8,["class","item"])):(z(),X("p",{key:1,tabindex:"0",class:qe(r.value),onClick:d,onKeydown:Au(d,["enter"])},[Ft(Ie(Y(n).text)+" ",1),Y(n).collapsible?(z(),X("span",{key:0,class:qe(["arrow",Y(c)?"down":"right"])},null,2)):Se("",!0)],34)),(k=Y(n).children)!=null&&k.length?(z(),xe(na,{key:2},{default:He(()=>[Ei(fe("ul",dg,[(z(!0),X(ye,null,jt(Y(n).children,x=>(z(),xe(y,{key:`${Y(i)}${x.text}${x.link}`,item:x,depth:Y(i)+1},null,8,["item","depth"]))),128))],512),[[Pi,Y(c)]])]),_:1})):Se("",!0)])}}}),fg=Ee(hg,[["__file","SidebarItem.vue"]]),pg={key:0,class:"sidebar-items"},gg=ge({__name:"SidebarItems",setup(e){const t=ln(),n=so();return Ve(()=>{Me(()=>t.hash,i=>{const l=document.querySelector(".sidebar");if(!l)return;const o=document.querySelector(`.sidebar a.sidebar-item[href="${t.path}${i}"]`);if(!o)return;const{top:s,height:r}=l.getBoundingClientRect(),{top:a,height:c}=o.getBoundingClientRect();as+r&&o.scrollIntoView(!1)})}),(i,l)=>Y(n).length?(z(),X("ul",pg,[(z(!0),X(ye,null,jt(Y(n),o=>(z(),xe(fg,{key:`${o.text}${o.link}`,item:o},null,8,["item"]))),128))])):Se("",!0)}}),mg=Ee(gg,[["__file","SidebarItems.vue"]]),vg={class:"sidebar"},bg=ge({__name:"Sidebar",setup(e){return(t,n)=>(z(),X("aside",vg,[ie(ia),we(t.$slots,"top"),ie(mg),we(t.$slots,"bottom")]))}}),wg=Ee(bg,[["__file","Sidebar.vue"]]),yg=ge({__name:"Layout",setup(e){const t=pn(),n=ht(),i=Fe(),l=R(()=>n.value.navbar!==!1&&i.value.navbar!==!1),o=so(),s=re(!1),r=k=>{s.value=typeof k=="boolean"?k:!s.value},a={x:0,y:0},c=k=>{a.x=k.changedTouches[0].clientX,a.y=k.changedTouches[0].clientY},u=k=>{const x=k.changedTouches[0].clientX-a.x,I=k.changedTouches[0].clientY-a.y;Math.abs(x)>Math.abs(I)&&Math.abs(x)>40&&(x>0&&a.x<=80?r(!0):r(!1))},d=R(()=>[{"no-navbar":!l.value,"no-sidebar":!o.value.length,"sidebar-open":s.value},n.value.pageClass]);let h;Ve(()=>{h=nn().afterEach(()=>{r(!1)})}),$i(()=>{h()});const g=Qr(),m=g.resolve,y=g.pending;return(k,x)=>(z(),X("div",{class:qe(["theme-container",d.value]),onTouchstart:c,onTouchend:u},[we(k.$slots,"navbar",{},()=>[l.value?(z(),xe(zp,{key:0,onToggleSidebar:r},{before:He(()=>[we(k.$slots,"navbar-before")]),after:He(()=>[we(k.$slots,"navbar-after")]),_:3})):Se("",!0)]),fe("div",{class:"sidebar-mask",onClick:x[0]||(x[0]=I=>r(!1))}),we(k.$slots,"sidebar",{},()=>[ie(wg,null,{top:He(()=>[we(k.$slots,"sidebar-top")]),bottom:He(()=>[we(k.$slots,"sidebar-bottom")]),_:3})]),we(k.$slots,"page",{},()=>[Y(n).home?(z(),xe(up,{key:0})):(z(),xe(ei,{key:1,name:"fade-slide-y",mode:"out-in",onBeforeEnter:Y(m),onBeforeLeave:Y(y)},{default:He(()=>[(z(),xe(ug,{key:Y(t).path},{top:He(()=>[we(k.$slots,"page-top")]),"content-top":He(()=>[we(k.$slots,"page-content-top")]),"content-bottom":He(()=>[we(k.$slots,"page-content-bottom")]),bottom:He(()=>[we(k.$slots,"page-bottom")]),_:3}))]),_:3},8,["onBeforeEnter","onBeforeLeave"]))])],34))}}),kg=Ee(yg,[["__file","Layout.vue"]]),_g={class:"theme-container"},Cg={class:"page"},Eg={class:"theme-default-content"},xg=fe("h1",null,"404",-1),Sg=ge({__name:"NotFound",setup(e){const t=_n(),n=Fe(),i=n.value.notFound??["Not Found"],l=()=>i[Math.floor(Math.random()*i.length)],o=n.value.home??t.value,s=n.value.backToHome??"Back to home";return(r,a)=>(z(),X("div",_g,[fe("main",Cg,[fe("div",Eg,[xg,fe("blockquote",null,Ie(l()),1),ie(Y(ni),{to:Y(o)},{default:He(()=>[Ft(Ie(Y(s)),1)]),_:1},8,["to"])])])]))}}),Lg=Ee(Sg,[["__file","NotFound.vue"]]),Ig=yt({enhance({app:e,router:t}){ul("Badge")||e.component("Badge",Ef),ul("CodeGroup")||e.component("CodeGroup",xf),ul("CodeGroupItem")||e.component("CodeGroupItem",Lf),e.component("AutoLinkExternalIcon",()=>{const i=e.component("ExternalLinkIcon");return i?ce(i):null}),e.component("NavbarSearch",()=>{const i=e.component("Docsearch")||e.component("SearchBox");return i?ce(i):null});const n=t.options.scrollBehavior;t.options.scrollBehavior=async(...i)=>(await Qr().wait(),n(...i))},setup(){Pf(),Hf()},layouts:{Layout:kg,NotFound:Lg}}),Pg=e=>e instanceof Element?document.activeElement===e&&(["TEXTAREA","SELECT","INPUT"].includes(e.tagName)||e.hasAttribute("contenteditable")):!1,Ag=(e,t)=>t.some(n=>{if(dt(n))return n===e.key;const{key:i,ctrl:l=!1,shift:o=!1,alt:s=!1}=n;return i===e.key&&l===e.ctrlKey&&o===e.shiftKey&&s===e.altKey}),Tg=/[^\x00-\x7F]/,Wg=e=>e.split(/\s+/g).map(t=>t.trim()).filter(t=>!!t),ks=e=>e.replace(/[-/\\^$*+?.()|[\]{}]/g,"\\$&"),_s=(e,t)=>{const n=t.join(" "),i=Wg(e);if(Tg.test(e))return i.some(s=>n.toLowerCase().indexOf(s)>-1);const l=e.endsWith(" ");return new RegExp(i.map((s,r)=>i.length===r+1&&!l?`(?=.*\\b${ks(s)})`:`(?=.*\\b${ks(s)}\\b)`).join("")+".+","gi").test(n)},Rg=({input:e,hotKeys:t})=>{if(t.value.length===0)return;const n=i=>{e.value&&Ag(i,t.value)&&!Pg(i.target)&&(i.preventDefault(),e.value.focus())};Ve(()=>{document.addEventListener("keydown",n)}),Bi(()=>{document.removeEventListener("keydown",n)})},Og=[{title:"",headers:[{level:2,title:"How to use this documentation",slug:"how-to-use-this-documentation",link:"#how-to-use-this-documentation",children:[{level:3,title:"Explain Like I'm 5",slug:"explain-like-i-m-5",link:"#explain-like-i-m-5",children:[]},{level:3,title:"Stand-alone chapters",slug:"stand-alone-chapters",link:"#stand-alone-chapters",children:[]},{level:3,title:"Search function",slug:"search-function",link:"#search-function",children:[]}]}],path:"/",pathLocale:"/",extraFields:[]},{title:"Contribution FAQ",headers:[{level:3,title:"How to donate to Wasabi Wallet?",slug:"how-to-donate-to-wasabi-wallet",link:"#how-to-donate-to-wasabi-wallet",children:[]},{level:2,title:"You can become a Wasabika",slug:"you-can-become-a-wasabika",link:"#you-can-become-a-wasabika",children:[{level:3,title:"How should I start contributing to Wasabi?",slug:"how-should-i-start-contributing-to-wasabi",link:"#how-should-i-start-contributing-to-wasabi",children:[]},{level:3,title:"Is there a bounty program?",slug:"is-there-a-bounty-program",link:"#is-there-a-bounty-program",children:[]},{level:3,title:"How can I report a bug?",slug:"how-can-i-report-a-bug",link:"#how-can-i-report-a-bug",children:[]},{level:3,title:"How can I request a feature?",slug:"how-can-i-request-a-feature",link:"#how-can-i-request-a-feature",children:[]},{level:3,title:"How can I get help and support?",slug:"how-can-i-get-help-and-support",link:"#how-can-i-get-help-and-support",children:[]},{level:3,title:"What does the Wasabi project need help with?",slug:"what-does-the-wasabi-project-need-help-with",link:"#what-does-the-wasabi-project-need-help-with",children:[]}]}],path:"/FAQ/FAQ-Contribution.html",pathLocale:"/",extraFields:[]},{title:"Bitcoin Privacy FAQ",headers:[{level:2,title:"Why Privacy matters",slug:"why-privacy-matters",link:"#why-privacy-matters",children:[{level:3,title:"I have nothing to hide, do I still need financial privacy?",slug:"i-have-nothing-to-hide-do-i-still-need-financial-privacy",link:"#i-have-nothing-to-hide-do-i-still-need-financial-privacy",children:[]},{level:3,title:"How is financial privacy an essential element to fungibility in Bitcoin?",slug:"how-is-financial-privacy-an-essential-element-to-fungibility-in-bitcoin",link:"#how-is-financial-privacy-an-essential-element-to-fungibility-in-bitcoin",children:[]},{level:3,title:"How is financial privacy essential for entrepreneurs?",slug:"how-is-financial-privacy-essential-for-entrepreneurs",link:"#how-is-financial-privacy-essential-for-entrepreneurs",children:[]},{level:3,title:"How is financial privacy essential for personal safety?",slug:"how-is-financial-privacy-essential-for-personal-safety",link:"#how-is-financial-privacy-essential-for-personal-safety",children:[]},{level:3,title:"How is financial privacy essential for human dignity?",slug:"how-is-financial-privacy-essential-for-human-dignity",link:"#how-is-financial-privacy-essential-for-human-dignity",children:[]}]},{level:2,title:"The Privacy of Bitcoin",slug:"the-privacy-of-bitcoin",link:"#the-privacy-of-bitcoin",children:[{level:3,title:"How is Bitcoin good in terms of privacy?",slug:"how-is-bitcoin-good-in-terms-of-privacy",link:"#how-is-bitcoin-good-in-terms-of-privacy",children:[]},{level:3,title:"How is Bitcoin bad in terms of privacy?",slug:"how-is-bitcoin-bad-in-terms-of-privacy",link:"#how-is-bitcoin-bad-in-terms-of-privacy",children:[]},{level:3,title:"Why is it important to run a full node?",slug:"why-is-it-important-to-run-a-full-node",link:"#why-is-it-important-to-run-a-full-node",children:[]},{level:3,title:"How does a full node protect my privacy?",slug:"how-does-a-full-node-protect-my-privacy",link:"#how-does-a-full-node-protect-my-privacy",children:[]},{level:3,title:"How can I set up a full node?",slug:"how-can-i-set-up-a-full-node",link:"#how-can-i-set-up-a-full-node",children:[]},{level:3,title:"Why is it important to use a new address for every payment?",slug:"why-is-it-important-to-use-a-new-address-for-every-payment",link:"#why-is-it-important-to-use-a-new-address-for-every-payment",children:[]},{level:3,title:"What is a coinjoin Sudoku?",slug:"what-is-a-coinjoin-sudoku",link:"#what-is-a-coinjoin-sudoku",children:[]}]},{level:2,title:"The Privacy of Tor",slug:"the-privacy-of-tor",link:"#the-privacy-of-tor",children:[{level:3,title:"How does Tor protect my network-level privacy?",slug:"how-does-tor-protect-my-network-level-privacy",link:"#how-does-tor-protect-my-network-level-privacy",children:[]},{level:3,title:"Why does Tor process keep running after closing Wasabi Wallet?",slug:"why-does-tor-process-keep-running-after-closing-wasabi-wallet",link:"#why-does-tor-process-keep-running-after-closing-wasabi-wallet",children:[]},{level:3,title:"My country/ISP is blocking/censoring Tor, how can I use Wasabi with Tor bridges?",slug:"my-country-isp-is-blocking-censoring-tor-how-can-i-use-wasabi-with-tor-bridges",link:"#my-country-isp-is-blocking-censoring-tor-how-can-i-use-wasabi-with-tor-bridges",children:[]}]}],path:"/FAQ/FAQ-GeneralBitcoinPrivacy.html",pathLocale:"/",extraFields:[]},{title:"Installation FAQ",headers:[{level:2,title:"Installing the Package",slug:"installing-the-package",link:"#installing-the-package",children:[{level:3,title:"Where can I download Wasabi?",slug:"where-can-i-download-wasabi",link:"#where-can-i-download-wasabi",children:[]},{level:3,title:"Why is it important to verify PGP signatures?",slug:"why-is-it-important-to-verify-pgp-signatures",link:"#why-is-it-important-to-verify-pgp-signatures",children:[]},{level:3,title:"How can I verify PGP signatures?",slug:"how-can-i-verify-pgp-signatures",link:"#how-can-i-verify-pgp-signatures",children:[]},{level:3,title:"How do I install Wasabi on Debian and Ubuntu?",slug:"how-do-i-install-wasabi-on-debian-and-ubuntu",link:"#how-do-i-install-wasabi-on-debian-and-ubuntu",children:[]},{level:3,title:"How do I install Wasabi on other Linux?",slug:"how-do-i-install-wasabi-on-other-linux",link:"#how-do-i-install-wasabi-on-other-linux",children:[]},{level:3,title:"How do I install Wasabi on Windows?",slug:"how-do-i-install-wasabi-on-windows",link:"#how-do-i-install-wasabi-on-windows",children:[]},{level:3,title:"How do I install Wasabi on macOS?",slug:"how-do-i-install-wasabi-on-macos",link:"#how-do-i-install-wasabi-on-macos",children:[]},{level:3,title:"Why are there two different packages for macOS (intel and Apple Silicon)?",slug:"why-are-there-two-different-packages-for-macos-intel-and-apple-silicon",link:"#why-are-there-two-different-packages-for-macos-intel-and-apple-silicon",children:[]},{level:3,title:"What happens when I install the wrong package for macOS?",slug:"what-happens-when-i-install-the-wrong-package-for-macos",link:"#what-happens-when-i-install-the-wrong-package-for-macos",children:[]},{level:3,title:"Do I need to install Tor separately?",slug:"do-i-need-to-install-tor-separately",link:"#do-i-need-to-install-tor-separately",children:[]},{level:3,title:"Can I use Wasabi on Tails?",slug:"can-i-use-wasabi-on-tails",link:"#can-i-use-wasabi-on-tails",children:[]},{level:3,title:"Can I use Wasabi on Whonix?",slug:"can-i-use-wasabi-on-whonix",link:"#can-i-use-wasabi-on-whonix",children:[]},{level:3,title:'What are the differences between the Debian/Ubuntu version and the "Other Linux" version?',slug:"what-are-the-differences-between-the-debian-ubuntu-version-and-the-other-linux-version",link:"#what-are-the-differences-between-the-debian-ubuntu-version-and-the-other-linux-version",children:[]}]},{level:2,title:"Update Wasabi",slug:"update-wasabi",link:"#update-wasabi",children:[{level:3,title:"Why should I update Wasabi?",slug:"why-should-i-update-wasabi",link:"#why-should-i-update-wasabi",children:[]},{level:3,title:"How do I check the current version of Wasabi?",slug:"how-do-i-check-the-current-version-of-wasabi",link:"#how-do-i-check-the-current-version-of-wasabi",children:[]},{level:3,title:"How do I know about a new version of Wasabi?",slug:"how-do-i-know-about-a-new-version-of-wasabi",link:"#how-do-i-know-about-a-new-version-of-wasabi",children:[]},{level:3,title:"How do I securely upgrade Wasabi?",slug:"how-do-i-securely-upgrade-wasabi",link:"#how-do-i-securely-upgrade-wasabi",children:[]},{level:3,title:"What does Auto download new version in the settings mean?",slug:"what-does-auto-download-new-version-in-the-settings-mean",link:"#what-does-auto-download-new-version-in-the-settings-mean",children:[]},{level:3,title:"How does the Auto download new version work?",slug:"how-does-the-auto-download-new-version-work",link:"#how-does-the-auto-download-new-version-work",children:[]}]},{level:2,title:"Advanced Installation",slug:"advanced-installation",link:"#advanced-installation",children:[{level:3,title:"How do I compile Wasabi from source?",slug:"how-do-i-compile-wasabi-from-source",link:"#how-do-i-compile-wasabi-from-source",children:[]},{level:3,title:"How can I verify the deterministic build?",slug:"how-can-i-verify-the-deterministic-build",link:"#how-can-i-verify-the-deterministic-build",children:[]},{level:3,title:"My antivirus marks Wasabi Wallet as a virus. Am I downloading the right software?",slug:"my-antivirus-marks-wasabi-wallet-as-a-virus-am-i-downloading-the-right-software",link:"#my-antivirus-marks-wasabi-wallet-as-a-virus-am-i-downloading-the-right-software",children:[]},{level:3,title:"Why is the executable called wassabee?",slug:"why-is-the-executable-called-wassabee",link:"#why-is-the-executable-called-wassabee",children:[]}]}],path:"/FAQ/FAQ-Installation.html",pathLocale:"/",extraFields:[]},{title:"Introduction FAQ",headers:[{level:2,title:"The Basics",slug:"the-basics",link:"#the-basics",children:[{level:3,title:"Who can use Wasabi?",slug:"who-can-use-wasabi",link:"#who-can-use-wasabi",children:[]},{level:3,title:"What is a coinjoin?",slug:"what-is-a-coinjoin",link:"#what-is-a-coinjoin",children:[]},{level:3,title:"Do I need to trust Wasabi with my coins?",slug:"do-i-need-to-trust-wasabi-with-my-coins",link:"#do-i-need-to-trust-wasabi-with-my-coins",children:[]},{level:3,title:"What is the privacy I get after mixing with Wasabi?",slug:"what-is-the-privacy-i-get-after-mixing-with-wasabi",link:"#what-is-the-privacy-i-get-after-mixing-with-wasabi",children:[]},{level:3,title:"Why is Wasabi Bitcoin-only?",slug:"why-is-wasabi-bitcoin-only",link:"#why-is-wasabi-bitcoin-only",children:[]},{level:3,title:"What is considered a sufficient anonymity score?",slug:"what-is-considered-a-sufficient-anonymity-score",link:"#what-is-considered-a-sufficient-anonymity-score",children:[]},{level:3,title:"Is there a way to check Wasabi's uptime status?",slug:"is-there-a-way-to-check-wasabi-s-uptime-status",link:"#is-there-a-way-to-check-wasabi-s-uptime-status",children:[]},{level:3,title:"What software supplies the block filters that Wasabi uses?",slug:"what-software-supplies-the-block-filters-that-wasabi-uses",link:"#what-software-supplies-the-block-filters-that-wasabi-uses",children:[]},{level:3,title:"Is the Backend's (Coordinator) code open-source?",slug:"is-the-backend-s-coordinator-code-open-source",link:"#is-the-backend-s-coordinator-code-open-source",children:[]},{level:3,title:"Is there an Android/iOs version?",slug:"is-there-an-android-ios-version",link:"#is-there-an-android-ios-version",children:[]},{level:3,title:"Where can I find Wasabi Wallet on social media?",slug:"where-can-i-find-wasabi-wallet-on-social-media",link:"#where-can-i-find-wasabi-wallet-on-social-media",children:[]}]},{level:2,title:"For advanced Wasabikas",slug:"for-advanced-wasabikas",link:"#for-advanced-wasabikas",children:[{level:3,title:"Can the coordinator attack me?",slug:"can-the-coordinator-attack-me",link:"#can-the-coordinator-attack-me",children:[]},{level:3,title:"What is the history of Wasabi?",slug:"what-is-the-history-of-wasabi",link:"#what-is-the-history-of-wasabi",children:[]},{level:3,title:"Why is Wasabi libre and open-source software?",slug:"why-is-wasabi-libre-and-open-source-software",link:"#why-is-wasabi-libre-and-open-source-software",children:[]},{level:3,title:"What is the general idea of WabiSabi coinjoin?",slug:"what-is-the-general-idea-of-wabisabi-coinjoin",link:"#what-is-the-general-idea-of-wabisabi-coinjoin",children:[]},{level:3,title:"What are the supported operating systems?",slug:"what-are-the-supported-operating-systems",link:"#what-are-the-supported-operating-systems",children:[]},{level:3,title:"What are the minimal requirements to run Wasabi?",slug:"what-are-the-minimal-requirements-to-run-wasabi",link:"#what-are-the-minimal-requirements-to-run-wasabi",children:[]}]}],path:"/FAQ/FAQ-Introduction.html",pathLocale:"/",extraFields:[]},{title:"Use of Wasabi FAQ",headers:[{level:2,title:"General",slug:"general",link:"#general",children:[{level:3,title:"How do I start using Wasabi?",slug:"how-do-i-start-using-wasabi",link:"#how-do-i-start-using-wasabi",children:[]},{level:3,title:"How do I generate a new wallet?",slug:"how-do-i-generate-a-new-wallet",link:"#how-do-i-generate-a-new-wallet",children:[]},{level:3,title:"Can I rename my Wallet?",slug:"can-i-rename-my-wallet",link:"#can-i-rename-my-wallet",children:[]},{level:3,title:"What is the password used for?",slug:"what-is-the-password-used-for",link:"#what-is-the-password-used-for",children:[]},{level:3,title:"What password should I use?",slug:"what-password-should-i-use",link:"#what-password-should-i-use",children:[]},{level:3,title:"Where can I find the Wasabi data folder?",slug:"where-can-i-find-the-wasabi-data-folder",link:"#where-can-i-find-the-wasabi-data-folder",children:[]},{level:3,title:"Can I spend my bitcoin without the password?",slug:"can-i-spend-my-bitcoin-without-the-password",link:"#can-i-spend-my-bitcoin-without-the-password",children:[]},{level:3,title:"Why BIP 38?",slug:"why-bip-38",link:"#why-bip-38",children:[]},{level:3,title:"What are the terms and conditions?",slug:"what-are-the-terms-and-conditions",link:"#what-are-the-terms-and-conditions",children:[]},{level:3,title:"Can I import a watch-only extended public key?",slug:"can-i-import-a-watch-only-extended-public-key",link:"#can-i-import-a-watch-only-extended-public-key",children:[]},{level:3,title:"What does the privacy progress mean?",slug:"what-does-the-privacy-progress-mean",link:"#what-does-the-privacy-progress-mean",children:[]},{level:3,title:"Why does the privacy progress change if I select a different coinjoin strategy?",slug:"why-does-the-privacy-progress-change-if-i-select-a-different-coinjoin-strategy",link:"#why-does-the-privacy-progress-change-if-i-select-a-different-coinjoin-strategy",children:[]},{level:3,title:"What does the bar with the colored segments mean?",slug:"what-does-the-bar-with-the-colored-segments-mean",link:"#what-does-the-bar-with-the-colored-segments-mean",children:[]},{level:3,title:"How can I display the fee in sats?",slug:"how-can-i-display-the-fee-in-sats",link:"#how-can-i-display-the-fee-in-sats",children:[]},{level:3,title:"What is the box (music box) at the bottom of the wallet's main view?",slug:"what-is-the-box-music-box-at-the-bottom-of-the-wallet-s-main-view",link:"#what-is-the-box-music-box-at-the-bottom-of-the-wallet-s-main-view",children:[]},{level:3,title:"Does Wasabi support Taproot?",slug:"does-wasabi-support-taproot",link:"#does-wasabi-support-taproot",children:[]}]},{level:2,title:"Synchronization",slug:"synchronization",link:"#synchronization",children:[{level:3,title:"What are BIP-158 block filters?",slug:"what-are-bip-158-block-filters",link:"#what-are-bip-158-block-filters",children:[]},{level:3,title:"How does Wasabi download a relevant block?",slug:"how-does-wasabi-download-a-relevant-block",link:"#how-does-wasabi-download-a-relevant-block",children:[]},{level:3,title:"How do I know if the synchronization is finished?",slug:"how-do-i-know-if-the-synchronization-is-finished",link:"#how-do-i-know-if-the-synchronization-is-finished",children:[]},{level:3,title:"Why does the Tor status have a warning triangle icon?",slug:"why-does-the-tor-status-have-a-warning-triangle-icon",link:"#why-does-the-tor-status-have-a-warning-triangle-icon",children:[]},{level:3,title:"How long does the initial, and a subsequent synchronization take?",slug:"how-long-does-the-initial-and-a-subsequent-synchronization-take",link:"#how-long-does-the-initial-and-a-subsequent-synchronization-take",children:[]},{level:3,title:"Can I shutdown my computer while a wallet is synchronizing?",slug:"can-i-shutdown-my-computer-while-a-wallet-is-synchronizing",link:"#can-i-shutdown-my-computer-while-a-wallet-is-synchronizing",children:[]},{level:3,title:"How do I resync (rescan) my wallet?",slug:"how-do-i-resync-rescan-my-wallet",link:"#how-do-i-resync-rescan-my-wallet",children:[]},{level:3,title:"Can Wasabi work with a pruned bitcoin node?",slug:"can-wasabi-work-with-a-pruned-bitcoin-node",link:"#can-wasabi-work-with-a-pruned-bitcoin-node",children:[]},{level:3,title:"Can I run a Wasabi headless daemon?",slug:"can-i-run-a-wasabi-headless-daemon",link:"#can-i-run-a-wasabi-headless-daemon",children:[]}]},{level:2,title:"Receive",slug:"receive",link:"#receive",children:[{level:3,title:"Why is it bad to re-use addresses?",slug:"why-is-it-bad-to-re-use-addresses",link:"#why-is-it-bad-to-re-use-addresses",children:[]},{level:3,title:"How do I generate a new receiving address?",slug:"how-do-i-generate-a-new-receiving-address",link:"#how-do-i-generate-a-new-receiving-address",children:[]},{level:3,title:"Where can I find previously generated addresses?",slug:"where-can-i-find-previously-generated-addresses",link:"#where-can-i-find-previously-generated-addresses",children:[]},{level:3,title:"What is the gap limit?",slug:"what-is-the-gap-limit",link:"#what-is-the-gap-limit",children:[]},{level:3,title:"How do I change the gap limit of a wallet?",slug:"how-do-i-change-the-gap-limit-of-a-wallet",link:"#how-do-i-change-the-gap-limit-of-a-wallet",children:[]},{level:3,title:"Why do I have to label my address?",slug:"why-do-i-have-to-label-my-address",link:"#why-do-i-have-to-label-my-address",children:[]},{level:3,title:"How can I change the label of my receive address?",slug:"how-can-i-change-the-label-of-my-receive-address",link:"#how-can-i-change-the-label-of-my-receive-address",children:[]},{level:3,title:"How can I edit the labels of my address after a transaction has gone through?",slug:"how-can-i-edit-the-labels-of-my-address-after-a-transaction-has-gone-through",link:"#how-can-i-edit-the-labels-of-my-address-after-a-transaction-has-gone-through",children:[]},{level:3,title:"Are there privacy concerns regarding whom I send my address?",slug:"are-there-privacy-concerns-regarding-whom-i-send-my-address",link:"#are-there-privacy-concerns-regarding-whom-i-send-my-address",children:[]},{level:3,title:"Why does Wasabi only use SegWit bech32 addresses?",slug:"why-does-wasabi-only-use-segwit-bech32-addresses",link:"#why-does-wasabi-only-use-segwit-bech32-addresses",children:[]},{level:3,title:"Why do some third party services say the Wasabi address is invalid?",slug:"why-do-some-third-party-services-say-the-wasabi-address-is-invalid",link:"#why-do-some-third-party-services-say-the-wasabi-address-is-invalid",children:[]},{level:3,title:"Where can I find my address QR code?",slug:"where-can-i-find-my-address-qr-code",link:"#where-can-i-find-my-address-qr-code",children:[]},{level:3,title:"What derivation paths does Wasabi use?",slug:"what-derivation-paths-does-wasabi-use",link:"#what-derivation-paths-does-wasabi-use",children:[]},{level:3,title:"Can I generate a multi signature script?",slug:"can-i-generate-a-multi-signature-script",link:"#can-i-generate-a-multi-signature-script",children:[]},{level:3,title:"How does Wasabi know of incoming transactions to the mempool?",slug:"how-does-wasabi-know-of-incoming-transactions-to-the-mempool",link:"#how-does-wasabi-know-of-incoming-transactions-to-the-mempool",children:[]},{level:3,title:"Can I export all my receive addresses?",slug:"can-i-export-all-my-receive-addresses",link:"#can-i-export-all-my-receive-addresses",children:[]}]},{level:2,title:"Send",slug:"send",link:"#send",children:[{level:3,title:"How do I set a destination address?",slug:"how-do-i-set-a-destination-address",link:"#how-do-i-set-a-destination-address",children:[]},{level:3,title:"How do I set the payment amount?",slug:"how-do-i-set-the-payment-amount",link:"#how-do-i-set-the-payment-amount",children:[]},{level:3,title:"Can I pay to many addresses?",slug:"can-i-pay-to-many-addresses",link:"#can-i-pay-to-many-addresses",children:[]},{level:3,title:"Can I set a custom change address?",slug:"can-i-set-a-custom-change-address",link:"#can-i-set-a-custom-change-address",children:[]},{level:3,title:"Does Wasabi support sending RBF?",slug:"does-wasabi-support-sending-rbf",link:"#does-wasabi-support-sending-rbf",children:[]},{level:3,title:"Why does Wasabi choose a new random node every time I send a transaction?",slug:"why-does-wasabi-choose-a-new-random-node-every-time-i-send-a-transaction",link:"#why-does-wasabi-choose-a-new-random-node-every-time-i-send-a-transaction",children:[]},{level:3,title:"What fee should I select?",slug:"what-fee-should-i-select",link:"#what-fee-should-i-select",children:[]},{level:3,title:"How do I set custom fee rate?",slug:"how-do-i-set-custom-fee-rate",link:"#how-do-i-set-custom-fee-rate",children:[]},{level:3,title:"How does Wasabi select which coins to send?",slug:"how-does-wasabi-select-which-coins-to-send",link:"#how-does-wasabi-select-which-coins-to-send",children:[]},{level:3,title:"How is the transaction broadcast?",slug:"how-is-the-transaction-broadcast",link:"#how-is-the-transaction-broadcast",children:[]},{level:3,title:"What is the cluster history?",slug:"what-is-the-cluster-history",link:"#what-is-the-cluster-history",children:[]},{level:3,title:"Why Wasabi did not send some of my selected coins?",slug:"why-wasabi-did-not-send-some-of-my-selected-coins",link:"#why-wasabi-did-not-send-some-of-my-selected-coins",children:[]},{level:3,title:"How can I bump the transaction fee with child pays for parent (CPFP)?",slug:"how-can-i-bump-the-transaction-fee-with-child-pays-for-parent-cpfp",link:"#how-can-i-bump-the-transaction-fee-with-child-pays-for-parent-cpfp",children:[]},{level:3,title:"How can I speed up a pending/unconfirmed transaction (CPFP/RBF)?",slug:"how-can-i-speed-up-a-pending-unconfirmed-transaction-cpfp-rbf",link:"#how-can-i-speed-up-a-pending-unconfirmed-transaction-cpfp-rbf",children:[]},{level:3,title:"How can I cancel a pending/unconfirmed transaction?",slug:"how-can-i-cancel-a-pending-unconfirmed-transaction",link:"#how-can-i-cancel-a-pending-unconfirmed-transaction",children:[]},{level:3,title:"Why is there no Send button, only the Receive button is displayed?",slug:"why-is-there-no-send-button-only-the-receive-button-is-displayed",link:"#why-is-there-no-send-button-only-the-receive-button-is-displayed",children:[]},{level:3,title:"Can I send (privately) from my wallet when the privacy progress is below 100%?",slug:"can-i-send-privately-from-my-wallet-when-the-privacy-progress-is-below-100",link:"#can-i-send-privately-from-my-wallet-when-the-privacy-progress-is-below-100",children:[]}]},{level:2,title:"CoinJoin",slug:"coinjoin",link:"#coinjoin",children:[{level:3,title:"What's the legal status of Wasabi/CoinJoin?",slug:"what-s-the-legal-status-of-wasabi-coinjoin",link:"#what-s-the-legal-status-of-wasabi-coinjoin",children:[]},{level:3,title:"What is the minimum amount required to coinjoin?",slug:"what-is-the-minimum-amount-required-to-coinjoin",link:"#what-is-the-minimum-amount-required-to-coinjoin",children:[]},{level:3,title:"What is the maximum amount I can coinjoin?",slug:"what-is-the-maximum-amount-i-can-coinjoin",link:"#what-is-the-maximum-amount-i-can-coinjoin",children:[]},{level:3,title:"What are the fees for the coinjoin?",slug:"what-are-the-fees-for-the-coinjoin",link:"#what-are-the-fees-for-the-coinjoin",children:[]},{level:3,title:"What is the anonymity set?",slug:"what-is-the-anonymity-set",link:"#what-is-the-anonymity-set",children:[]},{level:3,title:"What is the anonymity score?",slug:"what-is-the-anonymity-score",link:"#what-is-the-anonymity-score",children:[]},{level:3,title:"What is the difference between anonymity set and anonymity score?",slug:"what-is-the-difference-between-anonymity-set-and-anonymity-score",link:"#what-is-the-difference-between-anonymity-set-and-anonymity-score",children:[]},{level:3,title:"What are the equal denominations created in a coinjoin round?",slug:"what-are-the-equal-denominations-created-in-a-coinjoin-round",link:"#what-are-the-equal-denominations-created-in-a-coinjoin-round",children:[]},{level:3,title:"What is happening in the input registration phase?",slug:"what-is-happening-in-the-input-registration-phase",link:"#what-is-happening-in-the-input-registration-phase",children:[]},{level:3,title:"What is happening in the connection confirmation phase?",slug:"what-is-happening-in-the-connection-confirmation-phase",link:"#what-is-happening-in-the-connection-confirmation-phase",children:[]},{level:3,title:"What is happening in the output registration phase?",slug:"what-is-happening-in-the-output-registration-phase",link:"#what-is-happening-in-the-output-registration-phase",children:[]},{level:3,title:"What is happening in the signing phase?",slug:"what-is-happening-in-the-signing-phase",link:"#what-is-happening-in-the-signing-phase",children:[]},{level:3,title:"What is happening during the blame round?",slug:"what-is-happening-during-the-blame-round",link:"#what-is-happening-during-the-blame-round",children:[]},{level:3,title:"What is happening in the broadcasting phase?",slug:"what-is-happening-in-the-broadcasting-phase",link:"#what-is-happening-in-the-broadcasting-phase",children:[]},{level:3,title:"Is there any additional anonymity using multiple wallets for CoinJoins?",slug:"is-there-any-additional-anonymity-using-multiple-wallets-for-coinjoins",link:"#is-there-any-additional-anonymity-using-multiple-wallets-for-coinjoins",children:[]},{level:3,title:"How is the anonymity set target determined for CoinJoins?",slug:"how-is-the-anonymity-set-target-determined-for-coinjoins",link:"#how-is-the-anonymity-set-target-determined-for-coinjoins",children:[]},{level:3,title:"I'd like to experience coinjoin but I'm not comfortable using real Bitcoin. What can I do?",slug:"i-d-like-to-experience-coinjoin-but-i-m-not-comfortable-using-real-bitcoin-what-can-i-do",link:"#i-d-like-to-experience-coinjoin-but-i-m-not-comfortable-using-real-bitcoin-what-can-i-do",children:[]},{level:3,title:"Does Wasabi have to stay on during coinjoin?",slug:"does-wasabi-have-to-stay-on-during-coinjoin",link:"#does-wasabi-have-to-stay-on-during-coinjoin",children:[]},{level:3,title:"What if there's a power outage during CoinJoin? Do I lose my coins?",slug:"what-if-there-s-a-power-outage-during-coinjoin-do-i-lose-my-coins",link:"#what-if-there-s-a-power-outage-during-coinjoin-do-i-lose-my-coins",children:[]},{level:3,title:"How much anonymity set do I need?",slug:"how-much-anonymity-set-do-i-need",link:"#how-much-anonymity-set-do-i-need",children:[]},{level:3,title:"How does my wallet communicate with the Wasabi coordinator server?",slug:"how-does-my-wallet-communicate-with-the-wasabi-coordinator-server",link:"#how-does-my-wallet-communicate-with-the-wasabi-coordinator-server",children:[]},{level:3,title:"What is the address of the coordinator?",slug:"what-is-the-address-of-the-coordinator",link:"#what-is-the-address-of-the-coordinator",children:[]},{level:3,title:"What is the maximum number of coins that can be registered in a coinjoin?",slug:"what-is-the-maximum-number-of-coins-that-can-be-registered-in-a-coinjoin",link:"#what-is-the-maximum-number-of-coins-that-can-be-registered-in-a-coinjoin",children:[]},{level:3,title:"How many coins/outputs do I get from a coinjoin?",slug:"how-many-coins-outputs-do-i-get-from-a-coinjoin",link:"#how-many-coins-outputs-do-i-get-from-a-coinjoin",children:[]},{level:3,title:"Can I manually select which coins to register for coinjoin?",slug:"can-i-manually-select-which-coins-to-register-for-coinjoin",link:"#can-i-manually-select-which-coins-to-register-for-coinjoin",children:[]},{level:3,title:"How to exclude/freeze coins from coinjoin?",slug:"how-to-exclude-freeze-coins-from-coinjoin",link:"#how-to-exclude-freeze-coins-from-coinjoin",children:[]},{level:3,title:"How long does it take to make my wallet 100% private?",slug:"how-long-does-it-take-to-make-my-wallet-100-private",link:"#how-long-does-it-take-to-make-my-wallet-100-private",children:[]},{level:3,title:"What coinjoin strategy should I select?",slug:"what-coinjoin-strategy-should-i-select",link:"#what-coinjoin-strategy-should-i-select",children:[]},{level:3,title:"What is the coinjoin strategy?",slug:"what-is-the-coinjoin-strategy",link:"#what-is-the-coinjoin-strategy",children:[]},{level:3,title:"What are the differences/settings per coinjoin strategy?",slug:"what-are-the-differences-settings-per-coinjoin-strategy",link:"#what-are-the-differences-settings-per-coinjoin-strategy",children:[]},{level:3,title:"What does the Auto-start coinjoin threshold mean in the coinjoin settings?",slug:"what-does-the-auto-start-coinjoin-threshold-mean-in-the-coinjoin-settings",link:"#what-does-the-auto-start-coinjoin-threshold-mean-in-the-coinjoin-settings",children:[]},{level:3,title:"What does the Red coin isolation mean in the coinjoin settings?",slug:"what-does-the-red-coin-isolation-mean-in-the-coinjoin-settings",link:"#what-does-the-red-coin-isolation-mean-in-the-coinjoin-settings",children:[]},{level:3,title:"Do coinjoin transactions signal RBF?",slug:"do-coinjoin-transactions-signal-rbf",link:"#do-coinjoin-transactions-signal-rbf",children:[]},{level:3,title:"Why do my coins occasionally get banned from participating in CoinJoin?",slug:"why-do-my-coins-occasionally-get-banned-from-participating-in-coinjoin",link:"#why-do-my-coins-occasionally-get-banned-from-participating-in-coinjoin",children:[]},{level:3,title:"How do I change the coordinator?",slug:"how-do-i-change-the-coordinator",link:"#how-do-i-change-the-coordinator",children:[]}]},{level:2,title:"Backup and Recovery",slug:"backup-and-recovery",link:"#backup-and-recovery",children:[{level:3,title:"How do I back up my mnemonic words?",slug:"how-do-i-back-up-my-mnemonic-words",link:"#how-do-i-back-up-my-mnemonic-words",children:[]},{level:3,title:"How do I back up my wallet file?",slug:"how-do-i-back-up-my-wallet-file",link:"#how-do-i-back-up-my-wallet-file",children:[]},{level:3,title:"What do I need to recover my wallet?",slug:"what-do-i-need-to-recover-my-wallet",link:"#what-do-i-need-to-recover-my-wallet",children:[]},{level:3,title:"Can I recover my wallet without the password?",slug:"can-i-recover-my-wallet-without-the-password",link:"#can-i-recover-my-wallet-without-the-password",children:[]},{level:3,title:"What should I do if I forget my password?",slug:"what-should-i-do-if-i-forget-my-password",link:"#what-should-i-do-if-i-forget-my-password",children:[]},{level:3,title:"I lost the recovery words but I still have the .json file and the password. Is my wallet still recoverable?",slug:"i-lost-the-recovery-words-but-i-still-have-the-json-file-and-the-password-is-my-wallet-still-recoverable",link:"#i-lost-the-recovery-words-but-i-still-have-the-json-file-and-the-password-is-my-wallet-still-recoverable",children:[]},{level:3,title:"Can I verify the Recovery Words of an existing wallet?",slug:"can-i-verify-the-recovery-words-of-an-existing-wallet",link:"#can-i-verify-the-recovery-words-of-an-existing-wallet",children:[]}]},{level:2,title:"Hardware Wallet",slug:"hardware-wallet",link:"#hardware-wallet",children:[{level:3,title:"What hardware wallets does Wasabi support?",slug:"what-hardware-wallets-does-wasabi-support",link:"#what-hardware-wallets-does-wasabi-support",children:[]},{level:3,title:"Why does Wasabi use the Hardware Wallet Interface?",slug:"why-does-wasabi-use-the-hardware-wallet-interface",link:"#why-does-wasabi-use-the-hardware-wallet-interface",children:[]},{level:3,title:"Does Wasabi support the hidden wallets of hardware wallets?",slug:"does-wasabi-support-the-hidden-wallets-of-hardware-wallets",link:"#does-wasabi-support-the-hidden-wallets-of-hardware-wallets",children:[]},{level:3,title:"How can I generate a Wasabi skeleton wallet file in ColdCard?",slug:"how-can-i-generate-a-wasabi-skeleton-wallet-file-in-coldcard",link:"#how-can-i-generate-a-wasabi-skeleton-wallet-file-in-coldcard",children:[]},{level:3,title:"How can I import the Wasabi skeleton wallet file?",slug:"how-can-i-import-the-wasabi-skeleton-wallet-file",link:"#how-can-i-import-the-wasabi-skeleton-wallet-file",children:[]},{level:3,title:"How can I generate a receiving address of my hardware wallet?",slug:"how-can-i-generate-a-receiving-address-of-my-hardware-wallet",link:"#how-can-i-generate-a-receiving-address-of-my-hardware-wallet",children:[]},{level:3,title:"How can I sign a transaction with a USB connected hardware wallet?",slug:"how-can-i-sign-a-transaction-with-a-usb-connected-hardware-wallet",link:"#how-can-i-sign-a-transaction-with-a-usb-connected-hardware-wallet",children:[]},{level:3,title:"How can I build and export a transaction to ColdCard?",slug:"how-can-i-build-and-export-a-transaction-to-coldcard",link:"#how-can-i-build-and-export-a-transaction-to-coldcard",children:[]},{level:3,title:"How can I sign a transaction on the ColdCard?",slug:"how-can-i-sign-a-transaction-on-the-coldcard",link:"#how-can-i-sign-a-transaction-on-the-coldcard",children:[]},{level:3,title:"How can I import and broadcast a final transaction from ColdCard?",slug:"how-can-i-import-and-broadcast-a-final-transaction-from-coldcard",link:"#how-can-i-import-and-broadcast-a-final-transaction-from-coldcard",children:[]},{level:3,title:"Can I coinjoin bitcoins on my hardware wallet?",slug:"can-i-coinjoin-bitcoins-on-my-hardware-wallet",link:"#can-i-coinjoin-bitcoins-on-my-hardware-wallet",children:[]},{level:3,title:"Does Ledger Live send my public keys and addresses to a third party server?",slug:"does-ledger-live-send-my-public-keys-and-addresses-to-a-third-party-server",link:"#does-ledger-live-send-my-public-keys-and-addresses-to-a-third-party-server",children:[]},{level:3,title:"After I coinjoined my coins and reached 100% privacy, I sent them to my hardware wallet and now the coins have anonscore 1. Why?",slug:"after-i-coinjoined-my-coins-and-reached-100-privacy-i-sent-them-to-my-hardware-wallet-and-now-the-coins-have-anonscore-1-why",link:"#after-i-coinjoined-my-coins-and-reached-100-privacy-i-sent-them-to-my-hardware-wallet-and-now-the-coins-have-anonscore-1-why",children:[]},{level:3,title:"Can I use Trezor One with Wasabi?",slug:"can-i-use-trezor-one-with-wasabi",link:"#can-i-use-trezor-one-with-wasabi",children:[]},{level:3,title:"Can I use BitBox with Wasabi?",slug:"can-i-use-bitbox-with-wasabi",link:"#can-i-use-bitbox-with-wasabi",children:[]},{level:3,title:"How can I type in the passphrase of my Trezor T?",slug:"how-can-i-type-in-the-passphrase-of-my-trezor-t",link:"#how-can-i-type-in-the-passphrase-of-my-trezor-t",children:[]},{level:3,title:"I have coinjoined with a Trezor device on Trezor Suite, but in Wasabi I cannot see my coins?",slug:"i-have-coinjoined-with-a-trezor-device-on-trezor-suite-but-in-wasabi-i-cannot-see-my-coins",link:"#i-have-coinjoined-with-a-trezor-device-on-trezor-suite-but-in-wasabi-i-cannot-see-my-coins",children:[]},{level:3,title:"How can I use Hardware Wallets on Linux (udev rules)?",slug:"how-can-i-use-hardware-wallets-on-linux-udev-rules",link:"#how-can-i-use-hardware-wallets-on-linux-udev-rules",children:[]}]},{level:2,title:"History",slug:"history",link:"#history",children:[{level:3,title:"How can I check the transactions history?",slug:"how-can-i-check-the-transactions-history",link:"#how-can-i-check-the-transactions-history",children:[]},{level:3,title:"How can I see coinjoins in the history list?",slug:"how-can-i-see-coinjoins-in-the-history-list",link:"#how-can-i-see-coinjoins-in-the-history-list",children:[]},{level:3,title:"Can I sort the history items?",slug:"can-i-sort-the-history-items",link:"#can-i-sort-the-history-items",children:[]},{level:3,title:"Can I search for a transaction ID in the history?",slug:"can-i-search-for-a-transaction-id-in-the-history",link:"#can-i-search-for-a-transaction-id-in-the-history",children:[]},{level:3,title:"Can I export a list of transactions?",slug:"can-i-export-a-list-of-transactions",link:"#can-i-export-a-list-of-transactions",children:[]}]},{level:2,title:"Settings",slug:"settings",link:"#settings",children:[{level:3,title:"How do I connect my own full node to Wasabi?",slug:"how-do-i-connect-my-own-full-node-to-wasabi",link:"#how-do-i-connect-my-own-full-node-to-wasabi",children:[]},{level:3,title:"How can I turn off Tor?",slug:"how-can-i-turn-off-tor",link:"#how-can-i-turn-off-tor",children:[]},{level:3,title:"How can I change the anonymity score target?",slug:"how-can-i-change-the-anonymity-score-target",link:"#how-can-i-change-the-anonymity-score-target",children:[]},{level:3,title:"What is the dust threshold?",slug:"what-is-the-dust-threshold",link:"#what-is-the-dust-threshold",children:[]},{level:3,title:"Where can I find the logs?",slug:"where-can-i-find-the-logs",link:"#where-can-i-find-the-logs",children:[]},{level:3,title:"How to activate/deactivate discreet mode?",slug:"how-to-activate-deactivate-discreet-mode",link:"#how-to-activate-deactivate-discreet-mode",children:[]},{level:3,title:"How can I change to the white theme?",slug:"how-can-i-change-to-the-white-theme",link:"#how-can-i-change-to-the-white-theme",children:[]}]},{level:2,title:"Coin Control Best Practices",slug:"coin-control-best-practices",link:"#coin-control-best-practices",children:[{level:3,title:"What are coins?",slug:"what-are-coins",link:"#what-are-coins",children:[]},{level:3,title:"How can I enable (manual) coin control?",slug:"how-can-i-enable-manual-coin-control",link:"#how-can-i-enable-manual-coin-control",children:[]},{level:3,title:"How do I select coins for spending?",slug:"how-do-i-select-coins-for-spending",link:"#how-do-i-select-coins-for-spending",children:[]},{level:3,title:"Can I consolidate anonset coins?",slug:"can-i-consolidate-anonset-coins",link:"#can-i-consolidate-anonset-coins",children:[]},{level:3,title:"How can I send my anonset coins to my hardware wallet?",slug:"how-can-i-send-my-anonset-coins-to-my-hardware-wallet",link:"#how-can-i-send-my-anonset-coins-to-my-hardware-wallet",children:[]},{level:3,title:"What can I do with small change?",slug:"what-can-i-do-with-small-change",link:"#what-can-i-do-with-small-change",children:[]}]},{level:2,title:"Music Box",slug:"music-box",link:"#music-box",children:[{level:3,title:"What does Awaiting cheaper coinjoins mean?",slug:"what-does-awaiting-cheaper-coinjoins-mean",link:"#what-does-awaiting-cheaper-coinjoins-mean",children:[]},{level:3,title:"What does Awaiting the blame round mean?",slug:"what-does-awaiting-the-blame-round-mean",link:"#what-does-awaiting-the-blame-round-mean",children:[]},{level:3,title:"What does Insufficient funds eligible for coinjoin mean?",slug:"what-does-insufficient-funds-eligible-for-coinjoin-mean",link:"#what-does-insufficient-funds-eligible-for-coinjoin-mean",children:[]},{level:3,title:"What does Some funds are rejected from coinjoining mean?",slug:"what-does-some-funds-are-rejected-from-coinjoining-mean",link:"#what-does-some-funds-are-rejected-from-coinjoining-mean",children:[]}]},{level:2,title:"Buy Anything Button",slug:"buy-anything-button",link:"#buy-anything-button",children:[{level:3,title:"What is the Buy Anything Button?",slug:"what-is-the-buy-anything-button",link:"#what-is-the-buy-anything-button",children:[]},{level:3,title:"How does the Buy Anything Button work?",slug:"how-does-the-buy-anything-button-work",link:"#how-does-the-buy-anything-button-work",children:[]},{level:3,title:"Does the Buy Anything Button hurt my privacy?",slug:"does-the-buy-anything-button-hurt-my-privacy",link:"#does-the-buy-anything-button-hurt-my-privacy",children:[]},{level:3,title:"What can I order and for whom is this available?",slug:"what-can-i-order-and-for-whom-is-this-available",link:"#what-can-i-order-and-for-whom-is-this-available",children:[]}]},{level:2,title:"Advanced Usage",slug:"advanced-usage",link:"#advanced-usage",children:[{level:3,title:"Can I change the default ports for the Wasabi's bundled Tor?",slug:"can-i-change-the-default-ports-for-the-wasabi-s-bundled-tor",link:"#can-i-change-the-default-ports-for-the-wasabi-s-bundled-tor",children:[]},{level:3,title:"Where does the BTC exchange rate come from?",slug:"where-does-the-btc-exchange-rate-come-from",link:"#where-does-the-btc-exchange-rate-come-from",children:[]}]}],path:"/FAQ/FAQ-UseWasabi.html",pathLocale:"/",extraFields:[]},{title:"Frequently Asked Questions",headers:[{level:2,title:"Chapters",slug:"chapters",link:"#chapters",children:[]}],path:"/FAQ/",pathLocale:"/",extraFields:[]},{title:"Contribution Checklist",headers:[{level:2,title:"Who is a contributor?",slug:"who-is-a-contributor",link:"#who-is-a-contributor",children:[]},{level:2,title:"Say hello and get started",slug:"say-hello-and-get-started",link:"#say-hello-and-get-started",children:[]},{level:2,title:"Learn how Wasabikas work",slug:"learn-how-wasabikas-work",link:"#learn-how-wasabikas-work",children:[]},{level:2,title:"What to work on",slug:"what-to-work-on",link:"#what-to-work-on",children:[{level:3,title:"Education Contributor",slug:"education-contributor",link:"#education-contributor",children:[]},{level:3,title:"GitHub Contributor",slug:"github-contributor",link:"#github-contributor",children:[]}]}],path:"/building-wasabi/ContributionChecklist.html",pathLocale:"/",extraFields:[]},{title:"MIT License",headers:[],path:"/building-wasabi/LICENSE.html",pathLocale:"/",extraFields:[]},{title:"Building Wasabi",headers:[{level:2,title:"Chapters",slug:"chapters",link:"#chapters",children:[{level:3,title:"Contributing to Wasabi",slug:"contributing-to-wasabi",link:"#contributing-to-wasabi",children:[]},{level:3,title:"Advanced",slug:"advanced",link:"#advanced",children:[]}]}],path:"/building-wasabi/",pathLocale:"/",extraFields:[]},{title:"Security Policy",headers:[],path:"/building-wasabi/Security.html",pathLocale:"/",extraFields:[]},{title:"Getting Started",headers:[{level:2,title:"Download Wasabi",slug:"download-wasabi",link:"#download-wasabi",children:[]},{level:2,title:"Verify the Download",slug:"verify-the-download",link:"#verify-the-download",children:[]},{level:2,title:"Install Wasabi",slug:"install-wasabi",link:"#install-wasabi",children:[]},{level:2,title:"Welcome Screen",slug:"welcome-screen",link:"#welcome-screen",children:[]},{level:2,title:"Add Wallet",slug:"add-wallet",link:"#add-wallet",children:[]},{level:2,title:"Receive bitcoin",slug:"receive-bitcoin",link:"#receive-bitcoin",children:[]},{level:2,title:"Coinjoin",slug:"coinjoin",link:"#coinjoin",children:[]},{level:2,title:"Funds 100% private",slug:"funds-100-private",link:"#funds-100-private",children:[]},{level:2,title:"Use the private bitcoin",slug:"use-the-private-bitcoin",link:"#use-the-private-bitcoin",children:[]}],path:"/getting-started/",pathLocale:"/",extraFields:[]},{title:"Bitcoin in general",headers:[{level:2,title:"Bitcoin in general",slug:"bitcoin-in-general",link:"#bitcoin-in-general",children:[{level:3,title:"Address",slug:"address",link:"#address",children:[]},{level:3,title:"Bitcoin",slug:"bitcoin",link:"#bitcoin",children:[]},{level:3,title:"Bitcoin Core",slug:"bitcoin-core",link:"#bitcoin-core",children:[]},{level:3,title:"Bitcoin Improvement Proposal (BIP)",slug:"bitcoin-improvement-proposal-bip",link:"#bitcoin-improvement-proposal-bip",children:[]},{level:3,title:"Bitcoin Knots",slug:"bitcoin-knots",link:"#bitcoin-knots",children:[]},{level:3,title:"Block",slug:"block",link:"#block",children:[]},{level:3,title:"Blockchain",slug:"blockchain",link:"#blockchain",children:[]},{level:3,title:"Change",slug:"change",link:"#change",children:[]},{level:3,title:"Child Pays For Parent (CPFP)",slug:"child-pays-for-parent-cpfp",link:"#child-pays-for-parent-cpfp",children:[]},{level:3,title:"Coinbase",slug:"coinbase",link:"#coinbase",children:[]},{level:3,title:"Coinbase Transaction",slug:"coinbase-transaction",link:"#coinbase-transaction",children:[]},{level:3,title:"Cold Storage",slug:"cold-storage",link:"#cold-storage",children:[]},{level:3,title:"Confirmations",slug:"confirmations",link:"#confirmations",children:[]},{level:3,title:"Consensus",slug:"consensus",link:"#consensus",children:[]},{level:3,title:"Consensus Rules",slug:"consensus-rules",link:"#consensus-rules",children:[]},{level:3,title:"Custodial (Wallet or Mixer)",slug:"custodial-wallet-or-mixer",link:"#custodial-wallet-or-mixer",children:[]},{level:3,title:"Difficulty",slug:"difficulty",link:"#difficulty",children:[]},{level:3,title:"Difficulty Retargeting (Difficulty Adjustment)",slug:"difficulty-retargeting-difficulty-adjustment",link:"#difficulty-retargeting-difficulty-adjustment",children:[]},{level:3,title:"Difficulty Target",slug:"difficulty-target",link:"#difficulty-target",children:[]},{level:3,title:"ECDSA",slug:"ecdsa",link:"#ecdsa",children:[]},{level:3,title:"Fork",slug:"fork",link:"#fork",children:[]},{level:3,title:"Full node",slug:"full-node",link:"#full-node",children:[]},{level:3,title:"Fungibility",slug:"fungibility",link:"#fungibility",children:[]},{level:3,title:"Genesis Block",slug:"genesis-block",link:"#genesis-block",children:[]},{level:3,title:"Hard Fork",slug:"hard-fork",link:"#hard-fork",children:[]},{level:3,title:"Hardware Wallet (HWW)",slug:"hardware-wallet-hww",link:"#hardware-wallet-hww",children:[]},{level:3,title:"Hash",slug:"hash",link:"#hash",children:[]},{level:3,title:"Hierarchical Deterministic (HD) Protocol",slug:"hierarchical-deterministic-hd-protocol",link:"#hierarchical-deterministic-hd-protocol",children:[]},{level:3,title:"Hierarchical Deterministic (HD) Wallet",slug:"hierarchical-deterministic-hd-wallet",link:"#hierarchical-deterministic-hd-wallet",children:[]},{level:3,title:"Hot Wallet",slug:"hot-wallet",link:"#hot-wallet",children:[]},{level:3,title:"Input",slug:"input",link:"#input",children:[]},{level:3,title:"Lightning Network (LN)",slug:"lightning-network-ln",link:"#lightning-network-ln",children:[]},{level:3,title:"Mainnet",slug:"mainnet",link:"#mainnet",children:[]},{level:3,title:"Mempool",slug:"mempool",link:"#mempool",children:[]},{level:3,title:"Merkle Root",slug:"merkle-root",link:"#merkle-root",children:[]},{level:3,title:"Merkle Tree",slug:"merkle-tree",link:"#merkle-tree",children:[]},{level:3,title:"Miner",slug:"miner",link:"#miner",children:[]},{level:3,title:"Mining Reward",slug:"mining-reward",link:"#mining-reward",children:[]},{level:3,title:"Multisignature (multisig)",slug:"multisignature-multisig",link:"#multisignature-multisig",children:[]},{level:3,title:"Non-Custodial (Wallet or Mixer)",slug:"non-custodial-wallet-or-mixer",link:"#non-custodial-wallet-or-mixer",children:[]},{level:3,title:"Nonce",slug:"nonce",link:"#nonce",children:[]},{level:3,title:"Off-chain Transaction",slug:"off-chain-transaction",link:"#off-chain-transaction",children:[]},{level:3,title:"Output",slug:"output",link:"#output",children:[]},{level:3,title:"P2PKH",slug:"p2pkh",link:"#p2pkh",children:[]},{level:3,title:"P2SH",slug:"p2sh",link:"#p2sh",children:[]},{level:3,title:"P2TR",slug:"p2tr",link:"#p2tr",children:[]},{level:3,title:"P2WPKH",slug:"p2wpkh",link:"#p2wpkh",children:[]},{level:3,title:"Paper Wallet",slug:"paper-wallet",link:"#paper-wallet",children:[]},{level:3,title:"Partially Signed Bitcoin Transaction (PSBT)",slug:"partially-signed-bitcoin-transaction-psbt",link:"#partially-signed-bitcoin-transaction-psbt",children:[]},{level:3,title:"Pay-to-Witness-Public-Key-Hash (P2WPKH)",slug:"pay-to-witness-public-key-hash-p2wpkh",link:"#pay-to-witness-public-key-hash-p2wpkh",children:[]},{level:3,title:"Payment Channels",slug:"payment-channels",link:"#payment-channels",children:[]},{level:3,title:"Plausible deniability",slug:"plausible-deniability",link:"#plausible-deniability",children:[]},{level:3,title:"Private Key",slug:"private-key",link:"#private-key",children:[]},{level:3,title:"Proof of Work (POW)",slug:"proof-of-work-pow",link:"#proof-of-work-pow",children:[]},{level:3,title:"Public Key",slug:"public-key",link:"#public-key",children:[]},{level:3,title:"Regtest",slug:"regtest",link:"#regtest",children:[]},{level:3,title:"Replace by Fee (RBF)",slug:"replace-by-fee-rbf",link:"#replace-by-fee-rbf",children:[]},{level:3,title:"satoshi (sat)",slug:"satoshi-sat",link:"#satoshi-sat",children:[]},{level:3,title:"Satoshi Nakamoto",slug:"satoshi-nakamoto",link:"#satoshi-nakamoto",children:[]},{level:3,title:"Schnorr Digital Signature Scheme",slug:"schnorr-digital-signature-scheme",link:"#schnorr-digital-signature-scheme",children:[]},{level:3,title:"Script",slug:"script",link:"#script",children:[]},{level:3,title:"ScriptPubKey",slug:"scriptpubkey",link:"#scriptpubkey",children:[]},{level:3,title:"ScriptSig",slug:"scriptsig",link:"#scriptsig",children:[]},{level:3,title:"Segregated Witness (SegWit)",slug:"segregated-witness-segwit",link:"#segregated-witness-segwit",children:[]},{level:3,title:"Simplified Payment Verification (SPV)",slug:"simplified-payment-verification-spv",link:"#simplified-payment-verification-spv",children:[]},{level:3,title:"Soft Fork",slug:"soft-fork",link:"#soft-fork",children:[]},{level:3,title:"Taproot",slug:"taproot",link:"#taproot",children:[]},{level:3,title:"Testnet",slug:"testnet",link:"#testnet",children:[]},{level:3,title:"Timechain",slug:"timechain",link:"#timechain",children:[]},{level:3,title:"Transaction",slug:"transaction",link:"#transaction",children:[]},{level:3,title:"Transaction Fees",slug:"transaction-fees",link:"#transaction-fees",children:[]},{level:3,title:"Unspent Transaction Output (UTXO)",slug:"unspent-transaction-output-utxo",link:"#unspent-transaction-output-utxo",children:[]},{level:3,title:"Wallet",slug:"wallet",link:"#wallet",children:[]}]}],path:"/glossary/Glossary-GeneralBitcoin.html",pathLocale:"/",extraFields:[]},{title:"Privacy and Wasabi",headers:[{level:2,title:"Privacy and Wasabi",slug:"privacy-and-wasabi",link:"#privacy-and-wasabi",children:[{level:3,title:"#twoweeks",slug:"twoweeks",link:"#twoweeks",children:[]},{level:3,title:"Absolute min input count",slug:"absolute-min-input-count",link:"#absolute-min-input-count",children:[]},{level:3,title:"Address Reuse",slug:"address-reuse",link:"#address-reuse",children:[]},{level:3,title:"Anonymity Score (anonscore)",slug:"anonymity-score-anonscore",link:"#anonymity-score-anonscore",children:[]},{level:3,title:"Anonymity Set (anonset)",slug:"anonymity-set-anonset",link:"#anonymity-set-anonset",children:[]},{level:3,title:"Auto-start coinjoin (Pleb Stop) threshold",slug:"auto-start-coinjoin-pleb-stop-threshold",link:"#auto-start-coinjoin-pleb-stop-threshold",children:[]},{level:3,title:"Backend",slug:"backend",link:"#backend",children:[]},{level:3,title:"Block filters",slug:"block-filters",link:"#block-filters",children:[]},{level:3,title:"Blockchain Analysis",slug:"blockchain-analysis",link:"#blockchain-analysis",children:[]},{level:3,title:"Bloom Filter",slug:"bloom-filter",link:"#bloom-filter",children:[]},{level:3,title:"Change Address Detection",slug:"change-address-detection",link:"#change-address-detection",children:[]},{level:3,title:"Chaumian CoinJoin",slug:"chaumian-coinjoin",link:"#chaumian-coinjoin",children:[]},{level:3,title:"Client",slug:"client",link:"#client",children:[]},{level:3,title:"Cluster",slug:"cluster",link:"#cluster",children:[]},{level:3,title:"Coin Control",slug:"coin-control",link:"#coin-control",children:[]},{level:3,title:"CoinJoin (CJ)",slug:"coinjoin-cj",link:"#coinjoin-cj",children:[]},{level:3,title:"Coinjoin Strategy",slug:"coinjoin-strategy",link:"#coinjoin-strategy",children:[]},{level:3,title:"Coinjoin Time Preference",slug:"coinjoin-time-preference",link:"#coinjoin-time-preference",children:[]},{level:3,title:"CoinJoined coins",slug:"coinjoined-coins",link:"#coinjoined-coins",children:[]},{level:3,title:"Common-Input-Ownership heuristic",slug:"common-input-ownership-heuristic",link:"#common-input-ownership-heuristic",children:[]},{level:3,title:"Coordinator",slug:"coordinator",link:"#coordinator",children:[]},{level:3,title:"Daemon",slug:"daemon",link:"#daemon",children:[]},{level:3,title:"Discreet Mode",slug:"discreet-mode",link:"#discreet-mode",children:[]},{level:3,title:"Dust",slug:"dust",link:"#dust",children:[]},{level:3,title:"Know Your Customer (KYC)",slug:"know-your-customer-kyc",link:"#know-your-customer-kyc",children:[]},{level:3,title:"Label",slug:"label",link:"#label",children:[]},{level:3,title:"Max Coordination Fee Rate",slug:"max-coordination-fee-rate",link:"#max-coordination-fee-rate",children:[]},{level:3,title:"Max Coinjoin Mining Fee Rate",slug:"max-coinjoin-mining-fee-rate",link:"#max-coinjoin-mining-fee-rate",children:[]},{level:3,title:"Observers",slug:"observers",link:"#observers",children:[]},{level:3,title:"Pay to EndPoint (P2EP)",slug:"pay-to-endpoint-p2ep",link:"#pay-to-endpoint-p2ep",children:[]},{level:3,title:"Peers",slug:"peers",link:"#peers",children:[]},{level:3,title:"RPC",slug:"rpc",link:"#rpc",children:[]},{level:3,title:"Safety coinjoin",slug:"safety-coinjoin",link:"#safety-coinjoin",children:[]},{level:3,title:"Taint",slug:"taint",link:"#taint",children:[]},{level:3,title:"The Onion Router (Tor)",slug:"the-onion-router-tor",link:"#the-onion-router-tor",children:[]},{level:3,title:"Transaction Surveillance Company",slug:"transaction-surveillance-company",link:"#transaction-surveillance-company",children:[]},{level:3,title:"Tumbling / Tumbler",slug:"tumbling-tumbler",link:"#tumbling-tumbler",children:[]},{level:3,title:"TurboSync",slug:"turbosync",link:"#turbosync",children:[]},{level:3,title:"WabiSabi",slug:"wabisabi",link:"#wabisabi",children:[]},{level:3,title:"Wallet fingerprinting",slug:"wallet-fingerprinting",link:"#wallet-fingerprinting",children:[]},{level:3,title:"Wasabika",slug:"wasabika",link:"#wasabika",children:[]},{level:3,title:"XPUB (Extended Public Key)",slug:"xpub-extended-public-key",link:"#xpub-extended-public-key",children:[]},{level:3,title:"ZeroLink",slug:"zerolink",link:"#zerolink",children:[]}]}],path:"/glossary/Glossary-PrivacyWasabi.html",pathLocale:"/",extraFields:[]},{title:"Glossary",headers:[{level:2,title:"Chapters",slug:"chapters",link:"#chapters",children:[]}],path:"/glossary/",pathLocale:"/",extraFields:[]},{title:"Supported BIPs",headers:[{level:2,title:"What is supported",slug:"what-is-supported",link:"#what-is-supported",children:[]},{level:2,title:"What is not supported",slug:"what-is-not-supported",link:"#what-is-not-supported",children:[]}],path:"/using-wasabi/BIPs.html",pathLocale:"/",extraFields:[]},{title:"Wasabi Backup Best Practices",headers:[{level:2,title:"Common mediums for backups",slug:"common-mediums-for-backups",link:"#common-mediums-for-backups",children:[{level:3,title:"Written on a piece of paper",slug:"written-on-a-piece-of-paper",link:"#written-on-a-piece-of-paper",children:[]},{level:3,title:"Printed on a piece of paper",slug:"printed-on-a-piece-of-paper",link:"#printed-on-a-piece-of-paper",children:[]},{level:3,title:"On laminated paper",slug:"on-laminated-paper",link:"#on-laminated-paper",children:[]},{level:3,title:"Engraved / etched / ablated / stamped on a piece of metal",slug:"engraved-etched-ablated-stamped-on-a-piece-of-metal",link:"#engraved-etched-ablated-stamped-on-a-piece-of-metal",children:[]},{level:3,title:"Stored digitally on a computer",slug:"stored-digitally-on-a-computer",link:"#stored-digitally-on-a-computer",children:[]},{level:3,title:"Stored digitally on CD, floppy disk, laserdisc, or mini-disc",slug:"stored-digitally-on-cd-floppy-disk-laserdisc-or-mini-disc",link:"#stored-digitally-on-cd-floppy-disk-laserdisc-or-mini-disc",children:[]},{level:3,title:"Stored digitally on a flash drive",slug:"stored-digitally-on-a-flash-drive",link:"#stored-digitally-on-a-flash-drive",children:[]},{level:3,title:"A pre-funded physical bitcoin coin (where the manufacturer generates and installs the secret key)",slug:"a-pre-funded-physical-bitcoin-coin-where-the-manufacturer-generates-and-installs-the-secret-key",link:"#a-pre-funded-physical-bitcoin-coin-where-the-manufacturer-generates-and-installs-the-secret-key",children:[]}]}],path:"/using-wasabi/BackupBestPractices.html",pathLocale:"/",extraFields:[]},{title:"Bitcoin Full Node",headers:[{level:2,title:"The importance of running a full node",slug:"the-importance-of-running-a-full-node",link:"#the-importance-of-running-a-full-node",children:[]},{level:2,title:"How does Wasabi use your Bitcoin full node",slug:"how-does-wasabi-use-your-bitcoin-full-node",link:"#how-does-wasabi-use-your-bitcoin-full-node",children:[]},{level:2,title:"bitcoind within Wasabi",slug:"bitcoind-within-wasabi",link:"#bitcoind-within-wasabi",children:[]},{level:2,title:"Using an already existing local Bitcoin full node",slug:"using-an-already-existing-local-bitcoin-full-node",link:"#using-an-already-existing-local-bitcoin-full-node",children:[]},{level:2,title:"Using an already existing remote Bitcoin full node",slug:"using-an-already-existing-remote-bitcoin-full-node",link:"#using-an-already-existing-remote-bitcoin-full-node",children:[]},{level:2,title:"Verify that Wasabi is connected to your full node",slug:"verify-that-wasabi-is-connected-to-your-full-node",link:"#verify-that-wasabi-is-connected-to-your-full-node",children:[]}],path:"/using-wasabi/BitcoinFullNode.html",pathLocale:"/",extraFields:[]},{title:"Build from source code",headers:[{level:2,title:"Introduction",slug:"introduction",link:"#introduction",children:[]},{level:2,title:"Get The Requirements",slug:"get-the-requirements",link:"#get-the-requirements",children:[]},{level:2,title:"Get Wasabi",slug:"get-wasabi",link:"#get-wasabi",children:[]},{level:2,title:"Run Wasabi",slug:"run-wasabi",link:"#run-wasabi",children:[]},{level:2,title:"Update Wasabi",slug:"update-wasabi",link:"#update-wasabi",children:[]},{level:2,title:"Check out a developer branch",slug:"check-out-a-developer-branch",link:"#check-out-a-developer-branch",children:[]}],path:"/using-wasabi/BuildSource.html",pathLocale:"/",extraFields:[]},{title:"Change Coins",headers:[{level:2,title:"Types of change",slug:"types-of-change",link:"#types-of-change",children:[{level:3,title:"Non-Coinjoin change",slug:"non-coinjoin-change",link:"#non-coinjoin-change",children:[]},{level:3,title:"Coinjoin change",slug:"coinjoin-change",link:"#coinjoin-change",children:[]}]},{level:2,title:"Why change is an issue",slug:"why-change-is-an-issue",link:"#why-change-is-an-issue",children:[]},{level:2,title:"Your options to use change privately",slug:"your-options-to-use-change-privately",link:"#your-options-to-use-change-privately",children:[{level:3,title:"Avoid change in the first place",slug:"avoid-change-in-the-first-place",link:"#avoid-change-in-the-first-place",children:[]},{level:3,title:"Make it difficult to deduce the change",slug:"make-it-difficult-to-deduce-the-change",link:"#make-it-difficult-to-deduce-the-change",children:[]},{level:3,title:"Spend the change to the same entity as in the initial transaction",slug:"spend-the-change-to-the-same-entity-as-in-the-initial-transaction",link:"#spend-the-change-to-the-same-entity-as-in-the-initial-transaction",children:[]},{level:3,title:"Spend the change with another entity, where you don't mind if each of the two know that you transact with the other entity",slug:"spend-the-change-with-another-entity-where-you-don-t-mind-if-each-of-the-two-know-that-you-transact-with-the-other-entity",link:"#spend-the-change-with-another-entity-where-you-don-t-mind-if-each-of-the-two-know-that-you-transact-with-the-other-entity",children:[]},{level:3,title:"Coinjoin more",slug:"coinjoin-more",link:"#coinjoin-more",children:[]}]}],path:"/using-wasabi/ChangeCoins.html",pathLocale:"/",extraFields:[]},{title:"Coinjoin",headers:[{level:2,title:"Introduction",slug:"introduction",link:"#introduction",children:[]},{level:2,title:"Coinjoin step-by-step",slug:"coinjoin-step-by-step",link:"#coinjoin-step-by-step",children:[{level:3,title:"Music box",slug:"music-box",link:"#music-box",children:[]},{level:3,title:"More Details",slug:"more-details",link:"#more-details",children:[]},{level:3,title:"Fees",slug:"fees",link:"#fees",children:[]}]},{level:2,title:"WabiSabi protocol step-by-step",slug:"wabisabi-protocol-step-by-step",link:"#wabisabi-protocol-step-by-step",children:[{level:3,title:"Input registration",slug:"input-registration",link:"#input-registration",children:[]},{level:3,title:"Connection confirmation",slug:"connection-confirmation",link:"#connection-confirmation",children:[]},{level:3,title:"Output registration",slug:"output-registration",link:"#output-registration",children:[]},{level:3,title:"Signing",slug:"signing",link:"#signing",children:[]},{level:3,title:"Blame round",slug:"blame-round",link:"#blame-round",children:[]},{level:3,title:"Broadcasting",slug:"broadcasting",link:"#broadcasting",children:[]}]},{level:2,title:"Coinjoin Settings",slug:"coinjoin-settings",link:"#coinjoin-settings",children:[{level:3,title:"Automatically start coinjoin",slug:"automatically-start-coinjoin",link:"#automatically-start-coinjoin",children:[]},{level:3,title:"Auto-start coinjoin threshold",slug:"auto-start-coinjoin-threshold",link:"#auto-start-coinjoin-threshold",children:[]},{level:3,title:"Coinjoin Strategy",slug:"coinjoin-strategy",link:"#coinjoin-strategy",children:[]}]},{level:2,title:"Wasabi Coinjoin examples",slug:"wasabi-coinjoin-examples",link:"#wasabi-coinjoin-examples",children:[]}],path:"/using-wasabi/CoinJoin.html",pathLocale:"/",extraFields:[]},{title:"Hardware Wallet",headers:[{level:2,title:"Using hardware wallet step-by-step",slug:"using-hardware-wallet-step-by-step",link:"#using-hardware-wallet-step-by-step",children:[]},{level:2,title:"What is Cold Storage",slug:"what-is-cold-storage",link:"#what-is-cold-storage",children:[]},{level:2,title:"Hardware Wallet with Wasabi",slug:"hardware-wallet-with-wasabi",link:"#hardware-wallet-with-wasabi",children:[{level:3,title:"Connecting via USB",slug:"connecting-via-usb",link:"#connecting-via-usb",children:[]},{level:3,title:"Connecting Coldcard via SD card",slug:"connecting-coldcard-via-sd-card",link:"#connecting-coldcard-via-sd-card",children:[]}]},{level:2,title:"Cold-Wasabi protocol",slug:"cold-wasabi-protocol",link:"#cold-wasabi-protocol",children:[]},{level:2,title:"GUI tutorial",slug:"gui-tutorial",link:"#gui-tutorial",children:[{level:3,title:"Coinjoin on the hot Wasabi",slug:"coinjoin-on-the-hot-wasabi",link:"#coinjoin-on-the-hot-wasabi",children:[]},{level:3,title:"Set up your cold-Wasabi",slug:"set-up-your-cold-wasabi",link:"#set-up-your-cold-wasabi",children:[]},{level:3,title:"Send bitcoins from hot to cold Wasabi",slug:"send-bitcoins-from-hot-to-cold-wasabi",link:"#send-bitcoins-from-hot-to-cold-wasabi",children:[]},{level:3,title:"Send bitcoins from cold Wasabi",slug:"send-bitcoins-from-cold-wasabi",link:"#send-bitcoins-from-cold-wasabi",children:[]}]}],path:"/using-wasabi/ColdWasabi.html",pathLocale:"/",extraFields:[]},{title:"Headless Wasabi Daemon",headers:[{level:2,title:"Introduction",slug:"introduction",link:"#introduction",children:[]},{level:2,title:"How to run",slug:"how-to-run",link:"#how-to-run",children:[{level:3,title:"If the package is installed",slug:"if-the-package-is-installed",link:"#if-the-package-is-installed",children:[]},{level:3,title:"If building from source code",slug:"if-building-from-source-code",link:"#if-building-from-source-code",children:[]}]},{level:2,title:"Examples",slug:"examples",link:"#examples",children:[]}],path:"/using-wasabi/Daemon.html",pathLocale:"/",extraFields:[]},{title:"Deterministic Build",headers:[],path:"/using-wasabi/DeterministicBuild.html",pathLocale:"/",extraFields:[]},{title:"Discreet Mode",headers:[{level:2,title:"How to activate/deactivate Discreet Mode",slug:"how-to-activate-deactivate-discreet-mode",link:"#how-to-activate-deactivate-discreet-mode",children:[]},{level:2,title:"More information on Discreet Mode",slug:"more-information-on-discreet-mode",link:"#more-information-on-discreet-mode",children:[]}],path:"/using-wasabi/DiscreetMode.html",pathLocale:"/",extraFields:[]},{title:"Explain Wasabi like I'm 5",headers:[{level:2,title:"Introduction",slug:"introduction",link:"#introduction",children:[]},{level:2,title:"Installing Wasabi",slug:"installing-wasabi",link:"#installing-wasabi",children:[]},{level:2,title:"Generating a Wallet",slug:"generating-a-wallet",link:"#generating-a-wallet",children:[]},{level:2,title:"Receiving bitcoin",slug:"receiving-bitcoin",link:"#receiving-bitcoin",children:[]},{level:2,title:"Sending bitcoin",slug:"sending-bitcoin",link:"#sending-bitcoin",children:[]},{level:2,title:"Coinjoin with Wasabi",slug:"coinjoin-with-wasabi",link:"#coinjoin-with-wasabi",children:[]}],path:"/using-wasabi/ELI5.html",pathLocale:"/",extraFields:[]},{title:"Restoring Wasabi Wallet in Other Wallets",headers:[{level:2,title:"Compatibility List for Segwit Addresses (bc1)",slug:"compatibility-list-for-segwit-addresses-bc1",link:"#compatibility-list-for-segwit-addresses-bc1",children:[]},{level:2,title:"Compatibility List for Taproot Addresses (bc1p)",slug:"compatibility-list-for-taproot-addresses-bc1p",link:"#compatibility-list-for-taproot-addresses-bc1p",children:[]}],path:"/using-wasabi/ExternalRestore.html",pathLocale:"/",extraFields:[]},{title:"Install-package",headers:[{level:2,title:"Introduction",slug:"introduction",link:"#introduction",children:[]},{level:2,title:"Install Wasabi step-by-step",slug:"install-wasabi-step-by-step",link:"#install-wasabi-step-by-step",children:[]},{level:2,title:"Windows",slug:"windows",link:"#windows",children:[]},{level:2,title:"Debian and Ubuntu",slug:"debian-and-ubuntu",link:"#debian-and-ubuntu",children:[]},{level:2,title:"Other Linux",slug:"other-linux",link:"#other-linux",children:[]},{level:2,title:"macOS",slug:"macos",link:"#macos",children:[{level:3,title:"Optional PGP Verification",slug:"optional-pgp-verification",link:"#optional-pgp-verification",children:[]}]}],path:"/using-wasabi/InstallPackage.html",pathLocale:"/",extraFields:[]},{title:"Password Best Practices",headers:[{level:2,title:"Introduction",slug:"introduction",link:"#introduction",children:[]},{level:2,title:"Password basics",slug:"password-basics",link:"#password-basics",children:[]},{level:2,title:"What not to do",slug:"what-not-to-do",link:"#what-not-to-do",children:[]},{level:2,title:"Use Diceware",slug:"use-diceware",link:"#use-diceware",children:[]},{level:2,title:"Use a dictionary",slug:"use-a-dictionary",link:"#use-a-dictionary",children:[]},{level:2,title:"Use an open-source password manager",slug:"use-an-open-source-password-manager",link:"#use-an-open-source-password-manager",children:[]},{level:2,title:"Password entropy",slug:"password-entropy",link:"#password-entropy",children:[{level:3,title:"How to calculate entropy",slug:"how-to-calculate-entropy",link:"#how-to-calculate-entropy",children:[]},{level:3,title:'"Bits" of entropy',slug:"bits-of-entropy",link:"#bits-of-entropy",children:[]},{level:3,title:"How much entropy is needed",slug:"how-much-entropy-is-needed",link:"#how-much-entropy-is-needed",children:[]}]}],path:"/using-wasabi/PasswordBestPractices.html",pathLocale:"/",extraFields:[]},{title:"PayJoin",headers:[{level:2,title:"Sending PayJoin step-by-step",slug:"sending-payjoin-step-by-step",link:"#sending-payjoin-step-by-step",children:[]},{level:2,title:"The goal of PayJoin",slug:"the-goal-of-payjoin",link:"#the-goal-of-payjoin",children:[]},{level:2,title:"Coordination",slug:"coordination",link:"#coordination",children:[]},{level:2,title:"Fallback transaction",slug:"fallback-transaction",link:"#fallback-transaction",children:[]},{level:2,title:"PayJoin transaction",slug:"payjoin-transaction",link:"#payjoin-transaction",children:[]},{level:2,title:"Advantages of PayJoin",slug:"advantages-of-payjoin",link:"#advantages-of-payjoin",children:[]}],path:"/using-wasabi/PayJoin.html",pathLocale:"/",extraFields:[]},{title:"Using Wasabi",headers:[{level:2,title:"Chapters",slug:"chapters",link:"#chapters",children:[{level:3,title:"Introducing Wasabi",slug:"introducing-wasabi",link:"#introducing-wasabi",children:[]},{level:3,title:"Installing Wasabi",slug:"installing-wasabi",link:"#installing-wasabi",children:[]},{level:3,title:"Using Wasabi",slug:"using-wasabi-1",link:"#using-wasabi-1",children:[]},{level:3,title:"Best Practices",slug:"best-practices",link:"#best-practices",children:[]},{level:3,title:"Restoring Wasabi",slug:"restoring-wasabi",link:"#restoring-wasabi",children:[]},{level:3,title:"Advanced Installing Wasabi",slug:"advanced-installing-wasabi",link:"#advanced-installing-wasabi",children:[]},{level:3,title:"Advanced Using Wasabi",slug:"advanced-using-wasabi",link:"#advanced-using-wasabi",children:[]}]}],path:"/using-wasabi/",pathLocale:"/",extraFields:[]},{title:"RPC Interface",headers:[{level:2,title:"Limitations",slug:"limitations",link:"#limitations",children:[]},{level:2,title:"Configure RPC",slug:"configure-rpc",link:"#configure-rpc",children:[]},{level:2,title:"Available methods",slug:"available-methods",link:"#available-methods",children:[{level:3,title:"getstatus",slug:"getstatus",link:"#getstatus",children:[]},{level:3,title:"createwallet",slug:"createwallet",link:"#createwallet",children:[]},{level:3,title:"recoverwallet",slug:"recoverwallet",link:"#recoverwallet",children:[]},{level:3,title:"listwallets",slug:"listwallets",link:"#listwallets",children:[]},{level:3,title:"loadwallet",slug:"loadwallet",link:"#loadwallet",children:[]},{level:3,title:"listcoins",slug:"listcoins",link:"#listcoins",children:[]},{level:3,title:"listunspentcoins",slug:"listunspentcoins",link:"#listunspentcoins",children:[]},{level:3,title:"getwalletinfo",slug:"getwalletinfo",link:"#getwalletinfo",children:[]},{level:3,title:"getnewaddress",slug:"getnewaddress",link:"#getnewaddress",children:[]},{level:3,title:"send",slug:"send",link:"#send",children:[]},{level:3,title:"build",slug:"build",link:"#build",children:[]},{level:3,title:"broadcast",slug:"broadcast",link:"#broadcast",children:[]},{level:3,title:"speeduptransaction",slug:"speeduptransaction",link:"#speeduptransaction",children:[]},{level:3,title:"canceltransaction",slug:"canceltransaction",link:"#canceltransaction",children:[]},{level:3,title:"gethistory",slug:"gethistory",link:"#gethistory",children:[]},{level:3,title:"getfeerates",slug:"getfeerates",link:"#getfeerates",children:[]},{level:3,title:"listkeys",slug:"listkeys",link:"#listkeys",children:[]},{level:3,title:"excludefromcoinjoin",slug:"excludefromcoinjoin",link:"#excludefromcoinjoin",children:[]},{level:3,title:"startcoinjoin",slug:"startcoinjoin",link:"#startcoinjoin",children:[]},{level:3,title:"payincoinjoin",slug:"payincoinjoin",link:"#payincoinjoin",children:[]},{level:3,title:"listpaymentsincoinjoin",slug:"listpaymentsincoinjoin",link:"#listpaymentsincoinjoin",children:[]},{level:3,title:"cancelpaymentincoinjoin",slug:"cancelpaymentincoinjoin",link:"#cancelpaymentincoinjoin",children:[]},{level:3,title:"startcoinjoinsweep",slug:"startcoinjoinsweep",link:"#startcoinjoinsweep",children:[]},{level:3,title:"stopcoinjoin",slug:"stopcoinjoin",link:"#stopcoinjoin",children:[]},{level:3,title:"buildunsafetransaction",slug:"buildunsafetransaction",link:"#buildunsafetransaction",children:[]},{level:3,title:"stop",slug:"stop",link:"#stop",children:[]}]},{level:2,title:"Errors",slug:"errors",link:"#errors",children:[{level:3,title:"Method not found",slug:"method-not-found",link:"#method-not-found",children:[]},{level:3,title:"Parse error",slug:"parse-error",link:"#parse-error",children:[]},{level:3,title:"Mismatching parameters",slug:"mismatching-parameters",link:"#mismatching-parameters",children:[]}]},{level:2,title:"Expose the RPC server as an onion service",slug:"expose-the-rpc-server-as-an-onion-service",link:"#expose-the-rpc-server-as-an-onion-service",children:[{level:3,title:"Example",slug:"example",link:"#example",children:[]}]}],path:"/using-wasabi/RPC.html",pathLocale:"/",extraFields:[]},{title:"Receive",headers:[{level:2,title:"Generating addresses step-by-step",slug:"generating-addresses-step-by-step",link:"#generating-addresses-step-by-step",children:[]},{level:2,title:"Bitcoin public keys and addresses",slug:"bitcoin-public-keys-and-addresses",link:"#bitcoin-public-keys-and-addresses",children:[]},{level:2,title:"The problem with address reuse",slug:"the-problem-with-address-reuse",link:"#the-problem-with-address-reuse",children:[]},{level:2,title:"The importance of labeling",slug:"the-importance-of-labeling",link:"#the-importance-of-labeling",children:[{level:3,title:"Clusters",slug:"clusters",link:"#clusters",children:[]},{level:3,title:"Coinjoined coins",slug:"coinjoined-coins",link:"#coinjoined-coins",children:[]},{level:3,title:"Final words about labels and examples",slug:"final-words-about-labels-and-examples",link:"#final-words-about-labels-and-examples",children:[]}]}],path:"/using-wasabi/Receive.html",pathLocale:"/",extraFields:[]},{title:"Send",headers:[{level:2,title:"How to send bitcoin step-by-step",slug:"how-to-send-bitcoin-step-by-step",link:"#how-to-send-bitcoin-step-by-step",children:[]},{level:2,title:"Coins",slug:"coins",link:"#coins",children:[]},{level:2,title:"Clusters",slug:"clusters",link:"#clusters",children:[]},{level:2,title:"Anonymity Set",slug:"anonymity-set",link:"#anonymity-set",children:[]},{level:2,title:"Receiving Address",slug:"receiving-address",link:"#receiving-address",children:[]},{level:2,title:"Observers",slug:"observers",link:"#observers",children:[]},{level:2,title:"Amount",slug:"amount",link:"#amount",children:[]},{level:2,title:"Mining Fee",slug:"mining-fee",link:"#mining-fee",children:[]},{level:2,title:"Privacy Suggestions",slug:"privacy-suggestions",link:"#privacy-suggestions",children:[]},{level:2,title:"Password",slug:"password",link:"#password",children:[]},{level:2,title:"Broadcast",slug:"broadcast",link:"#broadcast",children:[]},{level:2,title:"Speed Up or Cancel Transaction",slug:"speed-up-or-cancel-transaction",link:"#speed-up-or-cancel-transaction",children:[]}],path:"/using-wasabi/Send.html",pathLocale:"/",extraFields:[]},{title:"Starting Wasabi with parameters",headers:[{level:2,title:"Available commands",slug:"available-commands",link:"#available-commands",children:[{level:3,title:"Config file configurations",slug:"config-file-configurations",link:"#config-file-configurations",children:[]},{level:3,title:"Non-Config file configurations",slug:"non-config-file-configurations",link:"#non-config-file-configurations",children:[]}]}],path:"/using-wasabi/StartupParameters.html",pathLocale:"/",extraFields:[]},{title:"Testnet",headers:[{level:2,title:"Bitcoin testnet",slug:"bitcoin-testnet",link:"#bitcoin-testnet",children:[]},{level:2,title:"Activating testnet in Wasabi",slug:"activating-testnet-in-wasabi",link:"#activating-testnet-in-wasabi",children:[]},{level:2,title:"Loading a wallet",slug:"loading-a-wallet",link:"#loading-a-wallet",children:[]},{level:2,title:"Receiving testnet bitcoin",slug:"receiving-testnet-bitcoin",link:"#receiving-testnet-bitcoin",children:[]},{level:2,title:"Coinjoin on testnet",slug:"coinjoin-on-testnet",link:"#coinjoin-on-testnet",children:[]}],path:"/using-wasabi/Testnet.html",pathLocale:"/",extraFields:[]},{title:"Wallet Generation",headers:[{level:2,title:"Introduction",slug:"introduction",link:"#introduction",children:[]},{level:2,title:"Generating the wallet step-by-step",slug:"generating-the-wallet-step-by-step",link:"#generating-the-wallet-step-by-step",children:[]},{level:2,title:"Important info about your wallet password",slug:"important-info-about-your-wallet-password",link:"#important-info-about-your-wallet-password",children:[]},{level:2,title:"How are the secrets created",slug:"how-are-the-secrets-created",link:"#how-are-the-secrets-created",children:[]}],path:"/using-wasabi/WalletGeneration.html",pathLocale:"/",extraFields:[]},{title:"Wallet Load",headers:[{level:2,title:"Loading wallet step-by-step",slug:"loading-wallet-step-by-step",link:"#loading-wallet-step-by-step",children:[{level:3,title:"Wallet list",slug:"wallet-list",link:"#wallet-list",children:[]}]},{level:2,title:"Synchronization",slug:"synchronization",link:"#synchronization",children:[{level:3,title:"Filter download",slug:"filter-download",link:"#filter-download",children:[]},{level:3,title:"Filter scanning",slug:"filter-scanning",link:"#filter-scanning",children:[]},{level:3,title:"Block download",slug:"block-download",link:"#block-download",children:[]},{level:3,title:"TurboSync",slug:"turbosync",link:"#turbosync",children:[]}]}],path:"/using-wasabi/WalletLoad.html",pathLocale:"/",extraFields:[]},{title:"Recover a Wallet",headers:[{level:2,title:"Mnemonic Recovery Words and Password",slug:"mnemonic-recovery-words-and-password",link:"#mnemonic-recovery-words-and-password",children:[]},{level:2,title:"Back up Wallet File and Password",slug:"back-up-wallet-file-and-password",link:"#back-up-wallet-file-and-password",children:[]}],path:"/using-wasabi/WalletRecovery.html",pathLocale:"/",extraFields:[]},{title:"Wasabi Setup in Virtual Machines",headers:[{level:2,title:"Benefits of Virtual Machines",slug:"benefits-of-virtual-machines",link:"#benefits-of-virtual-machines",children:[]},{level:2,title:"Qubes",slug:"qubes",link:"#qubes",children:[{level:3,title:"Generate Template VM",slug:"generate-template-vm",link:"#generate-template-vm",children:[]},{level:3,title:"Install Dependencies",slug:"install-dependencies",link:"#install-dependencies",children:[]},{level:3,title:"Generate App VM",slug:"generate-app-vm",link:"#generate-app-vm",children:[]},{level:3,title:"Compile and Run Wasabi",slug:"compile-and-run-wasabi",link:"#compile-and-run-wasabi",children:[]},{level:3,title:"Install Package in App VM",slug:"install-package-in-app-vm",link:"#install-package-in-app-vm",children:[]}]},{level:2,title:"VirtualBox",slug:"virtualbox",link:"#virtualbox",children:[{level:3,title:"Create Your First Virtual Machine",slug:"create-your-first-virtual-machine",link:"#create-your-first-virtual-machine",children:[]},{level:3,title:"Generate a Template VM",slug:"generate-a-template-vm",link:"#generate-a-template-vm",children:[]},{level:3,title:"Install Required Dependencies",slug:"install-required-dependencies",link:"#install-required-dependencies",children:[]},{level:3,title:"Cloning a Virtual Machine",slug:"cloning-a-virtual-machine",link:"#cloning-a-virtual-machine",children:[]},{level:3,title:"How to Create a Linked Clone",slug:"how-to-create-a-linked-clone",link:"#how-to-create-a-linked-clone",children:[]},{level:3,title:"Compile and Run Wasabi in Your VM",slug:"compile-and-run-wasabi-in-your-vm",link:"#compile-and-run-wasabi-in-your-vm",children:[]},{level:3,title:"Install Latest Package",slug:"install-latest-package",link:"#install-latest-package",children:[]}]}],path:"/using-wasabi/WasabiSetupVM.html",pathLocale:"/",extraFields:[]},{title:"Address Reuse",headers:[{level:2,title:"Problem",slug:"problem",link:"#problem",children:[{level:3,title:"Easy wallet clustering",slug:"easy-wallet-clustering",link:"#easy-wallet-clustering",children:[]},{level:3,title:"Publicly advertised addresses (donations)",slug:"publicly-advertised-addresses-donations",link:"#publicly-advertised-addresses-donations",children:[]},{level:3,title:"Dusting",slug:"dusting",link:"#dusting",children:[]},{level:3,title:"Intentionally malicious",slug:"intentionally-malicious",link:"#intentionally-malicious",children:[]}]},{level:2,title:"Wasabi's Solution",slug:"wasabi-s-solution",link:"#wasabi-s-solution",children:[{level:3,title:"Remove used address from GUI",slug:"remove-used-address-from-gui",link:"#remove-used-address-from-gui",children:[]}]}],path:"/why-wasabi/AddressReuse.html",pathLocale:"/",extraFields:[]},{title:"Coins",headers:[{level:2,title:"Problem",slug:"problem",link:"#problem",children:[{level:3,title:"UTXOs are not fungible",slug:"utxos-are-not-fungible",link:"#utxos-are-not-fungible",children:[]}]},{level:2,title:"Wasabi's Solution",slug:"wasabi-s-solution",link:"#wasabi-s-solution",children:[{level:3,title:"Manual coin labeling and selection",slug:"manual-coin-labeling-and-selection",link:"#manual-coin-labeling-and-selection",children:[]},{level:3,title:"Change avoidance suggestion",slug:"change-avoidance-suggestion",link:"#change-avoidance-suggestion",children:[]}]},{level:2,title:"Heuristics identifying change",slug:"heuristics-identifying-change",link:"#heuristics-identifying-change",children:[{level:3,title:"Address reuse",slug:"address-reuse",link:"#address-reuse",children:[]},{level:3,title:"Wallet fingerprinting",slug:"wallet-fingerprinting",link:"#wallet-fingerprinting",children:[]},{level:3,title:"Round numbers",slug:"round-numbers",link:"#round-numbers",children:[]},{level:3,title:"CoinJoin",slug:"coinjoin",link:"#coinjoin",children:[]},{level:3,title:"Replace by Fee",slug:"replace-by-fee",link:"#replace-by-fee",children:[]}]}],path:"/why-wasabi/Coins.html",pathLocale:"/",extraFields:[]},{title:"CoinJoin Legal Concern",headers:[{level:2,title:"Overview",slug:"overview",link:"#overview",children:[]},{level:2,title:"CoinJoin transactions",slug:"coinjoin-transactions",link:"#coinjoin-transactions",children:[{level:3,title:"Difference between ordinary banking and blockchain",slug:"difference-between-ordinary-banking-and-blockchain",link:"#difference-between-ordinary-banking-and-blockchain",children:[]},{level:3,title:"Service providers' obligations regarding privacy",slug:"service-providers-obligations-regarding-privacy",link:"#service-providers-obligations-regarding-privacy",children:[]},{level:3,title:"CoinJoin as a privacy-preserving tool",slug:"coinjoin-as-a-privacy-preserving-tool",link:"#coinjoin-as-a-privacy-preserving-tool",children:[]}]},{level:2,title:"Privacy perspective from the companies' point of view",slug:"privacy-perspective-from-the-companies-point-of-view",link:"#privacy-perspective-from-the-companies-point-of-view",children:[{level:3,title:"Suppliers",slug:"suppliers",link:"#suppliers",children:[]},{level:3,title:"Clients",slug:"clients",link:"#clients",children:[]},{level:3,title:"Competitors",slug:"competitors",link:"#competitors",children:[]},{level:3,title:"Employees",slug:"employees",link:"#employees",children:[]},{level:3,title:"Phishing attacks",slug:"phishing-attacks",link:"#phishing-attacks",children:[]}]},{level:2,title:"Privacy perspective from the institutional investor’s point of view",slug:"privacy-perspective-from-the-institutional-investor-s-point-of-view",link:"#privacy-perspective-from-the-institutional-investor-s-point-of-view",children:[]},{level:2,title:"Resolving AML conflicts",slug:"resolving-aml-conflicts",link:"#resolving-aml-conflicts",children:[{level:3,title:"User privacy",slug:"user-privacy",link:"#user-privacy",children:[]},{level:3,title:"KYC/AML",slug:"kyc-aml",link:"#kyc-aml",children:[]},{level:3,title:"Using CoinJoin as a custodial service provider",slug:"using-coinjoin-as-a-custodial-service-provider",link:"#using-coinjoin-as-a-custodial-service-provider",children:[]}]},{level:2,title:"Conclusion",slug:"conclusion",link:"#conclusion",children:[]}],path:"/why-wasabi/LegalConcern.html",pathLocale:"/",extraFields:[]},{title:"Network-Level Privacy",headers:[{level:2,title:"Problem",slug:"problem",link:"#problem",children:[{level:3,title:"Clearnet light clients",slug:"clearnet-light-clients",link:"#clearnet-light-clients",children:[]}]},{level:2,title:"Wasabi's solution",slug:"wasabi-s-solution",link:"#wasabi-s-solution",children:[{level:3,title:"Full node by default & block filters over Tor",slug:"full-node-by-default-block-filters-over-tor",link:"#full-node-by-default-block-filters-over-tor",children:[]}]},{level:2,title:"In-depth comparison",slug:"in-depth-comparison",link:"#in-depth-comparison",children:[{level:3,title:"Bitcoin Core",slug:"bitcoin-core",link:"#bitcoin-core",children:[]},{level:3,title:"Bitcoin Core + Tor",slug:"bitcoin-core-tor",link:"#bitcoin-core-tor",children:[]},{level:3,title:"Wasabi Wallet light node",slug:"wasabi-wallet-light-node",link:"#wasabi-wallet-light-node",children:[]},{level:3,title:"Wasabi Wallet + full node",slug:"wasabi-wallet-full-node",link:"#wasabi-wallet-full-node",children:[]}]},{level:2,title:"Universal Attacks",slug:"universal-attacks",link:"#universal-attacks",children:[{level:3,title:"Protection",slug:"protection",link:"#protection",children:[]}]}],path:"/why-wasabi/NetworkLevelPrivacy.html",pathLocale:"/",extraFields:[]},{title:"Why Wasabi",headers:[{level:2,title:"Chapters",slug:"chapters",link:"#chapters",children:[{level:3,title:"Why Privacy",slug:"why-privacy",link:"#why-privacy",children:[]},{level:3,title:"Privacy in Bitcoin",slug:"privacy-in-bitcoin",link:"#privacy-in-bitcoin",children:[]}]}],path:"/why-wasabi/",pathLocale:"/",extraFields:[]},{title:"Transaction Graph",headers:[{level:2,title:"Problem",slug:"problem",link:"#problem",children:[{level:3,title:"Public transaction history",slug:"public-transaction-history",link:"#public-transaction-history",children:[]}]},{level:2,title:"Wasabi's Solution",slug:"wasabi-s-solution",link:"#wasabi-s-solution",children:[{level:3,title:"WabiSabi coinjoins",slug:"wabisabi-coinjoins",link:"#wabisabi-coinjoins",children:[]}]}],path:"/why-wasabi/TransactionGraph.html",pathLocale:"/",extraFields:[]},{title:"Transaction Surveillance Companies",headers:[{level:2,title:"Spying technology",slug:"spying-technology",link:"#spying-technology",children:[{level:3,title:"AML/KYC information",slug:"aml-kyc-information",link:"#aml-kyc-information",children:[]},{level:3,title:"Blockchain analysis",slug:"blockchain-analysis",link:"#blockchain-analysis",children:[]},{level:3,title:"Wallet synchronization analysis",slug:"wallet-synchronization-analysis",link:"#wallet-synchronization-analysis",children:[]},{level:3,title:"Transaction broadcasting",slug:"transaction-broadcasting",link:"#transaction-broadcasting",children:[]}]},{level:2,title:"Criticisms",slug:"criticisms",link:"#criticisms",children:[{level:3,title:"Attempt to invade privacy",slug:"attempt-to-invade-privacy",link:"#attempt-to-invade-privacy",children:[]},{level:3,title:"Attempt to destroy fungibility",slug:"attempt-to-destroy-fungibility",link:"#attempt-to-destroy-fungibility",children:[]},{level:3,title:"No mechanism for oversight or appeal",slug:"no-mechanism-for-oversight-or-appeal",link:"#no-mechanism-for-oversight-or-appeal",children:[]},{level:3,title:"Jurisdiction",slug:"jurisdiction",link:"#jurisdiction",children:[]},{level:3,title:"Incentivized to oppose bitcoin updates",slug:"incentivized-to-oppose-bitcoin-updates",link:"#incentivized-to-oppose-bitcoin-updates",children:[]},{level:3,title:"Oversold effectiveness",slug:"oversold-effectiveness",link:"#oversold-effectiveness",children:[]}]},{level:2,title:"Examples",slug:"examples",link:"#examples",children:[]}],path:"/why-wasabi/TransactionSurveillanceCompanies.html",pathLocale:"/",extraFields:[]},{title:"Why Financial Privacy is Especially Important",headers:[{level:2,title:"Why it is important to keep your funds private",slug:"why-it-is-important-to-keep-your-funds-private",link:"#why-it-is-important-to-keep-your-funds-private",children:[]},{level:2,title:"Pseudonyms protect your identity in Bitcoin",slug:"pseudonyms-protect-your-identity-in-bitcoin",link:"#pseudonyms-protect-your-identity-in-bitcoin",children:[]},{level:2,title:"How Bitcoin empowers anonymity",slug:"how-bitcoin-empowers-anonymity",link:"#how-bitcoin-empowers-anonymity",children:[]},{level:2,title:"Privacy through pseudonymous accounts",slug:"privacy-through-pseudonymous-accounts",link:"#privacy-through-pseudonymous-accounts",children:[]},{level:2,title:"Threat model",slug:"threat-model",link:"#threat-model",children:[]}],path:"/why-wasabi/WhyFinancialPrivacy.html",pathLocale:"/",extraFields:[]},{title:"Why Privacy is Important",headers:[{level:2,title:"Privacy? I don't have anything to hide",slug:"privacy-i-don-t-have-anything-to-hide",link:"#privacy-i-don-t-have-anything-to-hide",children:[]},{level:2,title:"Read also",slug:"read-also",link:"#read-also",children:[]},{level:2,title:"Quotes",slug:"quotes",link:"#quotes",children:[]}],path:"/why-wasabi/WhyPrivacyImportant.html",pathLocale:"/",extraFields:[]},{title:"",headers:[],path:"/404.html",pathLocale:"/",extraFields:[]}],jg=re(Og),Hg=()=>jg,Fg=({searchIndex:e,routeLocale:t,query:n,maxSuggestions:i})=>{const l=R(()=>e.value.filter(o=>o.pathLocale===t.value));return R(()=>{const o=n.value.trim().toLowerCase();if(!o)return[];const s=[],r=(a,c)=>{_s(o,[c.title])&&s.push({link:`${a.path}#${c.slug}`,title:a.title,header:c.title});for(const u of c.children){if(s.length>=i.value)return;r(a,u)}};for(const a of l.value){if(s.length>=i.value)break;if(_s(o,[a.title,...a.extraFields])){s.push({link:a.path,title:a.title});continue}for(const c of a.headers){if(s.length>=i.value)break;r(a,c)}}return s})},Mg=e=>{const t=re(0);return{focusIndex:t,focusNext:()=>{t.value{t.value>0?t.value-=1:t.value=e.value.length-1}}},Bg=ge({name:"SearchBox",props:{locales:{type:Object,required:!1,default:()=>({})},hotKeys:{type:Array,required:!1,default:()=>[]},maxSuggestions:{type:Number,required:!1,default:5}},setup(e){const{locales:t,hotKeys:n,maxSuggestions:i}=ji(e),l=nn(),o=_n(),s=Hg(),r=re(null),a=re(!1),c=re(""),u=R(()=>t.value[o.value]??{}),d=Fg({searchIndex:s,routeLocale:o,query:c,maxSuggestions:i}),{focusIndex:h,focusNext:g,focusPrev:m}=Mg(d);Rg({input:r,hotKeys:n});const y=R(()=>a.value&&!!d.value.length),k=()=>{y.value&&m()},x=()=>{y.value&&g()},I=v=>{if(!y.value)return;const _=d.value[v];_&&l.push(_.link).then(()=>{c.value="",h.value=0})};return()=>ce("form",{class:"search-box",role:"search"},[ce("input",{ref:r,type:"search",placeholder:u.value.placeholder,autocomplete:"off",spellcheck:!1,value:c.value,onFocus:()=>a.value=!0,onBlur:()=>a.value=!1,onInput:v=>c.value=v.target.value,onKeydown:v=>{switch(v.key){case"ArrowUp":{k();break}case"ArrowDown":{x();break}case"Enter":{v.preventDefault(),I(h.value);break}}}}),y.value&&ce("ul",{class:"suggestions",onMouseleave:()=>h.value=-1},d.value.map(({link:v,title:_,header:$},W)=>ce("li",{class:["suggestion",{focus:h.value===W}],onMouseenter:()=>h.value=W,onMousedown:()=>I(W)},ce("a",{href:v,onClick:F=>F.preventDefault()},[ce("span",{class:"page-title"},_),$&&ce("span",{class:"page-header"},`> ${$}`)]))))])}});var $g=["s","/"],Dg={"/":{placeholder:"Search..."}};const Ng=Dg,zg=$g,Vg=15,Ug=yt({enhance({app:e}){e.component("SearchBox",t=>ce(Bg,{locales:Ng,hotKeys:zg,maxSuggestions:Vg,...t}))}}),mi=[Oh,Mh,Qh,ef,ff,vf,_f,Ig,Ug],Gg=JSON.parse('{"base":"/","lang":"en-US","title":"Wasabi Docs","description":"An archive of knowledge about Wasabi Wallet, an open-source, non-custodial and privacy-focused Bitcoin wallet for desktop.","head":[],"locales":{}}');var Pn=yn(Gg),qg=cd,Kg=()=>{const e=qd({history:qg(Cr("/")),routes:[{name:"vuepress-route",path:"/:catchAll(.*)",components:{}}],scrollBehavior:(t,n,i)=>i||(t.hash?{el:t.hash}:{top:0})});return e.beforeResolve(async(t,n)=>{if(t.path!==n.path||n===mt){const i=Zl(t.path);if(i.path!==t.path)return i.path;const l=await i.loader();t.meta={...i.meta,_pageChunk:l}}}),e},Qg=e=>{e.component("ClientOnly",eo),e.component("Content",th),e.component("RouteLink",ni)},Jg=(e,t,n)=>{const i=R(()=>t.currentRoute.value.path),l=oh(i,()=>t.currentRoute.value.meta._pageChunk),o=R(()=>zt.resolveLayouts(n)),s=R(()=>zt.resolveRouteLocale(Pn.value.locales,i.value)),r=R(()=>zt.resolveSiteLocaleData(Pn.value,s.value)),a=R(()=>l.value.comp),c=R(()=>l.value.data),u=R(()=>c.value.frontmatter),d=R(()=>zt.resolvePageHeadTitle(c.value,r.value)),h=R(()=>zt.resolvePageHead(d.value,u.value,r.value)),g=R(()=>zt.resolvePageLang(c.value,r.value)),m=R(()=>zt.resolvePageLayout(c.value,o.value)),y={layouts:o,pageData:c,pageComponent:a,pageFrontmatter:u,pageHead:h,pageHeadTitle:d,pageLang:g,pageLayout:m,redirects:Fr,routeLocale:s,routePath:i,routes:Vn,siteData:Pn,siteLocaleData:r};return e.provide(Yl,y),Object.defineProperties(e.config.globalProperties,{$frontmatter:{get:()=>u.value},$head:{get:()=>h.value},$headTitle:{get:()=>d.value},$lang:{get:()=>g.value},$page:{get:()=>c.value},$routeLocale:{get:()=>s.value},$site:{get:()=>Pn.value},$siteLocale:{get:()=>r.value},$withBase:{get:()=>Gi}}),y},Yg=()=>{const e=Jd(),t=Yd();let n=[];const i=()=>{e.value.forEach(s=>{const r=Xg(s);r&&n.push(r)})},l=()=>{const s=[];return e.value.forEach(r=>{const a=Zg(r);a&&s.push(a)}),s},o=()=>{document.documentElement.lang=t.value;const s=l();n.forEach((r,a)=>{const c=s.findIndex(u=>r.isEqualNode(u));c===-1?(r.remove(),delete n[a]):s.splice(c,1)}),s.forEach(r=>document.head.appendChild(r)),n=[...n.filter(r=>!!r),...s]};Yt(eh,o),Ve(()=>{i(),Me(e,o,{immediate:!1})})},Xg=([e,t,n=""])=>{const i=Object.entries(t).map(([r,a])=>dt(a)?`[${r}=${JSON.stringify(a)}]`:a===!0?`[${r}]`:"").join(""),l=`head > ${e}${i}`;return Array.from(document.querySelectorAll(l)).find(r=>r.innerText===n)||null},Zg=([e,t,n])=>{if(!dt(e))return null;const i=document.createElement(e);return Kl(t)&&Object.entries(t).forEach(([l,o])=>{dt(o)?i.setAttribute(l,o):o===!0&&i.setAttribute(l,"")}),dt(n)&&i.appendChild(document.createTextNode(n)),i},em=Ru,tm=async()=>{var n;const e=em({name:"Vuepress",setup(){var o;Yg();for(const s of mi)(o=s.setup)==null||o.call(s);const i=mi.flatMap(({rootComponents:s=[]})=>s.map(r=>ce(r))),l=Xd();return()=>[ce(l.value),i]}}),t=Kg();Qg(e),Jg(e,t,mi);for(const i of mi)await((n=i.enhance)==null?void 0:n.call(i,{app:e,router:t,siteData:Pn}));return e.use(t),{app:e,router:t}};tm().then(({app:e,router:t})=>{t.isReady().then(()=>{e.mount("#app")})});export{Ee as _,fe as a,Ft as b,X as c,tm as createVueApp,ie as d,qc as e,z as o,Xt as r,He as w}; function __vite__mapDeps(indexes) { if (!__vite__mapDeps.viteFileDeps) { - __vite__mapDeps.viteFileDeps = ["assets/FAQ-Installation.html-LTT39ng4.js","assets/Logo_without_text_with_bg_dark_with_yt-D8lqXhN0.js","assets/DownloadMac-DUSPDgNE.js","assets/FAQ-Introduction.html-D5iJx8Cs.js","assets/FAQ-UseWasabi.html-noM30uxn.js","assets/AddWalletButton-C7JVhQwV.js","assets/AddWalletAddPassphrase-M0V8PDu3.js","assets/AddWalletConfirmRecoveryWords-DoQpsOos.js","assets/CoinjoinStrategy-BZrDbG5n.js","assets/WalletSynchronizing-Bg2Cuco7.js","assets/AddressAwaitingPayment-B9ABKMdf.js","assets/HistoryRightClick-DykL0_1P.js","assets/AutoStartCoinjoinThreshold-B0lFY-5G.js","assets/SettingsBitcoinCore-DgSldI_2.js","assets/DiscreetModeActivate-Cg4X--AC.js","assets/BitcoinFullNode.html-BStS9Wl_.js","assets/CoinJoin.html-Dh9ky-gL.js","assets/DiscreetMode.html-FvOse1pm.js","assets/InstallPackage.html-D4f2GNqt.js","assets/Receive.html-DJ-IChEN.js","assets/Send.html-D0pe3AOm.js","assets/WalletGeneration.html-tKnNedDb.js","assets/WalletLoad.html-sLQIFgev.js","assets/WalletRecovery.html-CvgB9Wgw.js","assets/NetworkLevelPrivacy.html-BkVkjp52.js","assets/WhyPrivacyImportant.html-BVdMCAaf.js"] + __vite__mapDeps.viteFileDeps = ["assets/FAQ-Installation.html-a94aUrlk.js","assets/Logo_without_text_with_bg_dark_with_yt-D8lqXhN0.js","assets/DownloadMac-DUSPDgNE.js","assets/FAQ-Introduction.html-CmWmFBw4.js","assets/FAQ-UseWasabi.html-uYBqV63A.js","assets/AddWalletButton-C7JVhQwV.js","assets/AddWalletAddPassphrase-M0V8PDu3.js","assets/AddWalletConfirmRecoveryWords-DoQpsOos.js","assets/CoinjoinStrategy-BZrDbG5n.js","assets/WalletSynchronizing-Bg2Cuco7.js","assets/AddressAwaitingPayment-B9ABKMdf.js","assets/HistoryRightClick-DykL0_1P.js","assets/AutoStartCoinjoinThreshold-B0lFY-5G.js","assets/SettingsBitcoinCore-DgSldI_2.js","assets/DiscreetModeActivate-Cg4X--AC.js","assets/BitcoinFullNode.html-Bs7E4TRd.js","assets/CoinJoin.html-5YDCAxeA.js","assets/DiscreetMode.html-tr5KQw1O.js","assets/InstallPackage.html-B2XMhgob.js","assets/Receive.html-B3vnDoLn.js","assets/Send.html-D3Odg27s.js","assets/WalletGeneration.html-mAdC83BR.js","assets/WalletLoad.html-CTTR-YGw.js","assets/WalletRecovery.html-CU0GMqJf.js","assets/NetworkLevelPrivacy.html-yEBz1wzp.js","assets/WhyPrivacyImportant.html-BCWac2YZ.js"] } return indexes.map((i) => __vite__mapDeps.viteFileDeps[i]) } diff --git a/assets/index.html-piASmjtj.js b/assets/index.html-BQ4xlI3R.js similarity index 91% rename from assets/index.html-piASmjtj.js rename to assets/index.html-BQ4xlI3R.js index bf5e51d25..93530a822 100644 --- a/assets/index.html-piASmjtj.js +++ b/assets/index.html-BQ4xlI3R.js @@ -1 +1 @@ -import{_ as n,r as i,o as r,c as l,a as e,d as s,w as t,b as o}from"./app-3S7gIoGc.js";const c={},d=e("h1",{id:"glossary",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#glossary"},[e("span",null,"Glossary")])],-1),h=e("p",null,"This glossary contains the explanations of common words used in Wasabi and regarding Bitcoin privacy in general. Every item contains a link to the respective full document for more details.",-1),p=e("h2",{id:"chapters",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#chapters"},[e("span",null,"Chapters")])],-1);function u(m,_){const a=i("RouteLink");return r(),l("div",null,[d,h,p,e("ul",null,[e("li",null,[s(a,{to:"/glossary/Glossary-GeneralBitcoin.html"},{default:t(()=>[o("Bitcoin in general")]),_:1})]),e("li",null,[s(a,{to:"/glossary/Glossary-PrivacyWasabi.html"},{default:t(()=>[o("Privacy and Wasabi")]),_:1})])])])}const y=n(c,[["render",u],["__file","index.html.vue"]]),g=JSON.parse('{"path":"/glossary/","title":"Glossary","lang":"en-US","frontmatter":{"title":"Glossary","description":"Explanations of common words used in Wasabi and regarding Bitcoin privacy with links to the docs for more details. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Chapters","slug":"chapters","link":"#chapters","children":[]}],"git":{"updatedTime":1720425186000},"filePathRelative":"glossary/README.md"}');export{y as comp,g as data}; +import{_ as n,r as i,o as r,c as l,a as e,d as s,w as t,b as o}from"./app-CwImt2bI.js";const c={},d=e("h1",{id:"glossary",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#glossary"},[e("span",null,"Glossary")])],-1),h=e("p",null,"This glossary contains the explanations of common words used in Wasabi and regarding Bitcoin privacy in general. Every item contains a link to the respective full document for more details.",-1),p=e("h2",{id:"chapters",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#chapters"},[e("span",null,"Chapters")])],-1);function u(m,_){const a=i("RouteLink");return r(),l("div",null,[d,h,p,e("ul",null,[e("li",null,[s(a,{to:"/glossary/Glossary-GeneralBitcoin.html"},{default:t(()=>[o("Bitcoin in general")]),_:1})]),e("li",null,[s(a,{to:"/glossary/Glossary-PrivacyWasabi.html"},{default:t(()=>[o("Privacy and Wasabi")]),_:1})])])])}const y=n(c,[["render",u],["__file","index.html.vue"]]),g=JSON.parse('{"path":"/glossary/","title":"Glossary","lang":"en-US","frontmatter":{"title":"Glossary","description":"Explanations of common words used in Wasabi and regarding Bitcoin privacy with links to the docs for more details. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Chapters","slug":"chapters","link":"#chapters","children":[]}],"git":{"updatedTime":1720425980000},"filePathRelative":"glossary/README.md"}');export{y as comp,g as data}; diff --git a/assets/index.html-D5H6XWPL.js b/assets/index.html-CW5NWqvN.js similarity index 92% rename from assets/index.html-D5H6XWPL.js rename to assets/index.html-CW5NWqvN.js index c722d060e..d17136266 100644 --- a/assets/index.html-D5H6XWPL.js +++ b/assets/index.html-CW5NWqvN.js @@ -1 +1 @@ -import{_ as l,r as s,o,c as r,a,d as i,w as t,e as c,b as n}from"./app-3S7gIoGc.js";const h={},d=c('

    Why Wasabi

    This is the place with an introduction to privacy in general, and why especially financial privacy is so important. Here is covered how Bitcoin is already good for privacy, much better than the incumbent monetary system. And why Wasabi can make Bitcoin an even better tool of self-defense by default.

    Chapters

    Why Privacy

    ',4),y=a("h3",{id:"privacy-in-bitcoin",tabindex:"-1"},[a("a",{class:"header-anchor",href:"#privacy-in-bitcoin"},[a("span",null,"Privacy in Bitcoin")])],-1);function p(u,w){const e=s("RouteLink");return o(),r("div",null,[d,a("ul",null,[a("li",null,[i(e,{to:"/why-wasabi/WhyPrivacyImportant.html"},{default:t(()=>[n("Why Privacy is Important")]),_:1})]),a("li",null,[i(e,{to:"/why-wasabi/WhyFinancialPrivacy.html"},{default:t(()=>[n("Why Financial Privacy is Especially Important")]),_:1})]),a("li",null,[i(e,{to:"/why-wasabi/LegalConcern.html"},{default:t(()=>[n("CoinJoin Legal Concern")]),_:1})])]),y,a("ul",null,[a("li",null,[i(e,{to:"/why-wasabi/Coins.html"},{default:t(()=>[n("Coins")]),_:1})]),a("li",null,[i(e,{to:"/why-wasabi/AddressReuse.html"},{default:t(()=>[n("Address Reuse")]),_:1})]),a("li",null,[i(e,{to:"/why-wasabi/TransactionGraph.html"},{default:t(()=>[n("Transaction Graph")]),_:1})]),a("li",null,[i(e,{to:"/why-wasabi/NetworkLevelPrivacy.html"},{default:t(()=>[n("Network-Level Privacy")]),_:1})]),a("li",null,[i(e,{to:"/why-wasabi/TransactionSurveillanceCompanies.html"},{default:t(()=>[n("Transaction Surveillance Companies")]),_:1})])])])}const m=l(h,[["render",p],["__file","index.html.vue"]]),b=JSON.parse('{"path":"/why-wasabi/","title":"Why Wasabi","lang":"en-US","frontmatter":{"title":"Why Wasabi","description":"An introduction to why privacy is important and what problems Wasabi solves. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Chapters","slug":"chapters","link":"#chapters","children":[{"level":3,"title":"Why Privacy","slug":"why-privacy","link":"#why-privacy","children":[]},{"level":3,"title":"Privacy in Bitcoin","slug":"privacy-in-bitcoin","link":"#privacy-in-bitcoin","children":[]}]}],"git":{"updatedTime":1720425186000},"filePathRelative":"why-wasabi/README.md"}');export{m as comp,b as data}; +import{_ as l,r as s,o,c as r,a,d as i,w as t,e as c,b as n}from"./app-CwImt2bI.js";const h={},d=c('

    Why Wasabi

    This is the place with an introduction to privacy in general, and why especially financial privacy is so important. Here is covered how Bitcoin is already good for privacy, much better than the incumbent monetary system. And why Wasabi can make Bitcoin an even better tool of self-defense by default.

    Chapters

    Why Privacy

    ',4),y=a("h3",{id:"privacy-in-bitcoin",tabindex:"-1"},[a("a",{class:"header-anchor",href:"#privacy-in-bitcoin"},[a("span",null,"Privacy in Bitcoin")])],-1);function p(u,w){const e=s("RouteLink");return o(),r("div",null,[d,a("ul",null,[a("li",null,[i(e,{to:"/why-wasabi/WhyPrivacyImportant.html"},{default:t(()=>[n("Why Privacy is Important")]),_:1})]),a("li",null,[i(e,{to:"/why-wasabi/WhyFinancialPrivacy.html"},{default:t(()=>[n("Why Financial Privacy is Especially Important")]),_:1})]),a("li",null,[i(e,{to:"/why-wasabi/LegalConcern.html"},{default:t(()=>[n("CoinJoin Legal Concern")]),_:1})])]),y,a("ul",null,[a("li",null,[i(e,{to:"/why-wasabi/Coins.html"},{default:t(()=>[n("Coins")]),_:1})]),a("li",null,[i(e,{to:"/why-wasabi/AddressReuse.html"},{default:t(()=>[n("Address Reuse")]),_:1})]),a("li",null,[i(e,{to:"/why-wasabi/TransactionGraph.html"},{default:t(()=>[n("Transaction Graph")]),_:1})]),a("li",null,[i(e,{to:"/why-wasabi/NetworkLevelPrivacy.html"},{default:t(()=>[n("Network-Level Privacy")]),_:1})]),a("li",null,[i(e,{to:"/why-wasabi/TransactionSurveillanceCompanies.html"},{default:t(()=>[n("Transaction Surveillance Companies")]),_:1})])])])}const m=l(h,[["render",p],["__file","index.html.vue"]]),b=JSON.parse('{"path":"/why-wasabi/","title":"Why Wasabi","lang":"en-US","frontmatter":{"title":"Why Wasabi","description":"An introduction to why privacy is important and what problems Wasabi solves. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Chapters","slug":"chapters","link":"#chapters","children":[{"level":3,"title":"Why Privacy","slug":"why-privacy","link":"#why-privacy","children":[]},{"level":3,"title":"Privacy in Bitcoin","slug":"privacy-in-bitcoin","link":"#privacy-in-bitcoin","children":[]}]}],"git":{"updatedTime":1720425980000},"filePathRelative":"why-wasabi/README.md"}');export{m as comp,b as data}; diff --git a/assets/index.html-CuyL9paf.js b/assets/index.html-CpUxP59l.js similarity index 94% rename from assets/index.html-CuyL9paf.js rename to assets/index.html-CpUxP59l.js index 7d44394f0..1ef46ae57 100644 --- a/assets/index.html-CuyL9paf.js +++ b/assets/index.html-CpUxP59l.js @@ -1 +1 @@ -import{_ as s,r as l,o,c as d,a,d as i,w as t,e as r,b as n}from"./app-3S7gIoGc.js";const c={},h=r('

    Building Wasabi

    This is the place with all the nuances of how Wasabi Wallet is being built. You will also find some of the issues they are working on now, the research for future ideas, and all of the necessary information needed to quickly begin making your own invaluable contributions.

    Chapters

    Contributing to Wasabi

    ',4),u=a("h3",{id:"advanced",tabindex:"-1"},[a("a",{class:"header-anchor",href:"#advanced"},[a("span",null,"Advanced")])],-1);function b(p,f){const e=l("RouteLink");return o(),d("div",null,[h,a("ul",null,[a("li",null,[i(e,{to:"/building-wasabi/ContributionChecklist.html"},{default:t(()=>[n("Contribution Checklist")]),_:1})])]),u,a("ul",null,[a("li",null,[i(e,{to:"/building-wasabi/Security.html"},{default:t(()=>[n("Security Policy")]),_:1})]),a("li",null,[i(e,{to:"/building-wasabi/LICENSE.html"},{default:t(()=>[n("MIT License")]),_:1})])])])}const w=s(c,[["render",b],["__file","index.html.vue"]]),_=JSON.parse('{"path":"/building-wasabi/","title":"Building Wasabi","lang":"en-US","frontmatter":{"title":"Building Wasabi","description":"All the information for those Wasabikas interested in helping us build Wasabi Wallet. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Chapters","slug":"chapters","link":"#chapters","children":[{"level":3,"title":"Contributing to Wasabi","slug":"contributing-to-wasabi","link":"#contributing-to-wasabi","children":[]},{"level":3,"title":"Advanced","slug":"advanced","link":"#advanced","children":[]}]}],"git":{"updatedTime":1720425186000},"filePathRelative":"building-wasabi/README.md"}');export{w as comp,_ as data}; +import{_ as s,r as l,o,c as d,a,d as i,w as t,e as r,b as n}from"./app-CwImt2bI.js";const c={},h=r('

    Building Wasabi

    This is the place with all the nuances of how Wasabi Wallet is being built. You will also find some of the issues they are working on now, the research for future ideas, and all of the necessary information needed to quickly begin making your own invaluable contributions.

    Chapters

    Contributing to Wasabi

    ',4),u=a("h3",{id:"advanced",tabindex:"-1"},[a("a",{class:"header-anchor",href:"#advanced"},[a("span",null,"Advanced")])],-1);function b(p,f){const e=l("RouteLink");return o(),d("div",null,[h,a("ul",null,[a("li",null,[i(e,{to:"/building-wasabi/ContributionChecklist.html"},{default:t(()=>[n("Contribution Checklist")]),_:1})])]),u,a("ul",null,[a("li",null,[i(e,{to:"/building-wasabi/Security.html"},{default:t(()=>[n("Security Policy")]),_:1})]),a("li",null,[i(e,{to:"/building-wasabi/LICENSE.html"},{default:t(()=>[n("MIT License")]),_:1})])])])}const w=s(c,[["render",b],["__file","index.html.vue"]]),_=JSON.parse('{"path":"/building-wasabi/","title":"Building Wasabi","lang":"en-US","frontmatter":{"title":"Building Wasabi","description":"All the information for those Wasabikas interested in helping us build Wasabi Wallet. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Chapters","slug":"chapters","link":"#chapters","children":[{"level":3,"title":"Contributing to Wasabi","slug":"contributing-to-wasabi","link":"#contributing-to-wasabi","children":[]},{"level":3,"title":"Advanced","slug":"advanced","link":"#advanced","children":[]}]}],"git":{"updatedTime":1720425980000},"filePathRelative":"building-wasabi/README.md"}');export{w as comp,_ as data}; diff --git a/assets/index.html-B57YoAW6.js b/assets/index.html-DbNou2qf.js similarity index 96% rename from assets/index.html-B57YoAW6.js rename to assets/index.html-DbNou2qf.js index db83ff517..d6fabb2ff 100644 --- a/assets/index.html-B57YoAW6.js +++ b/assets/index.html-DbNou2qf.js @@ -1 +1 @@ -import{_ as l,r as s,o as r,c,a as e,b as t,d as o,w as i}from"./app-3S7gIoGc.js";const h={},u=e("hr",null,null,-1),d={href:"https://wasabiwallet.io",target:"_blank",rel:"noopener noreferrer"},p={href:"https://github.com/WalletWasabi/WasabiDoc/",target:"_blank",rel:"noopener noreferrer"},f={href:"https://web.archive.org/web/20220804041943/https://docs.wasabiwallet.io/",target:"_blank",rel:"noopener noreferrer"},m=e("h2",{id:"how-to-use-this-documentation",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-to-use-this-documentation"},[e("span",null,"How to use this documentation")])],-1),_=e("p",null,"This documentation is a good place to start your education on how to use Wasabi Wallet, as it is a thorough archive about many nuances of Bitcoin privacy.",-1),b=e("h3",{id:"explain-like-i-m-5",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#explain-like-i-m-5"},[e("span",null,"Explain Like I'm 5")])],-1),w=e("h3",{id:"stand-alone-chapters",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#stand-alone-chapters"},[e("span",null,"Stand-alone chapters")])],-1),y=e("h3",{id:"search-function",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#search-function"},[e("span",null,"Search function")])],-1);function g(k,v){const a=s("ExternalLinkIcon"),n=s("RouteLink");return r(),c("div",null,[u,e("p",null,[t("This is "),e("a",d,[t("Wasabi Wallet's"),o(a)]),t(" open source documentation. Here you will find information about the nuances of privacy in Bitcoin, how Wasabi solves some of the existing problems, and how you can use this tool to defend yourself. Everyone is welcome to make the Wasabi Wallet documentation better, by contributing "),e("a",p,[t("on GitHub"),o(a)]),t("! The documentation of Wasabi Wallet 1.0 is archived "),e("a",f,[t("here"),o(a)]),t(".")]),m,_,b,e("p",null,[t("If you are new to Wasabi and want to get a quick tutorial on how to use it, you may "),o(n,{to:"/using-wasabi/ELI5.html"},{default:i(()=>[t("start here")]),_:1}),t(".")]),w,e("p",null,[t("If you are interested in the nuances of how one specific aspect of Wasabi works, then check-out the "),o(n,{to:"/using-wasabi/"},{default:i(()=>[t("detailed chapters here")]),_:1}),t(".")]),y,e("p",null,[t("If you have a question about some particular detail, then use the search function at the top right corner to browse the entire archive, including the "),o(n,{to:"/FAQ/"},{default:i(()=>[t("frequently asked questions")]),_:1}),t(".")])])}const W=l(h,[["render",g],["__file","index.html.vue"]]),I=JSON.parse(`{"path":"/","title":"","lang":"en-US","frontmatter":{"home":true,"heroText":"Wasabi Documentation","heroImage":"/Logo_without_text_dark.png","heroImageDark":"/Logo_without_text.png","tagline":"An archive of knowledge about Wasabi Wallet, an open-source, non-custodial and privacy-focused Bitcoin wallet for desktop.","actions":[{"text":"Reclaim Your Privacy →","link":"/getting-started/","type":"primary"}],"features":[{"title":"Open-source","details":"Don't trust, verify. Wasabi is libre and open source software under the MIT license. You have full access to every single line of code, and you can do with it as you please."},{"title":"Non-custodial","details":"Not your keys, not your bitcoin. With Wasabi, you are always in full control of your private and public keys, you never share them with any third party."},{"title":"Privacy-focused","details":"Privacy is the ability to choose what you reveal to others. Wasabi is designed with one goal in mind, to protect your sensitive financial data, on the network level and on the blockchain level."}]},"headers":[{"level":2,"title":"How to use this documentation","slug":"how-to-use-this-documentation","link":"#how-to-use-this-documentation","children":[{"level":3,"title":"Explain Like I'm 5","slug":"explain-like-i-m-5","link":"#explain-like-i-m-5","children":[]},{"level":3,"title":"Stand-alone chapters","slug":"stand-alone-chapters","link":"#stand-alone-chapters","children":[]},{"level":3,"title":"Search function","slug":"search-function","link":"#search-function","children":[]}]}],"git":{"updatedTime":1720425186000},"filePathRelative":"README.md"}`);export{W as comp,I as data}; +import{_ as l,r as s,o as r,c,a as e,b as t,d as o,w as i}from"./app-CwImt2bI.js";const h={},u=e("hr",null,null,-1),d={href:"https://wasabiwallet.io",target:"_blank",rel:"noopener noreferrer"},p={href:"https://github.com/WalletWasabi/WasabiDoc/",target:"_blank",rel:"noopener noreferrer"},f={href:"https://web.archive.org/web/20220804041943/https://docs.wasabiwallet.io/",target:"_blank",rel:"noopener noreferrer"},m=e("h2",{id:"how-to-use-this-documentation",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#how-to-use-this-documentation"},[e("span",null,"How to use this documentation")])],-1),_=e("p",null,"This documentation is a good place to start your education on how to use Wasabi Wallet, as it is a thorough archive about many nuances of Bitcoin privacy.",-1),b=e("h3",{id:"explain-like-i-m-5",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#explain-like-i-m-5"},[e("span",null,"Explain Like I'm 5")])],-1),w=e("h3",{id:"stand-alone-chapters",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#stand-alone-chapters"},[e("span",null,"Stand-alone chapters")])],-1),y=e("h3",{id:"search-function",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#search-function"},[e("span",null,"Search function")])],-1);function g(k,v){const a=s("ExternalLinkIcon"),n=s("RouteLink");return r(),c("div",null,[u,e("p",null,[t("This is "),e("a",d,[t("Wasabi Wallet's"),o(a)]),t(" open source documentation. Here you will find information about the nuances of privacy in Bitcoin, how Wasabi solves some of the existing problems, and how you can use this tool to defend yourself. Everyone is welcome to make the Wasabi Wallet documentation better, by contributing "),e("a",p,[t("on GitHub"),o(a)]),t("! The documentation of Wasabi Wallet 1.0 is archived "),e("a",f,[t("here"),o(a)]),t(".")]),m,_,b,e("p",null,[t("If you are new to Wasabi and want to get a quick tutorial on how to use it, you may "),o(n,{to:"/using-wasabi/ELI5.html"},{default:i(()=>[t("start here")]),_:1}),t(".")]),w,e("p",null,[t("If you are interested in the nuances of how one specific aspect of Wasabi works, then check-out the "),o(n,{to:"/using-wasabi/"},{default:i(()=>[t("detailed chapters here")]),_:1}),t(".")]),y,e("p",null,[t("If you have a question about some particular detail, then use the search function at the top right corner to browse the entire archive, including the "),o(n,{to:"/FAQ/"},{default:i(()=>[t("frequently asked questions")]),_:1}),t(".")])])}const W=l(h,[["render",g],["__file","index.html.vue"]]),I=JSON.parse(`{"path":"/","title":"","lang":"en-US","frontmatter":{"home":true,"heroText":"Wasabi Documentation","heroImage":"/Logo_without_text_dark.png","heroImageDark":"/Logo_without_text.png","tagline":"An archive of knowledge about Wasabi Wallet, an open-source, non-custodial and privacy-focused Bitcoin wallet for desktop.","actions":[{"text":"Reclaim Your Privacy →","link":"/getting-started/","type":"primary"}],"features":[{"title":"Open-source","details":"Don't trust, verify. Wasabi is libre and open source software under the MIT license. You have full access to every single line of code, and you can do with it as you please."},{"title":"Non-custodial","details":"Not your keys, not your bitcoin. With Wasabi, you are always in full control of your private and public keys, you never share them with any third party."},{"title":"Privacy-focused","details":"Privacy is the ability to choose what you reveal to others. Wasabi is designed with one goal in mind, to protect your sensitive financial data, on the network level and on the blockchain level."}]},"headers":[{"level":2,"title":"How to use this documentation","slug":"how-to-use-this-documentation","link":"#how-to-use-this-documentation","children":[{"level":3,"title":"Explain Like I'm 5","slug":"explain-like-i-m-5","link":"#explain-like-i-m-5","children":[]},{"level":3,"title":"Stand-alone chapters","slug":"stand-alone-chapters","link":"#stand-alone-chapters","children":[]},{"level":3,"title":"Search function","slug":"search-function","link":"#search-function","children":[]}]}],"git":{"updatedTime":1720425980000},"filePathRelative":"README.md"}`);export{W as comp,I as data}; diff --git a/assets/index.html-CUUtnbsu.js b/assets/index.html-DsCPaNFb.js similarity index 97% rename from assets/index.html-CUUtnbsu.js rename to assets/index.html-DsCPaNFb.js index 72acb2b1d..3244216db 100644 --- a/assets/index.html-CUUtnbsu.js +++ b/assets/index.html-DsCPaNFb.js @@ -1 +1 @@ -import{_ as t,r as n,o as u,c as o,a,d as e,w as l,e as d,b as s}from"./app-3S7gIoGc.js";const r={},c=d('

    Using Wasabi

    Here are all the nuances of how to use Wasabi Wallet in all regards. Starting with a step-by-step guide on how to verify and install the software. Further tutorials about the different parts of the wallet, for newbies and power users.

    Chapters

    Introducing Wasabi

    ',4),h=a("h3",{id:"installing-wasabi",tabindex:"-1"},[a("a",{class:"header-anchor",href:"#installing-wasabi"},[a("span",null,"Installing Wasabi")])],-1),b=a("h3",{id:"using-wasabi-1",tabindex:"-1"},[a("a",{class:"header-anchor",href:"#using-wasabi-1"},[a("span",null,"Using Wasabi")])],-1),g=a("h3",{id:"best-practices",tabindex:"-1"},[a("a",{class:"header-anchor",href:"#best-practices"},[a("span",null,"Best Practices")])],-1),w=a("h3",{id:"restoring-wasabi",tabindex:"-1"},[a("a",{class:"header-anchor",href:"#restoring-wasabi"},[a("span",null,"Restoring Wasabi")])],-1),f=a("h3",{id:"advanced-installing-wasabi",tabindex:"-1"},[a("a",{class:"header-anchor",href:"#advanced-installing-wasabi"},[a("span",null,"Advanced Installing Wasabi")])],-1),p=a("h3",{id:"advanced-using-wasabi",tabindex:"-1"},[a("a",{class:"header-anchor",href:"#advanced-using-wasabi"},[a("span",null,"Advanced Using Wasabi")])],-1);function _(m,W){const i=n("RouteLink");return u(),o("div",null,[c,a("ul",null,[a("li",null,[e(i,{to:"/using-wasabi/ELI5.html"},{default:l(()=>[s("Explain Wasabi like I'm 5")]),_:1})])]),h,a("ul",null,[a("li",null,[e(i,{to:"/using-wasabi/InstallPackage.html"},{default:l(()=>[s("Install package")]),_:1})])]),b,a("ul",null,[a("li",null,[e(i,{to:"/using-wasabi/WalletGeneration.html"},{default:l(()=>[s("Wallet Generation")]),_:1})]),a("li",null,[e(i,{to:"/using-wasabi/WalletLoad.html"},{default:l(()=>[s("Wallet Load")]),_:1})]),a("li",null,[e(i,{to:"/using-wasabi/Receive.html"},{default:l(()=>[s("Receive")]),_:1})]),a("li",null,[e(i,{to:"/using-wasabi/CoinJoin.html"},{default:l(()=>[s("CoinJoin")]),_:1})]),a("li",null,[e(i,{to:"/using-wasabi/Send.html"},{default:l(()=>[s("Send")]),_:1})]),a("li",null,[e(i,{to:"/using-wasabi/ColdWasabi.html"},{default:l(()=>[s("Hardware Wallet")]),_:1})]),a("li",null,[e(i,{to:"/using-wasabi/BitcoinFullNode.html"},{default:l(()=>[s("Bitcoin Full Node")]),_:1})])]),g,a("ul",null,[a("li",null,[e(i,{to:"/using-wasabi/PasswordBestPractices.html"},{default:l(()=>[s("Passwords")]),_:1})]),a("li",null,[e(i,{to:"/using-wasabi/BackupBestPractices.html"},{default:l(()=>[s("Backups")]),_:1})]),a("li",null,[e(i,{to:"/using-wasabi/ChangeCoins.html"},{default:l(()=>[s("Change Coins")]),_:1})])]),w,a("ul",null,[a("li",null,[e(i,{to:"/using-wasabi/WalletRecovery.html"},{default:l(()=>[s("Recover a Wallet")]),_:1})]),a("li",null,[e(i,{to:"/using-wasabi/ExternalRestore.html"},{default:l(()=>[s("Restoring Wasabi Wallet to Other Wallets")]),_:1})])]),f,a("ul",null,[a("li",null,[e(i,{to:"/using-wasabi/BuildSource.html"},{default:l(()=>[s("Build from source code")]),_:1})]),a("li",null,[e(i,{to:"/using-wasabi/DeterministicBuild.html"},{default:l(()=>[s("Deterministic Build")]),_:1})]),a("li",null,[e(i,{to:"/using-wasabi/WasabiSetupVM.html"},{default:l(()=>[s("Wasabi Setup using Virtual Machines")]),_:1})])]),p,a("ul",null,[a("li",null,[e(i,{to:"/using-wasabi/StartupParameters.html"},{default:l(()=>[s("Startup parameters")]),_:1})]),a("li",null,[e(i,{to:"/using-wasabi/Daemon.html"},{default:l(()=>[s("Headless Wasabi Daemon")]),_:1})]),a("li",null,[e(i,{to:"/using-wasabi/RPC.html"},{default:l(()=>[s("RPC Interface")]),_:1})]),a("li",null,[e(i,{to:"/using-wasabi/DiscreetMode.html"},{default:l(()=>[s("Discreet Mode")]),_:1})]),a("li",null,[e(i,{to:"/using-wasabi/PayJoin.html"},{default:l(()=>[s("PayJoin")]),_:1})]),a("li",null,[e(i,{to:"/using-wasabi/Testnet.html"},{default:l(()=>[s("Testnet")]),_:1})]),a("li",null,[e(i,{to:"/using-wasabi/BIPs.html"},{default:l(()=>[s("Supported BIPs")]),_:1})])])])}const k=t(r,[["render",_],["__file","index.html.vue"]]),x=JSON.parse('{"path":"/using-wasabi/","title":"Using Wasabi","lang":"en-US","frontmatter":{"title":"Using Wasabi","description":"Information and step-by-step guides on the nuances of how to use Wasabi. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Chapters","slug":"chapters","link":"#chapters","children":[{"level":3,"title":"Introducing Wasabi","slug":"introducing-wasabi","link":"#introducing-wasabi","children":[]},{"level":3,"title":"Installing Wasabi","slug":"installing-wasabi","link":"#installing-wasabi","children":[]},{"level":3,"title":"Using Wasabi","slug":"using-wasabi-1","link":"#using-wasabi-1","children":[]},{"level":3,"title":"Best Practices","slug":"best-practices","link":"#best-practices","children":[]},{"level":3,"title":"Restoring Wasabi","slug":"restoring-wasabi","link":"#restoring-wasabi","children":[]},{"level":3,"title":"Advanced Installing Wasabi","slug":"advanced-installing-wasabi","link":"#advanced-installing-wasabi","children":[]},{"level":3,"title":"Advanced Using Wasabi","slug":"advanced-using-wasabi","link":"#advanced-using-wasabi","children":[]}]}],"git":{"updatedTime":1720425186000},"filePathRelative":"using-wasabi/README.md"}');export{k as comp,x as data}; +import{_ as t,r as n,o as u,c as o,a,d as e,w as l,e as d,b as s}from"./app-CwImt2bI.js";const r={},c=d('

    Using Wasabi

    Here are all the nuances of how to use Wasabi Wallet in all regards. Starting with a step-by-step guide on how to verify and install the software. Further tutorials about the different parts of the wallet, for newbies and power users.

    Chapters

    Introducing Wasabi

    ',4),h=a("h3",{id:"installing-wasabi",tabindex:"-1"},[a("a",{class:"header-anchor",href:"#installing-wasabi"},[a("span",null,"Installing Wasabi")])],-1),b=a("h3",{id:"using-wasabi-1",tabindex:"-1"},[a("a",{class:"header-anchor",href:"#using-wasabi-1"},[a("span",null,"Using Wasabi")])],-1),g=a("h3",{id:"best-practices",tabindex:"-1"},[a("a",{class:"header-anchor",href:"#best-practices"},[a("span",null,"Best Practices")])],-1),w=a("h3",{id:"restoring-wasabi",tabindex:"-1"},[a("a",{class:"header-anchor",href:"#restoring-wasabi"},[a("span",null,"Restoring Wasabi")])],-1),f=a("h3",{id:"advanced-installing-wasabi",tabindex:"-1"},[a("a",{class:"header-anchor",href:"#advanced-installing-wasabi"},[a("span",null,"Advanced Installing Wasabi")])],-1),p=a("h3",{id:"advanced-using-wasabi",tabindex:"-1"},[a("a",{class:"header-anchor",href:"#advanced-using-wasabi"},[a("span",null,"Advanced Using Wasabi")])],-1);function _(m,W){const i=n("RouteLink");return u(),o("div",null,[c,a("ul",null,[a("li",null,[e(i,{to:"/using-wasabi/ELI5.html"},{default:l(()=>[s("Explain Wasabi like I'm 5")]),_:1})])]),h,a("ul",null,[a("li",null,[e(i,{to:"/using-wasabi/InstallPackage.html"},{default:l(()=>[s("Install package")]),_:1})])]),b,a("ul",null,[a("li",null,[e(i,{to:"/using-wasabi/WalletGeneration.html"},{default:l(()=>[s("Wallet Generation")]),_:1})]),a("li",null,[e(i,{to:"/using-wasabi/WalletLoad.html"},{default:l(()=>[s("Wallet Load")]),_:1})]),a("li",null,[e(i,{to:"/using-wasabi/Receive.html"},{default:l(()=>[s("Receive")]),_:1})]),a("li",null,[e(i,{to:"/using-wasabi/CoinJoin.html"},{default:l(()=>[s("CoinJoin")]),_:1})]),a("li",null,[e(i,{to:"/using-wasabi/Send.html"},{default:l(()=>[s("Send")]),_:1})]),a("li",null,[e(i,{to:"/using-wasabi/ColdWasabi.html"},{default:l(()=>[s("Hardware Wallet")]),_:1})]),a("li",null,[e(i,{to:"/using-wasabi/BitcoinFullNode.html"},{default:l(()=>[s("Bitcoin Full Node")]),_:1})])]),g,a("ul",null,[a("li",null,[e(i,{to:"/using-wasabi/PasswordBestPractices.html"},{default:l(()=>[s("Passwords")]),_:1})]),a("li",null,[e(i,{to:"/using-wasabi/BackupBestPractices.html"},{default:l(()=>[s("Backups")]),_:1})]),a("li",null,[e(i,{to:"/using-wasabi/ChangeCoins.html"},{default:l(()=>[s("Change Coins")]),_:1})])]),w,a("ul",null,[a("li",null,[e(i,{to:"/using-wasabi/WalletRecovery.html"},{default:l(()=>[s("Recover a Wallet")]),_:1})]),a("li",null,[e(i,{to:"/using-wasabi/ExternalRestore.html"},{default:l(()=>[s("Restoring Wasabi Wallet to Other Wallets")]),_:1})])]),f,a("ul",null,[a("li",null,[e(i,{to:"/using-wasabi/BuildSource.html"},{default:l(()=>[s("Build from source code")]),_:1})]),a("li",null,[e(i,{to:"/using-wasabi/DeterministicBuild.html"},{default:l(()=>[s("Deterministic Build")]),_:1})]),a("li",null,[e(i,{to:"/using-wasabi/WasabiSetupVM.html"},{default:l(()=>[s("Wasabi Setup using Virtual Machines")]),_:1})])]),p,a("ul",null,[a("li",null,[e(i,{to:"/using-wasabi/StartupParameters.html"},{default:l(()=>[s("Startup parameters")]),_:1})]),a("li",null,[e(i,{to:"/using-wasabi/Daemon.html"},{default:l(()=>[s("Headless Wasabi Daemon")]),_:1})]),a("li",null,[e(i,{to:"/using-wasabi/RPC.html"},{default:l(()=>[s("RPC Interface")]),_:1})]),a("li",null,[e(i,{to:"/using-wasabi/DiscreetMode.html"},{default:l(()=>[s("Discreet Mode")]),_:1})]),a("li",null,[e(i,{to:"/using-wasabi/PayJoin.html"},{default:l(()=>[s("PayJoin")]),_:1})]),a("li",null,[e(i,{to:"/using-wasabi/Testnet.html"},{default:l(()=>[s("Testnet")]),_:1})]),a("li",null,[e(i,{to:"/using-wasabi/BIPs.html"},{default:l(()=>[s("Supported BIPs")]),_:1})])])])}const k=t(r,[["render",_],["__file","index.html.vue"]]),x=JSON.parse('{"path":"/using-wasabi/","title":"Using Wasabi","lang":"en-US","frontmatter":{"title":"Using Wasabi","description":"Information and step-by-step guides on the nuances of how to use Wasabi. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Chapters","slug":"chapters","link":"#chapters","children":[{"level":3,"title":"Introducing Wasabi","slug":"introducing-wasabi","link":"#introducing-wasabi","children":[]},{"level":3,"title":"Installing Wasabi","slug":"installing-wasabi","link":"#installing-wasabi","children":[]},{"level":3,"title":"Using Wasabi","slug":"using-wasabi-1","link":"#using-wasabi-1","children":[]},{"level":3,"title":"Best Practices","slug":"best-practices","link":"#best-practices","children":[]},{"level":3,"title":"Restoring Wasabi","slug":"restoring-wasabi","link":"#restoring-wasabi","children":[]},{"level":3,"title":"Advanced Installing Wasabi","slug":"advanced-installing-wasabi","link":"#advanced-installing-wasabi","children":[]},{"level":3,"title":"Advanced Using Wasabi","slug":"advanced-using-wasabi","link":"#advanced-using-wasabi","children":[]}]}],"git":{"updatedTime":1720425980000},"filePathRelative":"using-wasabi/README.md"}');export{k as comp,x as data}; diff --git a/assets/index.html-C8GknQiE.js b/assets/index.html-QAa_NRbX.js similarity index 98% rename from assets/index.html-C8GknQiE.js rename to assets/index.html-QAa_NRbX.js index a868fd221..11831709e 100644 --- a/assets/index.html-C8GknQiE.js +++ b/assets/index.html-QAa_NRbX.js @@ -1 +1 @@ -import{_ as r,r as l,o as c,c as h,a as t,d as a,w as i,b as e,e as d}from"./app-3S7gIoGc.js";const u={},p=t("h1",{id:"getting-started",tabindex:"-1"},[t("a",{class:"header-anchor",href:"#getting-started"},[t("span",null,"Getting Started")])],-1),w=t("p",null,"This is a short comprehensive guide on how to get started using Wasabi.",-1),b=t("p",null,"Please refer to the rest of the documentation for detailed explanations and best practices.",-1),f={class:"table-of-contents"},m=t("h2",{id:"download-wasabi",tabindex:"-1"},[t("a",{class:"header-anchor",href:"#download-wasabi"},[t("span",null,"Download Wasabi")])],-1),g={href:"https://wasabiwallet.io",target:"_blank",rel:"noopener noreferrer"},v={href:"http://wasabiukrxmkdgve5kynjztuovbg43uxcbcxn6y2okcrsg7gb6jdmbad.onion",target:"_blank",rel:"noopener noreferrer"},_=t("h2",{id:"verify-the-download",tabindex:"-1"},[t("a",{class:"header-anchor",href:"#verify-the-download"},[t("span",null,"Verify the Download")])],-1),y=t("p",null,"Optionally, but highly recommended is to verify the downloaded package. This needs to be done in order to make sure that the just downloaded package is the authentic one and not a malicious one (replaced by a hacker etc...).",-1),k=t("h2",{id:"install-wasabi",tabindex:"-1"},[t("a",{class:"header-anchor",href:"#install-wasabi"},[t("span",null,"Install Wasabi")])],-1),x=t("p",null,"The downloaded Wasabi package needs to be installed on the computer so the application can be used.",-1),W=d('

    Welcome Screen

    The first time that you start Wasabi, you will be welcomed with information about the app. Read it and continue.

    Add Wallet

    You will be asked what kind of wallet you want to add. There are 4 options:

    • Create a new wallet
    • Connect hardware wallet
    • Import a wallet
    • Recover a wallet

    Select Create a new wallet.

    Now follow the next few steps/dialogs:

    • Write down the recovery words. (do not share these with anyone!)
    • Add a passphrase. (do not forget it and also write it down on a separate place from the recovery words, without your passphrase you cannot open your wallet and send your bitcoin!)
    • Select the coinjoin strategy: we select the default one Maximize Speed.

    DANGER

    The Recovery words can never be shown again.

    DANGER

    The passphrase cannot be changed later on. If you lose your passphrase you lose your bitcoin.

    Receive bitcoin

    ',11),j=t("code",null,"Receive",-1),I=d('

    Coinjoin

    After you have received some bitcoin, Wasabi will automatically coinjoin the bitcoin for you.

    Coinjoin will automatically start after the incoming funds are confirmed. You need to manually press the play button in the musicbox (at the bottom of the wallet) if you received less than 0.01 BTC.

    You know that your wallet is coinjoining if you see the stop button in the musicbox and the spectrum ("waving" color animation) at the bottom of the wallet.

    Now wait while you leave Wasabi running so it can do some coinjoins. You might need to wait for (a couple of) hour(s) (sometimes less or sometimes more) to get successful coinjoins and to see your privacy percentage reach 100%.

    Funds 100% private

    After one or more coinjoins your funds should be made private as you can see in the Privacy Progress tile at the top. All your funds are private if it displays 100%. In the history you will see a shield icon(s), which indicates that you successfully participated in a coinjoin round(s).

    Use the private bitcoin

    Now that all your bitcoin is private you can use your bitcoin to:

    • Make a payment.
    • Send it to cold storage.

    TIP

    Congratulations you are now using Wasabi!

    ',11);function S(R,T){const o=l("router-link"),s=l("ExternalLinkIcon"),n=l("RouteLink");return c(),h("div",null,[p,w,b,t("nav",f,[t("ul",null,[t("li",null,[a(o,{to:"#download-wasabi"},{default:i(()=>[e("Download Wasabi")]),_:1})]),t("li",null,[a(o,{to:"#verify-the-download"},{default:i(()=>[e("Verify the Download")]),_:1})]),t("li",null,[a(o,{to:"#install-wasabi"},{default:i(()=>[e("Install Wasabi")]),_:1})]),t("li",null,[a(o,{to:"#welcome-screen"},{default:i(()=>[e("Welcome Screen")]),_:1})]),t("li",null,[a(o,{to:"#add-wallet"},{default:i(()=>[e("Add Wallet")]),_:1})]),t("li",null,[a(o,{to:"#receive-bitcoin"},{default:i(()=>[e("Receive bitcoin")]),_:1})]),t("li",null,[a(o,{to:"#coinjoin"},{default:i(()=>[e("Coinjoin")]),_:1})]),t("li",null,[a(o,{to:"#funds-100-private"},{default:i(()=>[e("Funds 100% private")]),_:1})]),t("li",null,[a(o,{to:"#use-the-private-bitcoin"},{default:i(()=>[e("Use the private bitcoin")]),_:1})])])]),m,t("p",null,[e("Download Wasabi from the official website "),t("a",g,[e("wasabiwallet.io"),a(s)]),e(" or "),t("a",v,[e("wasabiukrxmkdgve5kynjztuovbg43uxcbcxn6y2okcrsg7gb6jdmbad.onion"),a(s)]),e(" if you're using the Tor Browser.")]),_,y,t("p",null,[e("How to do this depends on the desktop operating system, the detailed guides can be found here: "),a(n,{to:"/using-wasabi/InstallPackage.html#windows"},{default:i(()=>[e("Windows")]),_:1}),e(", "),a(n,{to:"/using-wasabi/InstallPackage.html#debian-and-ubuntu"},{default:i(()=>[e("Debian/Ubuntu")]),_:1}),e(", "),a(n,{to:"/using-wasabi/InstallPackage.html#other-linux"},{default:i(()=>[e("Other Linux")]),_:1}),e(", "),a(n,{to:"/using-wasabi/InstallPackage.html#macos"},{default:i(()=>[e("macOS")]),_:1})]),k,x,t("p",null,[e("How to do this depends on the desktop operating system, the detailed guides can be found here: "),a(n,{to:"/using-wasabi/InstallPackage.html#windows"},{default:i(()=>[e("Windows")]),_:1}),e(", "),a(n,{to:"/using-wasabi/InstallPackage.html#debian-and-ubuntu"},{default:i(()=>[e("Debian/Ubuntu")]),_:1}),e(", "),a(n,{to:"/using-wasabi/InstallPackage.html#other-linux"},{default:i(()=>[e("Other Linux")]),_:1}),e(", "),a(n,{to:"/using-wasabi/InstallPackage.html#macos"},{default:i(()=>[e("macOS")]),_:1})]),W,t("p",null,[e("As you can see, the new wallet is empty as it has 0.00000000 BTC. Click on "),j,e(" at the top right to "),a(n,{to:"/using-wasabi/Receive.html"},{default:i(()=>[e("receive")]),_:1}),e(" some bitcoin to this new wallet.")]),I])}const P=r(u,[["render",S],["__file","index.html.vue"]]),A=JSON.parse('{"path":"/getting-started/","title":"Getting Started","lang":"en-US","frontmatter":{"title":"Getting Started","description":"An easy and short guide on how to get started using Wasabi Wallet. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Download Wasabi","slug":"download-wasabi","link":"#download-wasabi","children":[]},{"level":2,"title":"Verify the Download","slug":"verify-the-download","link":"#verify-the-download","children":[]},{"level":2,"title":"Install Wasabi","slug":"install-wasabi","link":"#install-wasabi","children":[]},{"level":2,"title":"Welcome Screen","slug":"welcome-screen","link":"#welcome-screen","children":[]},{"level":2,"title":"Add Wallet","slug":"add-wallet","link":"#add-wallet","children":[]},{"level":2,"title":"Receive bitcoin","slug":"receive-bitcoin","link":"#receive-bitcoin","children":[]},{"level":2,"title":"Coinjoin","slug":"coinjoin","link":"#coinjoin","children":[]},{"level":2,"title":"Funds 100% private","slug":"funds-100-private","link":"#funds-100-private","children":[]},{"level":2,"title":"Use the private bitcoin","slug":"use-the-private-bitcoin","link":"#use-the-private-bitcoin","children":[]}],"git":{"updatedTime":1720425186000},"filePathRelative":"getting-started/README.md"}');export{P as comp,A as data}; +import{_ as r,r as l,o as c,c as h,a as t,d as a,w as i,b as e,e as d}from"./app-CwImt2bI.js";const u={},p=t("h1",{id:"getting-started",tabindex:"-1"},[t("a",{class:"header-anchor",href:"#getting-started"},[t("span",null,"Getting Started")])],-1),w=t("p",null,"This is a short comprehensive guide on how to get started using Wasabi.",-1),b=t("p",null,"Please refer to the rest of the documentation for detailed explanations and best practices.",-1),f={class:"table-of-contents"},m=t("h2",{id:"download-wasabi",tabindex:"-1"},[t("a",{class:"header-anchor",href:"#download-wasabi"},[t("span",null,"Download Wasabi")])],-1),g={href:"https://wasabiwallet.io",target:"_blank",rel:"noopener noreferrer"},v={href:"http://wasabiukrxmkdgve5kynjztuovbg43uxcbcxn6y2okcrsg7gb6jdmbad.onion",target:"_blank",rel:"noopener noreferrer"},_=t("h2",{id:"verify-the-download",tabindex:"-1"},[t("a",{class:"header-anchor",href:"#verify-the-download"},[t("span",null,"Verify the Download")])],-1),y=t("p",null,"Optionally, but highly recommended is to verify the downloaded package. This needs to be done in order to make sure that the just downloaded package is the authentic one and not a malicious one (replaced by a hacker etc...).",-1),k=t("h2",{id:"install-wasabi",tabindex:"-1"},[t("a",{class:"header-anchor",href:"#install-wasabi"},[t("span",null,"Install Wasabi")])],-1),x=t("p",null,"The downloaded Wasabi package needs to be installed on the computer so the application can be used.",-1),W=d('

    Welcome Screen

    The first time that you start Wasabi, you will be welcomed with information about the app. Read it and continue.

    Add Wallet

    You will be asked what kind of wallet you want to add. There are 4 options:

    • Create a new wallet
    • Connect hardware wallet
    • Import a wallet
    • Recover a wallet

    Select Create a new wallet.

    Now follow the next few steps/dialogs:

    • Write down the recovery words. (do not share these with anyone!)
    • Add a passphrase. (do not forget it and also write it down on a separate place from the recovery words, without your passphrase you cannot open your wallet and send your bitcoin!)
    • Select the coinjoin strategy: we select the default one Maximize Speed.

    DANGER

    The Recovery words can never be shown again.

    DANGER

    The passphrase cannot be changed later on. If you lose your passphrase you lose your bitcoin.

    Receive bitcoin

    ',11),j=t("code",null,"Receive",-1),I=d('

    Coinjoin

    After you have received some bitcoin, Wasabi will automatically coinjoin the bitcoin for you.

    Coinjoin will automatically start after the incoming funds are confirmed. You need to manually press the play button in the musicbox (at the bottom of the wallet) if you received less than 0.01 BTC.

    You know that your wallet is coinjoining if you see the stop button in the musicbox and the spectrum ("waving" color animation) at the bottom of the wallet.

    Now wait while you leave Wasabi running so it can do some coinjoins. You might need to wait for (a couple of) hour(s) (sometimes less or sometimes more) to get successful coinjoins and to see your privacy percentage reach 100%.

    Funds 100% private

    After one or more coinjoins your funds should be made private as you can see in the Privacy Progress tile at the top. All your funds are private if it displays 100%. In the history you will see a shield icon(s), which indicates that you successfully participated in a coinjoin round(s).

    Use the private bitcoin

    Now that all your bitcoin is private you can use your bitcoin to:

    • Make a payment.
    • Send it to cold storage.

    TIP

    Congratulations you are now using Wasabi!

    ',11);function S(R,T){const o=l("router-link"),s=l("ExternalLinkIcon"),n=l("RouteLink");return c(),h("div",null,[p,w,b,t("nav",f,[t("ul",null,[t("li",null,[a(o,{to:"#download-wasabi"},{default:i(()=>[e("Download Wasabi")]),_:1})]),t("li",null,[a(o,{to:"#verify-the-download"},{default:i(()=>[e("Verify the Download")]),_:1})]),t("li",null,[a(o,{to:"#install-wasabi"},{default:i(()=>[e("Install Wasabi")]),_:1})]),t("li",null,[a(o,{to:"#welcome-screen"},{default:i(()=>[e("Welcome Screen")]),_:1})]),t("li",null,[a(o,{to:"#add-wallet"},{default:i(()=>[e("Add Wallet")]),_:1})]),t("li",null,[a(o,{to:"#receive-bitcoin"},{default:i(()=>[e("Receive bitcoin")]),_:1})]),t("li",null,[a(o,{to:"#coinjoin"},{default:i(()=>[e("Coinjoin")]),_:1})]),t("li",null,[a(o,{to:"#funds-100-private"},{default:i(()=>[e("Funds 100% private")]),_:1})]),t("li",null,[a(o,{to:"#use-the-private-bitcoin"},{default:i(()=>[e("Use the private bitcoin")]),_:1})])])]),m,t("p",null,[e("Download Wasabi from the official website "),t("a",g,[e("wasabiwallet.io"),a(s)]),e(" or "),t("a",v,[e("wasabiukrxmkdgve5kynjztuovbg43uxcbcxn6y2okcrsg7gb6jdmbad.onion"),a(s)]),e(" if you're using the Tor Browser.")]),_,y,t("p",null,[e("How to do this depends on the desktop operating system, the detailed guides can be found here: "),a(n,{to:"/using-wasabi/InstallPackage.html#windows"},{default:i(()=>[e("Windows")]),_:1}),e(", "),a(n,{to:"/using-wasabi/InstallPackage.html#debian-and-ubuntu"},{default:i(()=>[e("Debian/Ubuntu")]),_:1}),e(", "),a(n,{to:"/using-wasabi/InstallPackage.html#other-linux"},{default:i(()=>[e("Other Linux")]),_:1}),e(", "),a(n,{to:"/using-wasabi/InstallPackage.html#macos"},{default:i(()=>[e("macOS")]),_:1})]),k,x,t("p",null,[e("How to do this depends on the desktop operating system, the detailed guides can be found here: "),a(n,{to:"/using-wasabi/InstallPackage.html#windows"},{default:i(()=>[e("Windows")]),_:1}),e(", "),a(n,{to:"/using-wasabi/InstallPackage.html#debian-and-ubuntu"},{default:i(()=>[e("Debian/Ubuntu")]),_:1}),e(", "),a(n,{to:"/using-wasabi/InstallPackage.html#other-linux"},{default:i(()=>[e("Other Linux")]),_:1}),e(", "),a(n,{to:"/using-wasabi/InstallPackage.html#macos"},{default:i(()=>[e("macOS")]),_:1})]),W,t("p",null,[e("As you can see, the new wallet is empty as it has 0.00000000 BTC. Click on "),j,e(" at the top right to "),a(n,{to:"/using-wasabi/Receive.html"},{default:i(()=>[e("receive")]),_:1}),e(" some bitcoin to this new wallet.")]),I])}const P=r(u,[["render",S],["__file","index.html.vue"]]),A=JSON.parse('{"path":"/getting-started/","title":"Getting Started","lang":"en-US","frontmatter":{"title":"Getting Started","description":"An easy and short guide on how to get started using Wasabi Wallet. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Download Wasabi","slug":"download-wasabi","link":"#download-wasabi","children":[]},{"level":2,"title":"Verify the Download","slug":"verify-the-download","link":"#verify-the-download","children":[]},{"level":2,"title":"Install Wasabi","slug":"install-wasabi","link":"#install-wasabi","children":[]},{"level":2,"title":"Welcome Screen","slug":"welcome-screen","link":"#welcome-screen","children":[]},{"level":2,"title":"Add Wallet","slug":"add-wallet","link":"#add-wallet","children":[]},{"level":2,"title":"Receive bitcoin","slug":"receive-bitcoin","link":"#receive-bitcoin","children":[]},{"level":2,"title":"Coinjoin","slug":"coinjoin","link":"#coinjoin","children":[]},{"level":2,"title":"Funds 100% private","slug":"funds-100-private","link":"#funds-100-private","children":[]},{"level":2,"title":"Use the private bitcoin","slug":"use-the-private-bitcoin","link":"#use-the-private-bitcoin","children":[]}],"git":{"updatedTime":1720425980000},"filePathRelative":"getting-started/README.md"}');export{P as comp,A as data}; diff --git a/assets/index.html-Bwp9TkQs.js b/assets/index.html-qf-rUQCE.js similarity index 93% rename from assets/index.html-Bwp9TkQs.js rename to assets/index.html-qf-rUQCE.js index ad2cb4893..de41d5219 100644 --- a/assets/index.html-Bwp9TkQs.js +++ b/assets/index.html-qf-rUQCE.js @@ -1 +1 @@ -import{_ as i,r as o,o as l,c as r,a as e,d as n,w as a,b as s}from"./app-3S7gIoGc.js";const c={},u=e("h1",{id:"frequently-asked-questions",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#frequently-asked-questions"},[e("span",null,"Frequently Asked Questions")])],-1),d=e("p",null,"This is an archive with many questions that Wasabikas have asked most frequently, including:",-1),h=e("ul",null,[e("li",null,"Answers about the basics of privacy and Bitcoin in general."),e("li",null,"The important details of how to install Wasabi properly, and the best practices for using it."),e("li",null,"Further guidance for those who are interested in contributing to Wasabi.")],-1),f=e("h2",{id:"chapters",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#chapters"},[e("span",null,"Chapters")])],-1);function p(_,m){const t=o("RouteLink");return l(),r("div",null,[u,d,h,f,e("ul",null,[e("li",null,[n(t,{to:"/FAQ/FAQ-Introduction.html"},{default:a(()=>[s("Introduction FAQ")]),_:1})]),e("li",null,[n(t,{to:"/FAQ/FAQ-Installation.html"},{default:a(()=>[s("Installation FAQ")]),_:1})]),e("li",null,[n(t,{to:"/FAQ/FAQ-UseWasabi.html"},{default:a(()=>[s("Use of Wasabi FAQ")]),_:1})]),e("li",null,[n(t,{to:"/FAQ/FAQ-GeneralBitcoinPrivacy.html"},{default:a(()=>[s("Bitcoin Privacy FAQ")]),_:1})]),e("li",null,[n(t,{to:"/FAQ/FAQ-Contribution.html"},{default:a(()=>[s("Contribution FAQ")]),_:1})])])])}const F=i(c,[["render",p],["__file","index.html.vue"]]),Q=JSON.parse('{"path":"/FAQ/","title":"Frequently Asked Questions","lang":"en-US","frontmatter":{"title":"Frequently Asked Questions","description":"Some of the questions that Wasabikas frequently have, with answers for easy reference. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Chapters","slug":"chapters","link":"#chapters","children":[]}],"git":{"updatedTime":1720425186000},"filePathRelative":"FAQ/README.md"}');export{F as comp,Q as data}; +import{_ as i,r as o,o as l,c as r,a as e,d as n,w as a,b as s}from"./app-CwImt2bI.js";const c={},u=e("h1",{id:"frequently-asked-questions",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#frequently-asked-questions"},[e("span",null,"Frequently Asked Questions")])],-1),d=e("p",null,"This is an archive with many questions that Wasabikas have asked most frequently, including:",-1),h=e("ul",null,[e("li",null,"Answers about the basics of privacy and Bitcoin in general."),e("li",null,"The important details of how to install Wasabi properly, and the best practices for using it."),e("li",null,"Further guidance for those who are interested in contributing to Wasabi.")],-1),f=e("h2",{id:"chapters",tabindex:"-1"},[e("a",{class:"header-anchor",href:"#chapters"},[e("span",null,"Chapters")])],-1);function p(_,m){const t=o("RouteLink");return l(),r("div",null,[u,d,h,f,e("ul",null,[e("li",null,[n(t,{to:"/FAQ/FAQ-Introduction.html"},{default:a(()=>[s("Introduction FAQ")]),_:1})]),e("li",null,[n(t,{to:"/FAQ/FAQ-Installation.html"},{default:a(()=>[s("Installation FAQ")]),_:1})]),e("li",null,[n(t,{to:"/FAQ/FAQ-UseWasabi.html"},{default:a(()=>[s("Use of Wasabi FAQ")]),_:1})]),e("li",null,[n(t,{to:"/FAQ/FAQ-GeneralBitcoinPrivacy.html"},{default:a(()=>[s("Bitcoin Privacy FAQ")]),_:1})]),e("li",null,[n(t,{to:"/FAQ/FAQ-Contribution.html"},{default:a(()=>[s("Contribution FAQ")]),_:1})])])])}const F=i(c,[["render",p],["__file","index.html.vue"]]),Q=JSON.parse('{"path":"/FAQ/","title":"Frequently Asked Questions","lang":"en-US","frontmatter":{"title":"Frequently Asked Questions","description":"Some of the questions that Wasabikas frequently have, with answers for easy reference. This is the Wasabi documentation, an archive of knowledge about the open-source, non-custodial and privacy-focused Bitcoin wallet for desktop."},"headers":[{"level":2,"title":"Chapters","slug":"chapters","link":"#chapters","children":[]}],"git":{"updatedTime":1720425980000},"filePathRelative":"FAQ/README.md"}');export{F as comp,Q as data}; diff --git a/building-wasabi/ContributionChecklist.html b/building-wasabi/ContributionChecklist.html index 136d2f6b1..08ebb3c15 100644 --- a/building-wasabi/ContributionChecklist.html +++ b/building-wasabi/ContributionChecklist.html @@ -27,11 +27,11 @@ Contribution Checklist | Wasabi Docs - - + +

    Contribution Checklist

    So you're interested in contributing to Wasabi - welcome!

    Embrace the open-source crypto-anarchy!

    No one is here to tell you what to do, and it is not required to work on an existing issue to contribute to Wasabi. Contributors are free to work on their own forked versions on whatever they want, however they wish and without any permission from anyone. With that being said, in order to maximize the usefulness/impact of your work, it's a good idea to consult with other Wasabikas via Slack, GitHub, or other communication channels before setting out on any serious contribution effort.

    This checklist will get you plugged in and productive as quickly as possible.

    Who is a contributor?

    A contributor is any individual who works to improve and add value to Wasabi and its users.

    You can become a Wasabika!

    Wasabi Wallet is free and open-source software, but contributing is not just about writing code. This means anything from fixing typos in documentation, answering questions of fellow Wasabikas, creating videos, podcasts and memes, implementing new Wasabi features and everything in-between. All such contributions are very welcomed and greatly appreciated.

    Say hello and get started

    • Join our Slackopen in new window and especially check out our GitHub repositoryopen in new window.
    • Introduce yourself, say a bit about your skills and interests. This will help others point you in the right direction.
    • Explore the communication channels and find out what the peers are tinkering on, learn about the project and who is contributing in what way. This will help you to find the interesting challenges you can work on.

    Learn how Wasabikas work

    It’s a simple set of collaboration rules based on GitHub’s fork and pull request model, and a foundational part of how we work together.

    What to work on

    Education and development are vitally important aspects of Bitcoin privacy and Wasabi Wallet specifically.

    The more Wasabi users there are, the better their privacy, because anonymity loves companyopen in new window.

    The better UX and privacy Wasabi provides, the more there will be users, because of network effectopen in new window.

    Education Contributor

    1. Videos, podcasts, memes and articles are great ways of sharing information to your peers. You can create wallet tutorials, record insightful discussions, write articles or make memes about Wasabi and privacy.
    2. Organizing events and doing presentations about Wasabi Wallet and Bitcoin privacy. Connecting like-minded individuals, who want to take control of their own financial privacy and teaching them about the awesome tools that are available, can be life changing.
    3. Helping and teaching new users, once you are familiar with the software, is something that can't be underestimated. You can do this in any social media like Twitter, Telegram, Reddit etc or in your own neighborhood.

    GitHub Contributor

    1. Find a problem somewhere in Wasabi-land that (a) needs fixing or improvement and (b) is a match for your skills and interests. Browse open issuesopen in new window and ask around about what other contributors think needs fixing. Because while you don’t need anybody’s permission and you can work on whatever you want, you’ll want to know up front whether anybody else is going to care about the work you do.
    2. Do work to fix that problem. Submit your fix for review with a pull request (for codeopen in new window and documentationopen in new window changes) or with a GitHub issueopen in new window (for everything else).
    3. Request that others review your work. The best way to do this is by writing good commit comments and pull request/issue descriptions that clearly explain the problem your work is intended to solve, why it’s important, and why you fixed it the way you did. Make it as easy as possible for others to review your work. Make it a pleasure for others to review your work.
    4. Incorporate review feedback you get until your fix gets merged or is otherwise accepted.
    5. Repeat steps 1–4.

    Remember: every contributor is free to work on what they want, including maintainers who may or may not want to review and merge your pull request if they don't have any prior context for it, or reason to believe it's worth spending their time on.

    Reviews are for everybody!

    If you want to be really popular around here, don’t just submit your own work, but also spend time reviewing the work of others.

    - + diff --git a/building-wasabi/LICENSE.html b/building-wasabi/LICENSE.html index 4c868059b..2e361f484 100644 --- a/building-wasabi/LICENSE.html +++ b/building-wasabi/LICENSE.html @@ -27,11 +27,11 @@ MIT License | Wasabi Docs - - + +

    MIT License

    Wasabi Wallet and Wasabi documentation is licensed under the MIT License.

    A short and simple permissive license with conditions only requiring preservation of copyright and license notices. Licensed works, modifications, and larger works may be distributed under different terms and without source code.

    PermissionsLimitationsConditions
    Commercial useLiabilityLicense and copyright notice
    ModificationWarranty
    Distribution
    Private use

    You can check the license hereopen in new window.

    - + diff --git a/building-wasabi/Security.html b/building-wasabi/Security.html index 65da0e68a..368ae8857 100644 --- a/building-wasabi/Security.html +++ b/building-wasabi/Security.html @@ -27,8 +27,8 @@ Security Policy | Wasabi Docs - - + +

    Security Policy

    If a vulnerability does not compromise users' privacy or security, open a regular GitHub issueopen in new window.

    If it does, then pay great care to responsible disclosure. Report a private vulnerability on GitHubopen in new window or send an email to molnardavid84@gmail.com, preferably using PGP encryption: F079 0C08 68BD BAB8 EE33 F9CE 50FB 7FEB 00F9 7588

    -----BEGIN PGP PUBLIC KEY BLOCK-----
    @@ -178,6 +178,6 @@
     =QePN
     -----END PGP PUBLIC KEY BLOCK-----
     
    - + diff --git a/building-wasabi/index.html b/building-wasabi/index.html index 11448edf7..146eecf72 100644 --- a/building-wasabi/index.html +++ b/building-wasabi/index.html @@ -27,11 +27,11 @@ Building Wasabi | Wasabi Docs - - + +

    Building Wasabi

    This is the place with all the nuances of how Wasabi Wallet is being built. You will also find some of the issues they are working on now, the research for future ideas, and all of the necessary information needed to quickly begin making your own invaluable contributions.

    Chapters

    Contributing to Wasabi

    Advanced

    - + diff --git a/getting-started/index.html b/getting-started/index.html index 054f00642..40194887f 100644 --- a/getting-started/index.html +++ b/getting-started/index.html @@ -27,11 +27,11 @@ Getting Started | Wasabi Docs - - + +

    Getting Started

    This is a short comprehensive guide on how to get started using Wasabi.

    Please refer to the rest of the documentation for detailed explanations and best practices.

    Download Wasabi

    Download Wasabi from the official website wasabiwallet.ioopen in new window or wasabiukrxmkdgve5kynjztuovbg43uxcbcxn6y2okcrsg7gb6jdmbad.onionopen in new window if you're using the Tor Browser.

    Verify the Download

    Optionally, but highly recommended is to verify the downloaded package. This needs to be done in order to make sure that the just downloaded package is the authentic one and not a malicious one (replaced by a hacker etc...).

    How to do this depends on the desktop operating system, the detailed guides can be found here: Windows, Debian/Ubuntu, Other Linux, macOS

    Install Wasabi

    The downloaded Wasabi package needs to be installed on the computer so the application can be used.

    How to do this depends on the desktop operating system, the detailed guides can be found here: Windows, Debian/Ubuntu, Other Linux, macOS

    Welcome Screen

    The first time that you start Wasabi, you will be welcomed with information about the app. Read it and continue.

    Add Wallet

    You will be asked what kind of wallet you want to add. There are 4 options:

    • Create a new wallet
    • Connect hardware wallet
    • Import a wallet
    • Recover a wallet

    Select Create a new wallet.

    Now follow the next few steps/dialogs:

    • Write down the recovery words. (do not share these with anyone!)
    • Add a passphrase. (do not forget it and also write it down on a separate place from the recovery words, without your passphrase you cannot open your wallet and send your bitcoin!)
    • Select the coinjoin strategy: we select the default one Maximize Speed.

    DANGER

    The Recovery words can never be shown again.

    DANGER

    The passphrase cannot be changed later on. If you lose your passphrase you lose your bitcoin.

    Receive bitcoin

    As you can see, the new wallet is empty as it has 0.00000000 BTC. Click on Receive at the top right to receive some bitcoin to this new wallet.

    Coinjoin

    After you have received some bitcoin, Wasabi will automatically coinjoin the bitcoin for you.

    Coinjoin will automatically start after the incoming funds are confirmed. You need to manually press the play button in the musicbox (at the bottom of the wallet) if you received less than 0.01 BTC.

    You know that your wallet is coinjoining if you see the stop button in the musicbox and the spectrum ("waving" color animation) at the bottom of the wallet.

    Now wait while you leave Wasabi running so it can do some coinjoins. You might need to wait for (a couple of) hour(s) (sometimes less or sometimes more) to get successful coinjoins and to see your privacy percentage reach 100%.

    Funds 100% private

    After one or more coinjoins your funds should be made private as you can see in the Privacy Progress tile at the top. All your funds are private if it displays 100%. In the history you will see a shield icon(s), which indicates that you successfully participated in a coinjoin round(s).

    Use the private bitcoin

    Now that all your bitcoin is private you can use your bitcoin to:

    • Make a payment.
    • Send it to cold storage.

    TIP

    Congratulations you are now using Wasabi!

    - + diff --git a/glossary/Glossary-GeneralBitcoin.html b/glossary/Glossary-GeneralBitcoin.html index 0d0d40a97..40362b7ad 100644 --- a/glossary/Glossary-GeneralBitcoin.html +++ b/glossary/Glossary-GeneralBitcoin.html @@ -27,11 +27,11 @@ Bitcoin in general | Wasabi Docs - - + +

    Bitcoin in general

    Address

    A Bitcoin invoice address commits to a public key or script which defines who can spend the coin. It is specified in the output of a transaction, and it should only be used once. Wasabi uses the bech32 and bech32m format to encode native segregated witness addresses. Read more: Bitcoin addresses

    Bitcoin

    Bitcoin is a peer-to-peer electronic cash system. An innovative payment network and a new kind of money. It is a decentralized digital currency without a central bank or single administrator that can be sent from user to user on the peer-to-peer bitcoin blockchain network without the need for intermediaries.

    Bitcoin Core

    Bitcoin Core is an open-source project which maintains and releases Bitcoin client software called Bitcoin Core, considered to be Bitcoin's reference implementation. It is a direct descendant of the original Bitcoin software client released by Satoshi Nakamoto after he published the famous Bitcoin whitepaper.

    Bitcoin Core consists of both full-node software for fully validating the blockchain as well as a Bitcoin wallet. The project also currently maintains related software such as the cryptography library libsecp256k1 and others located at GitHub. Read more: Bitcoin Core Websiteopen in new window

    Bitcoin Improvement Proposal (BIP)

    Bitcoin Improvement Proposal. A design document for introducing features or information to Bitcoin. Read more: Wasabi Supported BIPs

    Bitcoin Knots

    Bitcoin Knots is a derivative of Bitcoin Core with a collection of improvements backported from and sometimes maintained outside of Core's master git tree. Since version 1.1.11, Wasabi has partial Bitcoin Knots integration. This means that it is possible (but not mandatory) to start Bitcoin Knots during the launch of Wasabi, without having to install or configure anything. Read more: Bitcoin Knots Websiteopen in new window

    Block

    A block is a batch of valid Bitcoin transactions and its hash must be a value below a certain difficulty target to prove the work of the miner. Each block references the hash of the previous block, thus creating a hash chain of blocks. On average a new block is mined every 10 minutes.

    Blockchain

    The blockchain is the one chain of valid Bitcoin blocks with the most accumulated proof of work. It is an append-only data structure with new blocks being added on average every 10 minutes. Because of its uniquely verifiable and global consensus, it is a revolutionary standard for time, thus some call it timechain.

    Change

    In a transaction where the provided input coins are larger than the value sent to the destination address, then the leftover change is sent to a new address of the same wallet. Read more: Change coins

    Child Pays For Parent (CPFP)

    Child Pays For Parent (CPFP) is a fee bumping technique where a user spends an output from a low fee rate unconfirmed transaction in a child transaction with a high fee rate in order to encourage miners to include both transactions in a block.

    Coinbase

    A special field used as the sole input for coinbase transactions. The coinbase allows claiming the block reward and provides up to 100 bytes for arbitrary data.

    Coinbase Transaction

    The first transaction in a block. Always created by a miner, it includes a single coinbase.

    Cold Storage

    Refers to keeping a reserve of important Bitcoin secrets offline. Cold storage is achieved when Bitcoin private keys are created and stored in a secure offline environment. Cold storage is important for anyone with bitcoin holdings. Online computers are vulnerable to hackers and should not be used to store a significant amount of bitcoin. Read more: Cold Wasabi Protocol

    Confirmations

    Once a transaction is included in a block, it has one confirmation. As soon as another block is mined on the same blockchain, the transaction has two confirmations, and so on. Six or more confirmations is considered sufficient proof that a transaction cannot be reversed.

    Consensus

    When several nodes, usually most nodes on the network, all have the same blocks in their locally-validated best blockchain.

    Consensus Rules

    The block validation rules that full nodes follow to stay in consensus with other nodes.

    Custodial (Wallet or Mixer)

    A custodial wallet is any wallet where the private keys of your coins are in the hands of a third party. In essence, they operate similarly to traditional banks.

    A custodial mixer needs you to send your bitcoins to a central part before mixing. This means that you are at risk of being stolen from.

    Difficulty

    A network-wide setting that controls how much computation is required to produce a proof of work.

    Difficulty Retargeting (Difficulty Adjustment)

    A network-wide recalculation of the difficulty that occurs once every 2,016 blocks and considers the hashing power of the previous 2,016 blocks.

    Difficulty Target

    A difficulty at which all the computation in the network will find blocks approximately every 10 minutes. It specifies the numeric value the hash of a block must not be above to be considered a valid block.

    ECDSA

    ECDSA (Elliptic Curve Digital Signature Algorithm) is one of the digital signature algorithms used by Bitcoin to ensure that funds can only be spent by their rightful owners.

    Fork

    Fork, also known as accidental fork, occurs when two or more blocks have the same block height, forking the blockchain. Typically occurs when two or more miners find blocks at nearly the same time. Can also happen as part of an attack.

    Full node

    Any computer that connects to the Bitcoin network is called a node. Nodes that fully verify all of the rules of Bitcoin are called full nodes. Full nodes download every block and transaction and check them against Bitcoin's consensus rules.

    Fungibility

    Fungibility is a desirable property of Bitcoin UTXOs that are indistinguishable from each other. Read more: Transaction surveillance companies attempting to destroy fungibility

    Genesis Block

    The first block in the blockchain, used to initialize the cryptocurrency.

    Hard Fork

    Hard fork, also known as hard-forking change, is a permanent divergence in the blockchain, it occurs when non-upgraded nodes can not validate blocks created by upgraded nodes that follow newer consensus rules. The upgraded nodes break the rules of the legacy nodes. Not to be confused with fork, soft fork, software fork or Git fork.

    Hardware Wallet (HWW)

    A hardware wallet is a special type of Bitcoin wallet which generates and stores the user's private keys on a dedicated hardware device. Read more: Hardware Wallet FAQs

    Hash

    A cryptographic hash function takes any input of arbitrary size [the message] and computes a value of fixed size that is unique to the input, which is called a hash or a digest. If one bit of the input changes, the output will be completely different [avalanche effect]. And there are no two messages that result in the same hash [collision resistance]. The only way to get any given input, is by computing all possible inputs, it is a one-way function [pre-image resistance]. Bitcoin uses the SHA256 in many parts of the protocol.

    Hierarchical Deterministic (HD) Protocol

    The Hierarchical Deterministic key creation and transfer protocol (BIP32), which allows creating child keys from parent keys in a hierarchy.

    Hierarchical Deterministic (HD) Wallet

    Wallets using the Hierarchical Deterministic Protocol key creation and transfer protocol (BIP32).

    Hot Wallet

    A hot wallet is a software wallet that runs on a device which is connected to the Internet. Wasabi is a hot wallet by default.

    Input

    Input, transaction input, or TxIn is an input in a Bitcoin transaction which contains two fields: a unique transaction hash and an index number, which references one utxo of a previous transaction which is spent in this transaction.

    Lightning Network (LN)

    Lightning Network is a proposed implementation of Hashed Timelock Contracts (HTLCs) with bi-directional payment channels which allows payments to be securely routed across multiple peer-to-peer payment channels. This allows the formation of a network where any peer on the network can pay any other peer even if they don't directly have a channel open between each other.

    Mainnet

    The original and main network for Bitcoin transactions, where satoshis have real economic value.

    Mempool

    The Bitcoin Mempool (memory pool) is a collection of all transaction data in a block that have been verified by Bitcoin nodes, but are not yet confirmed. Read more: How does Wasabi know of incoming transactions to the mempool?

    Merkle Root

    The root node of a merkle tree, a descendant of all the hashed pairs in the tree. Block headers must include a valid merkle root descended from all transactions in that block.

    Merkle Tree

    A tree constructed by hashing paired data (the leaves), then pairing and hashing the results until a single hash remains, the merkle root. In Bitcoin, the leaves are almost always transactions from a single block.

    Miner

    A Bitcoin user that attempts to find valid proof of work for new candidate blocks, by repeated hashing until the difficulty target is met.

    Mining Reward

    An amount of satoshis included in each new block as a reward by the network to the miner who found the proof of work solution. Initially it was 50 bitcoin per block, which is halved every 210 000 blocks, or roughly 4 years. This leads to a total money supply of just below 21 million bitcoin.

    Multisignature (multisig)

    Multisignature (m-of-n multisig) refers to requiring more than one key to authorize a Bitcoin transaction. Only with m signatures of n public keys can the bitcoin be spent. Read more: Can I generate a multi signature script?

    Non-Custodial (Wallet or Mixer)

    A non-custodial wallet is any wallet where the private keys of your coins are in your hands. Non-custodial wallets give you full control over your bitcoins.

    A non-custodial mixer like Wasabi eliminates the risk that the coordinator can steal your bitcoin. Each participant verifies the proposed transaction, and signs it only if it is valid. This signature is only valid for this transaction, so any attempt to change the transaction after the fact is futile. The funds will always be in a Bitcoin address that you control.

    Nonce

    The nonce in a Bitcoin block is a 32-bit (4-byte) field whose value is set so that the hash of the block will contain a run of leading zeros. The rest of the fields may not be changed, as they have a defined meaning.

    Off-chain Transaction

    An off-chain transaction is the movement of value outside of the blockchain. While an on-chain transaction - usually referred to as simply a transaction - modifies the blockchain and depends on the blockchain to determine its validity. An off-chain transaction relies on other methods to record and validate the transaction.

    Output

    Output, transaction output, or TxOut is an output in a Bitcoin transaction which contains two fields: a value field for transferring zero or more satoshis and a pubkey script for indicating what conditions must be fulfilled for those satoshis to be further spent.

    P2PKH

    Many transactions processed on the Bitcoin network spend outputs locked with a Pay-to-Public-Key-Hash or P2PKH script. These outputs contain a locking script that locks the output to a public key hash, more commonly known as a Bitcoin address. An output locked by a P2PKH script can be unlocked (spent) by presenting a public key and a digital signature created by the corresponding private key.

    P2SH

    P2SH or Pay-to-Script-Hash is a type of transaction that simplifies the use of complex transaction scripts. With P2SH the complex script that details the spending conditions (redeem script) is committed to with a hash in the locking script.

    P2TR

    A pay-to-taproot (P2TR), also known as a Taproot or Bech32m address, is the most recent and advanced bitcoin address format. Taproot introduces more advanced security, privacy, flexibility and scaling to bitcoin.

    P2WPKH

    The signature of a P2WPKH (Pay-to-Witness-Public-Key-Hash) contains the same information as a P2PKH spending, but is located in the witness field instead of the scriptSig field.

    Paper Wallet

    In the most specific sense, a paper wallet is a document containing all the secrets to spend a Bitcoin UTXO. It is a way of storing bitcoin offline as a physical document.

    Partially Signed Bitcoin Transaction (PSBT)

    PSBT is a binary transaction format which contains the information necessary for a signer to produce signatures for the transaction and holds the signatures for an input while the input does not have a complete set of signatures. The signer can be offline as all necessary information will be provided in the transaction. Read more: BIP 174 Partially Signed Bitcoin Transaction Formatopen in new window

    Pay-to-Witness-Public-Key-Hash (P2WPKH)

    The signature of a P2WPKH contains the same information as a Pay-to-Public-Key-Hash (P2PKH) spending, but is located in the witness field instead of the scriptSig field. The scriptPubKey is also modified. Read more: BIP 84 derivation scheme for P2WPKH based accountsopen in new window

    Payment Channels

    A payment channel is class of techniques designed to allow users to make multiple Bitcoin transactions without committing all of the transactions to the Bitcoin blockchain. In a typical payment channel, only two transactions are added to the blockchain, one funding and one closing transaction, but a nearly unlimited number of payments can be made between the participants.

    Plausible deniability

    Plausible deniability is the ability to deny knowledge of or responsibility for any damnable actions committed by others in an organizational hierarchy because of a lack of evidence that can confirm their participation, even if they were personally involved in or at least willfully ignorant of the actions.

    Private Key

    A private key is a large number that must be chosen at random, it is thus a very secure password and should be kept secret. With knowledge of this number, anyone can easily compute the public key, and a signature over any message. It can also be used to decrypt any message that was encrypted to the public key corresponding to the private key. In Bitcoin, a signature over a valid transaction message gives the right to spend a coin, thus knowledge of the private key corresponds to ownership of the bitcoin. Read more: Bitcoin private keys

    Proof of Work (POW)

    One of the requirements for a Bitcoin block to be valid is its hash should be below a certain difficulty target. In order to create a valid block, a miner must repeatedly hash a candidate block with a changing nonce until by sheer luck he finds a hash with low value. By providing this pre-image block, anyone can verify the amount of computational energy that a miner on average should have invested in order to find this block, and this is what is known as Proof of Work.

    Public Key

    A public key is calculated by multiplying the private key to the generator point of an elliptic curve. Given only the public key, the private key cannot be calculated. Anyone can encrypt a message using a public key. This encrypted message (cyphertext) can only be decrypted through the related private key. Given a public key and a signature over a message, anyone can verify that the signer had the private key and the message. In Bitcoin, the public key is the pseudonymous identity of the owner of a coin. Read more: Bitcoin private keys

    Regtest

    A local testing environment in which developers can instantly generate blocks on demand for testing events, and can create private satoshis with no real-world value.

    Replace by Fee (RBF)

    Replacing one version of an unconfirmed transaction with a different version of the transaction that pays a higher transaction fee.

    satoshi (sat)

    A satoshi is the smallest denomination of bitcoin that can be recorded on the blockchain. It is the equivalent of 0.00000001 bitcoin and is named after the creator of Bitcoin, Satoshi Nakamoto.

    Satoshi Nakamoto

    Satoshi Nakamoto is the name used by the person or group of people who designed Bitcoin and created its original reference implementation. As a part of the implementation, they also devised the first blockchain database. In the process they were the first to solve the double-spending problem for digital currency in a decentralized and self verifying nature. Their real identity remains unknown.

    Schnorr Digital Signature Scheme

    Schnorr Digital Signature Scheme is one of the digital signature algorithms used by Bitcoin to ensure that funds can only be spent by their rightful owners. Schnorr signatures and public keys can be aggregated, meaning that multiple parties with unique private keys can sign the same message, which can be verified in batches instead of individually.

    Script

    Bitcoin uses a scripting system for transactions. Forth-like, Script is simple, stack-based and processed from left to right. It is purposefully not Turing-complete, with no loops.

    ScriptPubKey

    ScriptPubKey or pubkey script, is a script included in outputs which sets the conditions that must be fulfilled for those satoshis to be spent. Data for fulfilling the conditions can be provided in a signature script.

    ScriptSig

    ScriptSig or signature script, is the data generated by a spender which is almost always used as variables to satisfy a pubkey script.

    Segregated Witness (SegWit)

    Segregated Witness is a structure where the witness [signature or redeem script] is stored separately from the transaction Merkle tree. This is separated because the witness contains only data concerning transaction validity, but not about transaction effect. Read more: Why Wasabi uses only SegWit

    Simplified Payment Verification (SPV)

    SPV is a method for verifying particular transactions were included in a block without downloading the entire block. The method is used by some lightweight Bitcoin clients.

    Soft Fork

    A soft fork is a change to the Bitcoin consensus rules that is backwards compatible. Users of this update do not break the rules of legacy users, but rather restrict themselves to a more narrow rule set.

    Taproot

    Taproot is an upgrade to Bitcoin which introduces several new features. Taproot integrates the Schnorr digital signature scheme into Bitcoin, upgrading Bitcoin’s core cryptography. Taproot builds on the SegWit upgrade to improve Bitcoin’s privacy and lower transaction fees. Taproot makes future Bitcoin upgrades easier by reforming Bitcoin’s scripting language.

    Testnet

    A testing environment in which users can obtain and spend satoshis that have no real-world value on a global network that is very similar to the Bitcoin mainnet.

    Timechain

    Timechain is a synonym of blockchain. It emphasizes the achievement of the Bitcoin protocol to establish consensus on the temporal order of transactions so to prevent double-spends.

    Transaction

    In simple terms, a transfer of bitcoin. More precisely, a transaction is a signed data structure expressing a transfer of value and consisting mainly of inputs and outputs. Transactions are transmitted over the Bitcoin network, collected by miners, and included into blocks, made permanent on the blockchain.

    Transaction Fees

    A transaction has a fee payment to the miner who includes the transaction in a valid block. It is implied by the difference of inputs - outputs. Read more: What fee should I select?

    Unspent Transaction Output (UTXO)

    UTXO is an unspent transaction output that can be spent as an input in a new transaction. Read more: How can I select UTXOs for CoinJoin?

    Wallet

    Software that holds all your Bitcoin addresses and secret keys. Use it to send, receive, and store your bitcoin.

    - + diff --git a/glossary/Glossary-PrivacyWasabi.html b/glossary/Glossary-PrivacyWasabi.html index 184bd3964..51b93367a 100644 --- a/glossary/Glossary-PrivacyWasabi.html +++ b/glossary/Glossary-PrivacyWasabi.html @@ -27,11 +27,11 @@ Privacy and Wasabi | Wasabi Docs - - + +

    Privacy and Wasabi

    #twoweeks

    The #twoweeks is a fun inside joke often used in the Wasabi documentation and, more generally, in the Internet community. In the case of Wasabi documentation, it usually indicates the arrival of a new function or update, to which the future date is still uncertain.

    E.g. "Lightning Network is coming to Wasabi in #twoweeks"

    Absolute min input count

    The client will refuse to participate in coinjoin rounds with a minimum input count lower than this value. The default value is 21.

    Address Reuse

    Address reuse refers to the use of the same address for multiple transactions, this is very bad for privacy. Read more: Address reuse

    Anonymity Score (anonscore)

    Anonymity score is a new way to estimate the entropy level of a UTXO in an unequal-but-highly-composable output value coinjoin. The anonymity score is a metric to help the wallet decide when it's time to stop the coinjoining process. Read more: What is the anonymity score?

    Anonymity Set (anonset)

    The anonymity set is effectively the size of the group you are hiding in during a CoinJoin. It's the quantity of equal value outputs of one CoinJoin transaction. Read more: What is the anonymity set?

    Auto-start coinjoin (Pleb Stop) threshold

    The auto-start coinjoin threshold, a.k.a Pleb Stop, is the minimum wallet balance at which coinjoin will automatically start/continue. The amount can be changed in the Coinjoin Settings (Auto-start coinjoin threshold setting), the default is 0.01 BTC.

    Backend

    The part of a software system that is not usually visible or accessible to a user of that systemopen in new window. In the case of Wasabi, the backend functions as the coinjoin coordinator and provides data to the client (user) like block filters, exchange rate, and network estimations (mempool).

    Block filters

    A filter representing a compact list of addresses in one block. Wasabi checks locally if any block filter contains transactions with addresses of the wallet. No public keys are sent to any third party server, thus it is very private. Read more: BIP 158: Compact Block Filters for Light Clientsopen in new window

    Blockchain Analysis

    Blockchain analysis is used by transaction surveillance companies to follow the transaction history of coins. Techniques like the common-input-ownership heuristic or change detection are used to create a cluster of transactions belonging to one user. Read more: Blockchain Analysis

    Bloom Filter

    A filter used primarily by SPV clients to request only block headers and merkle proofs of a given transaction from full nodes. This is very bad for privacy, as third party servers learn about which addresses you are interested in. Read more: BIP 37: Connection Bloom Filteringopen in new window

    Change Address Detection

    Many Bitcoin transactions have change outputs. It would be a serious privacy leak if the change address can be somehow found, as it would link the ownership of the (now spent) inputs with a new output. Read more: Change coins

    Chaumian CoinJoin

    A Chaumian CoinJoin is a special type of CoinJoin that utilizes Chaumian [or Schnorr] blind signatures to prevent the central coordinator from spying on the linkage between inputs and outputs. Read more: Use of blind signatures in CoinJoin

    Client

    A software that allows a computer to function as a client in a networkopen in new window. In the case of Wasabi, the client is a Wasabi Wallet software version which a user has on his own local machine. The client can communicate with the backend.

    Cluster

    Which entities know about which coins. For example, this coin belongs to a cluster that is known by a KYC exchange and Alice. Read more: What is the cluster history?

    Coin Control

    The possiblity for the user to manually select UTXO's. It is mostly used for sending, so the user can select which UTXO's should be used as the inputs of the transaction. Read more: Coin Control Best Practices

    CoinJoin (CJ)

    CoinJoin is a trustless method for combining multiple Bitcoin payments from multiple spenders into a single transaction to make it more difficult for outside parties to determine which spender paid which recipient. Read more: What is a CoinJoin?

    Coinjoin Strategy

    A Coinjoin Strategy contains instructions for the automatic "coinjoin robot" about configurations like when and how much to coinjoin. Read more: Coinjoin Strategy

    Coinjoin Time Preference

    The wallet will only participate in coinjoin when the fee rate is below the median of the chosen time frame (Hours, Days, Weeks, or Months).

    (FeeRateMedianTimeFrameHours in the wallet file)

    CoinJoined coins

    Coins that have successfully participated in a CoinJoin (with the exception of the change) and thus lose their association to a previous cluster. Read more: What is the privacy I get after mixing with Wasabi?

    Common-Input-Ownership heuristic

    This is a heuristic or assumption which says that if a transaction has more than one input then all those inputs are owned by the same entity.

    Coordinator

    The coordinator is a server which creates CoinJoins and accepts UTXOs in the mix. Read more: How does my wallet communicate with the Wasabi coordinator server?

    Daemon

    A daemon is a command line interface to run Wasabi without the GUI (Graphical User Interface). Read more: Headless Wasabi Daemon

    Discreet Mode

    Discreet Mode is a Wasabi feature that hides sensitive and critical information on the wallet itself, which is useful for screenshots. Read more: Discreet Mode

    Dust

    Dust is an UTXO that is uneconomical to spend. Also, small portions of bitcoin can lead to serious consequences for one's privacy, for example the so called forced address reuse attack. Read more: What is the dust threshold

    Know Your Customer (KYC)

    KYC (Know Your Customer) is the process of a business being forced to identify and verify the identity of its clients, and to share this information with a government. The term is also used to refer to the bank regulation which governs these activities. Read more: AML/KYC Information

    Label

    A label can be added to a coin, as a small note on who knows this coin belongs to you. Good labelling can help the user and the wallet to make better privacy conscious decisions later on when spending. Read more: Why do I have to label my address

    Max Coordination Fee Rate

    The maximum coordination fee rate the client is willing to accept to participate into a round. The default value is 0.

    Max Coinjoin Mining Fee Rate

    The maximum mining fee rate in sat/vByte the client is willing to pay to participate into a round. The default value is 150.

    Observers

    A way to track who knows about the ownership of your coins. Not to be confused with a description of a transaction. Read more: The importance of labeling

    Pay to EndPoint (P2EP)

    Pay to EndPoint is when the receiver is reachable over the internet and the sender communicates with the receiver to coordinate a more advanced transaction. The Tor onion service, IP address or domain of the receiver is included in a BIP21 Bitcoin URI payment link.

    Peers

    Peers in our documentation refers mainly to Bitcoin and Wasabi Wallet users, but it also means people. They are literally peers in the network, or in the CoinJoin.

    RPC

    RPC, or Remote Procedure Call, is an interface to interact with Wasabi Wallet programmatically. Read more: RPC Interface

    Safety coinjoin

    Safety coinjoin is a concept for doing an extra coinjoin after a user registers only anonymity score 1 (non-private) coins in their first round.

    This was added in Wasabi 2.0.6 versionopen in new window to increase privacy for people who generate a new wallet -> receive a coin -> do one coinjoin -> send all the money out. It aims to prevent targeted analysis that compares the value of consolidated coinjoin outputs with the value of one of the coinjoin's inputs.

    Taint

    Taint is equivalent to the 'trail' that a Bitcoin transaction leaves during the course of its journey. The taint analysis of a Bitcoin transaction evaluates the association between an address involved in the chain of transactions. Read more: Blockchain Analysis

    The Onion Router (Tor)

    Tor (The Onion Router) is free and open-source software for enabling anonymous communication. It is widely used by Wasabi. Read more: How does Tor protect my network level privacy?

    Transaction Surveillance Company

    A transaction surveillance company is one which attempts to spy on all Bitcoin users. Their business model is usually to sell the data to any government, corporation or individual willing to pay for their services. Read more: Transaction Surveillance Companies

    Tumbling / Tumbler

    Tumbling is a synonym of 'Mixing'. Similarly, Tumbler is the synonym of 'Mixer'.

    TurboSync

    A feature in Wasabi to reduce wallet loading time. With TurboSync, some addresses (internal keys only) are skipped and tested in the background. Read more: TurboSync

    WabiSabi

    WabiSabi is a protocol for constructing coinjoin transactions with the aid of a centralized coordinator. It utilizes keyed-verification anonymous credentials, homomorphic value commitments, and zero knowledge proofs to achieve privacy and flexibility. Read more: WabiSabiopen in new window

    Wallet fingerprinting

    A careful analyst sometimes deduces which software created a certain transaction, because many different wallet softwares don't always create transactions in exactly the same way.

    Wasabika

    Wasabikas are builders, users and supporters of Wasabi in general.

    XPUB (Extended Public Key)

    An xpub, also known as Extended Public Key, is a part of BIP-32 that will allow you to observe your wallet without the private key (xpriv).

    ZeroLink is a framework to holistically design a privacy and fungibility setup for Bitcoin. This encompasses more than just a single CoinJoin transaction, but also includes network level privacy defense against third party spying. Read more: ZeroLink: the Bitcoin Fungibility Framework

    - + diff --git a/glossary/index.html b/glossary/index.html index a6496325c..49db8d5e3 100644 --- a/glossary/index.html +++ b/glossary/index.html @@ -27,11 +27,11 @@ Glossary | Wasabi Docs - - + +

    Glossary

    This glossary contains the explanations of common words used in Wasabi and regarding Bitcoin privacy in general. Every item contains a link to the respective full document for more details.

    Chapters

    - + diff --git a/index.html b/index.html index 41be2e25b..7f018f1fd 100644 --- a/index.html +++ b/index.html @@ -27,11 +27,11 @@ Wasabi Docs - - + +

    Wasabi Documentation

    An archive of knowledge about Wasabi Wallet, an open-source, non-custodial and privacy-focused Bitcoin wallet for desktop.

    Reclaim Your Privacy →

    Open-source

    Don't trust, verify. Wasabi is libre and open source software under the MIT license. You have full access to every single line of code, and you can do with it as you please.

    Non-custodial

    Not your keys, not your bitcoin. With Wasabi, you are always in full control of your private and public keys, you never share them with any third party.

    Privacy-focused

    Privacy is the ability to choose what you reveal to others. Wasabi is designed with one goal in mind, to protect your sensitive financial data, on the network level and on the blockchain level.


    This is Wasabi Wallet'sopen in new window open source documentation. Here you will find information about the nuances of privacy in Bitcoin, how Wasabi solves some of the existing problems, and how you can use this tool to defend yourself. Everyone is welcome to make the Wasabi Wallet documentation better, by contributing on GitHubopen in new window! The documentation of Wasabi Wallet 1.0 is archived hereopen in new window.

    How to use this documentation

    This documentation is a good place to start your education on how to use Wasabi Wallet, as it is a thorough archive about many nuances of Bitcoin privacy.

    Explain Like I'm 5

    If you are new to Wasabi and want to get a quick tutorial on how to use it, you may start here.

    Stand-alone chapters

    If you are interested in the nuances of how one specific aspect of Wasabi works, then check-out the detailed chapters here.

    Search function

    If you have a question about some particular detail, then use the search function at the top right corner to browse the entire archive, including the frequently asked questions.

    - + diff --git a/using-wasabi/BIPs.html b/using-wasabi/BIPs.html index e9cf490ce..e35ea2d0f 100644 --- a/using-wasabi/BIPs.html +++ b/using-wasabi/BIPs.html @@ -27,11 +27,11 @@ Supported BIPs | Wasabi Docs - - + +
    - + diff --git a/using-wasabi/BackupBestPractices.html b/using-wasabi/BackupBestPractices.html index 7794cf8d3..bd88081cc 100644 --- a/using-wasabi/BackupBestPractices.html +++ b/using-wasabi/BackupBestPractices.html @@ -27,11 +27,11 @@ Wasabi Backup Best Practices | Wasabi Docs - - + +

    Wasabi Backup Best Practices

    Common mediums for backups

    Written on a piece of paper

    • Anyone who can see it, can steal it
    • Handwriting can be hard to read or completely illegible
    • Human error in transcription can cause errors on the end product
    • Paper can rot, be torn, burn, or be smoke damaged

    Printed on a piece of paper

    • Anyone who can see it, can steal it
    • Type of printer - non-laser printers ink can run if the paper gets wet
    • Have to trust printer - some have internet connections, wifi, and memory
    • Paper can rot, be torn, burn, or be smoke damaged

    On laminated paper

    • Anyone who can see it, can steal it
    • Lamination is prone to degradation over time, as well as punctures or cuts that could allow moisture to get trapped in the paper and cause deterioration or rotting in some circumstances | store in cool dry place
    • Can burn or be smoke damaged
    • 'Fireproof' & 'Fire-resistant' boxes can help protect paper in a small house fire but be warned that they can sometimes fall apart in the fire and get wet if the fire is put out with water. Remember people can just carry out a small safe

    Engraved / etched / ablated / stamped on a piece of metal

    • Anyone who can see it, can steal it
    • Some metals can deteriorate or corrode, choose a good metal; also store your metal away from direct contact other metals.
    • Some metals that are corrosion resistant have low melting points, are extremely expensive, or hard to machine.
    • Metals can still deform or melt from heat, destroying any engraved SK. "Most house fires do not burn hotter than 1,200 degrees Fahrenheit. This temperature is typically associated with the hottest portion of a home, which is in the roof area. Homes that burn for longer than 30 minutes or consist of multiple levels sometimes burn at higher temperatures." You want to pick a metal that won't be destroyed by a fire. So magnesium, tin, and lead are all out as engraving materials.
    • Silver, gold, copper, brass, bronze, nickel, cobalt, would survive the housefire unmelted. Some Aluminium alloys can survive but you have to have the right ones. At around 1500° Steel and Nickel should be okay. Titanium is above the housefire range and so is tungsten, however tungsten rings are known to shatter due to the brittle nature of the very hard metal.

    Stored digitally on a computer

    • Computers can crash, making data recovery expensive
    • Data can still technically be recovered after a system is abandoned by the user. In some cases data can be recovered after multiple overwriting attempts and physical destruction (as long as the attacker can get all or most the of pieces) so if you copy files to a new computer and ditch the old one, be careful.
    • Can burn or be smoke damaged
    • A traditional hard disc drive can have data corrupted by powerful magnetic fields and can physically shatter
    • A non-negligible amount of HDDs suffer from factory defects that will cause them to fail unexpectedly during their lifetime
    • Accidents can happen that could result in loss of data
    • Solid state drives (SSDs) will lose data if unpowered, they may last years before this becomes a problem but it is unwise to store long-term data in unpowered SSDs
    • Connecting to the internet is another attack vector and the safety is only as good as the encryption used; I don't know what I would recommend but it wouldn't be BitLocker. Someone could be trying to break into the computer constantly. Even with good encryption if the machine or location is compromised the key could be stolen as soon as it is decrypted.
    • There are a lot of ongoing threats with computers, from 0-day exploits to firmware exploits and malicious USB cords
    • External HDDs are good for storage for a few years at least if stored properly
    • If not connected to internet, safety is only as good as the physical protection encryption used; could someone break into the location and copy the data without anyone noticing?

    Stored digitally on CD, floppy disk, laserdisc, or mini-disc

    • Plastics break down over time and with exposure to heat, humidity, regular light, all sorts of chemicals, even the oxygen in the air. This can lead to the loss of your data when stored on a medium made of plastic or written/printed on plastic.
    • Can burn or be smoke damaged
    • Can be physically damaged, making data recovery expensive or even impossible
    • Magnetic media (tapes, floppy disc) can be damaged by magnets
    • Data can become difficult to recover if the software and/or hardware to decode is old, don't use proprietary formats

    Stored digitally on a flash drive

    • Can break and have to be physically repaired before use
    • Rapidly changing magnetic fields (See MRIs) can damage the data stored on flash drives
    • Can burn, or be smoke damaged
    • Can become corroded from salt water or some atmospheric conditions
    • If they break apart, some lighting conditions can cause data corruption (you can also put them back together and often still get the data)
    • Different devices are inconsistent. Even similar devices from the same production batch can be different. There are large quality differences in drives, but I am assuming you aren't using these for anything but storage.
    • There are some fake flash drives that look like they saved the data but you can't get it back later.
    • Flash drives are not advised for long term storage; they can be used as one part of a multi-medium-location-format plan.

    A pre-funded physical bitcoin coin (where the manufacturer generates and installs the secret key)

    • The medium that the key is on is often paper/plastic which can burn or be smoke damaged
    • Trust in the manufacturer themselves, they could copy the key
    • Trust in their key generation procedure
    • Trust in the operational security of the manufacturer, they could be generating the keys on their everyday computer
    • Trust no one is successfully spying on them, electronically, looking through their documents while they are out of town, or with tiny tin foil hat cameras or long range ones
    • Trust that the object was not tampered with in delivery
    • Trust that no one has tampered with the object since you got it

    These are the methods you can use for your Wasabi backup and their benefits and tradeoffs.

    - + diff --git a/using-wasabi/BitcoinFullNode.html b/using-wasabi/BitcoinFullNode.html index 4c6008e40..7dc119d3d 100644 --- a/using-wasabi/BitcoinFullNode.html +++ b/using-wasabi/BitcoinFullNode.html @@ -27,11 +27,11 @@ Bitcoin Full Node | Wasabi Docs - - + +

    Bitcoin Full Node

    The importance of running a full node

    When running a Bitcoin full node, you define the precise monetary rules that you voluntarily agree on. Nobody else forces this choice upon you. Thus any sovereign individual who wants to claim financial independence must run a full node. Once your own rules are firmly established, your software discovers other nodes in the Bitcoin peer-to-peer network which do not break your rules. These peers send you transactions and blocks which are valid according to their set of rules, and you verify for yourself if they are also correct for you. If one of the proposed transactions breaks your own rules, then you mark it as invalid, disconnect from and ban the node who sent you the malicious transaction.

    Claim your monetary sovereignty

    With your full node you define, verify, and enforce the rules of your sound money Bitcoin.

    Only by running a full node, do you verify by yourself that the money you receive is actually valid bitcoin. You do not trust an external third party, and thus you also do not leak any sensitive financial information.

    There are several software implementations that function as a full node, for example, Bitcoin Coreopen in new window, Bitcoin Knotsopen in new window, or LibBitcoinopen in new window.

    How does Wasabi use your Bitcoin full node

    Wasabi currently has a work in progress partial Bitcoin Knots integration. As of now, the zkSNACKs coordinating server broadcasts BIP 158 block filtersopen in new window to all Wasabi clients, who locally check if the filter hits for their public keys. Then you know that this block has a transaction of yours included, or maybe it is a false positive.

    Work in progress

    The zkSNACKs server has to be trusted to serve correct filters. This current work in progress integration does not verify consensus within Wasabi.

    If a full node is connected to Wasabi, then the relevant block is fetched from this trusted node, and not from a random P2P node. Wasabi also queries if your local mempool has unconfirmed transactions that are of interest to you. Further, your full node is used to estimate the current mining fee level based on the bitcoind smartfee algorithm. Your full node is not used to broadcast your transactions, as this is done through a random peer-to-peer node with a new tor identity, which is better for your network-level privacy.

    The future goal is that the local full node (Knots) is used to generate the BIP 158 block filters from the verified blocks. Only then is there full verification, and no trust in the zkSNACKs server.

    bitcoind within Wasabi

    Wasabi Wallet ships with Bitcoin Knotsopen in new window. This means that every Wasabi client has the necessary software to run a Bitcoin full node and define, verify, and enforce monetary consensus with bitcoind, but this verification is not yet used within Wasabi itself, it is a work in progress. By default, bitcoind is not started together with Wasabi. This must be activated explicitly in the settings because this is a bandwidth, CPU and storage-intensive program. It is optional to keep bitcoind running even after Wasabi Wallet is shut down, so as to verify blocks as soon as they are received.

    Wasabi Wallet Bitcoin Knots full node integration

    Using an already existing local Bitcoin full node

    If you have a Bitcoin full node already pre-installed on the same computer you use to run Wasabi Wallet, then Wasabi will use your node by default. You do not need to change anything in the settings, it should work plug and play. This is especially useful to save on bandwidth, as you have already downloaded and verified a block with your full node, so you don't need to download it again with Wasabi.

    Using an already existing remote Bitcoin full node

    If you have a Bitcoin full node already on a remote computer, then Wasabi Wallet can use this too. In the Bitcoin settings, specify the local IP address and port or the Tor onion service of your full node.

    Wasabi Wallet remote Bitcoin P2P full node endpoint

    Verify that Wasabi is connected to your full node

    There are two ways to confirm that your Wasabi client is connected to your own full node.

    First, in the Wasabi logs. Once you receive a transaction Wasabi downloads the block containing that transaction from your node, and in the logs you should see: Block {hash} acquired from node '{node}'.

    Second, by checking the connected peers inside your full node. Wasabi will show up as one of the connected peers while it is downloading a block. You can check this in the Bitcoin Core / Knots GUI by clicking on Window -> Peers. During the period when Wasabi is fetching a block, it will show up in the User Agent column. Alternatively, you can use the Bitcoin RPC call bitcoin-cli getpeerinfo and see the Wasabi client listed.

    - + diff --git a/using-wasabi/BuildSource.html b/using-wasabi/BuildSource.html index a40d3c4c0..102a6d168 100644 --- a/using-wasabi/BuildSource.html +++ b/using-wasabi/BuildSource.html @@ -27,8 +27,8 @@ Build from source code | Wasabi Docs - - + +

    Build from source code

    Introduction

    You can compile the source code in order to get the most recent commits by the developers. This enables you to try out features or fixes that are not yet released. This can be the main repository master branch for those changes that should be in the next release, or developer branches for cutting edge features. Be aware that these branches might be unstable and can include bugs that lead to a loss of funds, so use with caution and on testnet.

    Get The Requirements

    1. Install Gitopen in new window

    2. Install .NET 8.0 SDKopen in new window for "Build apps"

      Optional for privacy

      You can disable .NET's telemetry, which is sending some usage information to Microsoft, by typing:

      export DOTNET_CLI_TELEMETRY_OPTOUT=1 on Linux and macOS.

      setx DOTNET_CLI_TELEMETRY_OPTOUT 1 to disable it permanently on Windows.

    Get Wasabi

    Clone Wasabi repository:

    git clone https://github.com/WalletWasabi/WalletWasabi.git
    @@ -40,6 +40,6 @@
     git checkout branchname
     git pull
     
    - + diff --git a/using-wasabi/ChangeCoins.html b/using-wasabi/ChangeCoins.html index 9fd90e212..6fb576be3 100644 --- a/using-wasabi/ChangeCoins.html +++ b/using-wasabi/ChangeCoins.html @@ -27,11 +27,11 @@ Change Coins | Wasabi Docs - - + +

    Change coins

    Types of change

    Non-Coinjoin change

    Let's assume you want to send 0.5 bitcoin to Alice. You enter Alice's address in the To field (destination address), and set the Amount to 0.5 BTC. This will be one output of the transaction.

    Since your chosen UTXO is worth 2 bitcoins, after sending 0.5 bitcoin to Alice there will be 1.5 bitcoins change from the original amount. This leftover amount will automatically go to a new address in your wallet, and this is called the change output.

    This leftover 1.5 bitcoins change UTXO is connected to the input UTXO of the transaction, and thus also has an anonymity set of 1. As a result, when you send this leftover/change coin in a new transaction, it is clear to any observer that you were part of the transaction that sent 0.5 bitcoin to someone.

    This process is applicable to any Bitcoin transaction where the sent amount is less than the total value of the input UTXO.

    Coinjoin change

    In some few cases, especially for the wealthiest user of a coinjoin, there will be an anonymity score 1 output in a coinjoin transaction. Eventhough it is not trivial to link those to the inputs of the same user, they should be handled with care. Wasabi will not automatically spend those change coins in a payment, but instead register them again in a future coinjoin round.

    Why change is an issue

    Change is not inherently bad, it's a fundamental part of how Bitcoin and the UTXO model works. However, when sending a coin that is change from an earlier transaction, then the receiver can easily deduce that the sender was also part of the previous transaction that generated the change.

    Whenever you are merging coins in one transaction, it becomes clear to any outside observer that these coins belong to the same entity, thus linking the previous transaction history. Thus identifying change based on some heuristics is a top goal of transaction surveillance.

    You want to avoid merging coins with different anonymity set values whenever possible, because this will link these coins and reduce their anonymity set to the lowest value.

    Your options to use change privately

    Avoid change in the first place

    Whenever possible, choose UTXO's for transactions where the destination addresses receive the entire value of your UTXO's, and you don't get any change back. This can easily be done by clicking the shield icon in the top right corner of the transaction preview screen, and adjusting the payment amount to be slightly higher or lower. This might not be possible in some cases where you have to pay a specific value of a payment request.

    Make it difficult to deduce the change

    There are common heuristics identifying change outputs, try to avoid these with every transaction. Don't reuse addresses, don't send precise amounts but randomize them, use replace by fee (RBF) only if necessary, and try to send to bech32 or bech32m addresses.

    Spend the change to the same entity as in the initial transaction

    If in the first transaction you have 0.10 bitcoin and send Alice 0.04 bitcoin, you get 0.06 bitcoin back as change in a new address, which Alice can see belongs to you. Now, in a second transaction where you want to send Alice 0.05 bitcoin, you can select that 0.06 bitcoin change coin without losing any privacy, because Alice already knows this is your coin.

    In this second transaction you will get back 0.01 bitcoin as change, which again, will still be known to Alice. If in a third transaction you want to send Alice 0.02 bitcoin, then you can consolidate the 0.01 bitcoin change with a new 0.10 bitcoin mixed coin, thus getting 0.09 bitcoin change.

    Now Alice will know that you owned the 0.10 bitcoin and that you currently own the 0.09 bitcoin change, but she cannot find out about your premix transaction history.

    Wasabi will automatically check if you have a coin with the same label for the current payment recipient, and will use those coins to be spent.

    Spend the change with another entity, where you don't mind if each of the two know that you transact with the other entity

    When you send a transaction to Alice, then she knows that the change output goes back to you. You can use this change to send bitcoin to Bob, and if he has bad privacy habits, Alice can find out you sent to him. But if you have a trusted relationship with the two, then this is alright, and not part of your threat model.

    Coinjoin more

    Since Wasabi 2.0 has a minimum amount for coinjoin of only 5000 sats, any change coin with an amount larger than that will be registered in a future coinjoin round. If you wait long enough, Wasabi will make sure that you don't have any anonscore 1 change coin in your wallet, but only private coins not linked to any previous payment.

    - + diff --git a/using-wasabi/CoinJoin.html b/using-wasabi/CoinJoin.html index 7476b0390..fd6a258cc 100644 --- a/using-wasabi/CoinJoin.html +++ b/using-wasabi/CoinJoin.html @@ -27,11 +27,11 @@ Coinjoin | Wasabi Docs - - + +

    Coinjoin

    Introduction

    A coinjoinopen in new window is a special Bitcoin transaction where several peers get together to literally join their coins in a single transaction. They collaboratively build a transaction where each of them provides some coins as inputs, and fresh addresses as outputs. The concept has been around since the early days of Bitcoin, and it was formalized by the great Greg Maxwell in this awesome introductory threadopen in new window.

    The goal is to gain privacy by breaking the link of which input "pays" which output so that none of the outputs can be attributed to the owner of the input. WabiSabi enables centrally coordinated coinjoins with variable amounts in a trustless (meaning nobody can steal) and private (meaning even the coordinator cannot spy) manner, as described in the WabiSabi paperopen in new window.

    WabiSabi Coinjoin Explained in 3 Minutesopen in new window

    Coinjoin step-by-step

    1. Launch Wasabi and open your wallet.
    2. Wait. Wasabi coinjoins automatically in the background.
    3. You're done! You can make private payments now.

    Music box

    After opening a hot wallet, it will automatically start a countdown to start coinjoining (±10 minutes). This and other coinjoin related information is shown in the music box.

    Music Box Countdown

    After the Waiting to auto-start coinjoin countdown is finished the wallet should start participating in the coinjoin process.

    A blue aura will show up at the the bottom of the wallet, which indicates that the wallet is coinjoining, and the music box message will change.

    Music Box Awaiting Other Participants

    After some time the blue aura will change to an orange one, this indicates that the coinjoin process is now in a critical phase. Wasabi will prevent you from shutting down the app during the orange aura to not disrupt the coinjoin round.

    Music Box Coinjoin In Progress

    If this is succesfull, the coinjoin is completed and the coinjoin will show up in the history list.

    Music Box Success

    Notice that the wallet might have to repeat the coinjoin steps multiple times before a successful coinjoin is created. So it is possible that the aura colors will change without a successful coinjoin. Please leave Wasabi Wallet running, and eventually there will be a successful coinjoin.

    More Details

    By default, Wasabi starts automatically coinjoining your funds when the total value of the non-private coins is equal to or above the Auto-start coinjoin threshold (0.01 BTC by default). Automatically start coinjoin can be disabled from the coinjoin settings. In case you want to start the process manually, then click the play button; if you want to stop coinjoin, then click the pause button.

    Once a coin achieves enough privacy (reaches the Anonymity score target), then the corresponding amount will show up in the wallet's main view as "PRIVATE".

    Notice that it is not yet possible to coinjoin from a hardware wallet, the keys must be "hot" on your computer.

    Fees

    The coinjoin coordinator sets its own fee policy for the coinjoin service provided.

    Although the coordinator cannot steal money from the coinjoin participants, it could set a high mining fee rate and/or a high coordination fee. This would make the participants pay a lot (unnecessarily). To prevent against such behavior the Wasabi client can configure the maximum mining fee rate and the maximum coordination fee it is willing to pay per round. If one of these is higher than the set values, the client will not participate in the coinjoin.

    The default values are 0% coordination fee and maximum 150 sat/vByte mining fee rate.

    Coinjoin Configurations

    WabiSabi protocol step-by-step

    WabiSabi protocol requires 5 steps to successfully create and broadcast a coinjoin transaction to the bitcoin network.

    The round starts either as soon as the number of registered inputs reaches the maximum, or after the input registration time is reached and as long as the minimum number of inputs is satisfied.

    Input registration

    During the input registration, the client selects how many and which coins will be registered for coinjoin. These coins need to be confirmed on the Bitcoin blockchain. In the background Wasabi generates input proofs, which are signatures over challenge messages, made with the private keys that lock up the coins. With this, the coordinator can verify that you actually own these coins.

    Wasabi wallet generates a new Tor identityopen in new window called Alice for each input. She is a separate entity, and for every round you use a new Alice who is not linked to any other input or previous connection. With Alice, you send the input ownership proof to the coordinator.

    The Wasabi coordinator now verifies that:

    • There is still room for more inputs on this coinjoin.
    • The input has not already been registered, is not banned, is unspent, and that the input proof is valid.
    • The input has at least 5000 sats value.

    Only when all these checks are passed, does the coordinator allow this input to be registered. The coordinator creates and sends a credential back to Alice, which has the same amount as the input minus fees.

    The input registration phase ends when either: the number of registered inputs reaches the maximum, or when the time elapsed and the minimum number of inputs is satisfied.

    Connection confirmation

    There are many users registering their inputs (with different Alice for each input) in the first phase, and this takes a while. The connection confirmation phase makes sure that all of them are still online and ready to continue. The coordinator verifies the unique ID from each Alice, and if everyone is still communicating. The coordinator sends a zero value credential to each Alice for each successful connection confirmation.

    The round is abandoned and re-started if too many Alices have dropped, for example when their Wasabi is shut down, or when their Tor connection is temporarily broken. The connection confirmation phase ends when all Alices have provided their unique IDs, or after a timeout and the number of online Alices is still larger than the minimum number of inputs.

    Output registration

    Now that all peers are online, we are ready to proceed with the output registration phase of the round.

    First, every client needs to change the value of their credentials to the desired output values. For this, the client presents to the coordinator two old credentials, and two newly created ones. The coordinator does not know the amount value of any of those credentials, but it can verify, that the two pairs sum up to exactly the same value. For example, a user can present one 5 btc and one 0 btc credential, and redeem one 2 btc and one 3 btc credential. Or a user can present one 4 btc and one 1 btc credential, and redeem one 5 btc and one 0 btc credential. After potentially many rounds of reissuance, each client has exactly the amount credential it desires. Each of these reissuance is perfectly private, so the coordinator cannot link any of them to the same user.

    Next, your Wasabi client generates multiple new Tor identities called Bob, which are in no way tied to any Alice. Bob sends to the Wasabi coordinator:

    • An unblinded credential signed by the coordinator
    • A new (unused) bitcoin address

    Because the coordinator can verify its own credential, it knows that this credential came into existence after an input of at least this much value was registered. However, it cannot know which input exactly.

    It is very important that the coordinator cannot link Alice to Bob. Because Alice has sent the cleartext input, and Bob sends the cleartext output. So, if the two were to be linked, then the coordinator can specifically link the input to the output, meaning that the anonymity set is 1. Because Alice received a credential from the coordinator, and because Bob is a new Tor identity not linked to Alice, the coordinator can verify that nobody is cheating, but it cannot deanonymize the peers.

    The output registration phase ends when the value of cleartext outputs is equal to the value of inputs, meaning that all Bobs have registered. If after a timeout not all outputs are registered, then this round is abandoned, the missing inputs are temporarily banned, and a new round is started.

    Possibility of Taproot outputs from coinjoin

    Since Wasabi version 2.0.3open in new window coinjoin outputs can be SegWit v0 and SegWit v1 (Taproot). If running this version or higher, the client registers the output type in a semi-random way (~50% chance of receiving Taproot output).

    Signing

    Now that all inputs and outputs are registered, the coordinator can start the signing phase, by building the coinjoin transaction with all the registered inputs and outputs. It sends this transaction to all the Alices of the round.

    Each Alice does the following:

    • Verifies that her input and output are included.
    • Signs the transaction with the private key of her input.
    • Sends the signature to the coordinator, who verifies this information.

    The signing phase ends when the coordinator has received all the valid signatures for all the registered inputs.

    Blame round

    When the signing phase fails due to some Alices disrupting the round (failing to sign or send the signature to the coordinator), then the successful Alices will continue into a blame round. The blame round will redo the coinjoin phases in order to create a successful coinjoin.

    This mechanism also prevents coinjoins from being DDoS-ed, because bad actors that are willingly disturbing rounds won't be able to join the blame round. The client will keep going to the blame round until there are not enough Alices left to meet the minimum input count of blame rounds.

    The blame round is not a mandatory phase of the coinjoin process. It was introduced in order to have a higher coinjoin success rate.

    Broadcasting

    The coinjoin transaction has been successfully built and signed, and it is now ready to be broadcast to the peers of the Bitcoin network. The coordinator sends this transaction over the Tor network to random Bitcoin P2P nodes, and from there it is gossiped to other nodes and miners. To save on mining fees, the target confirmation time is roughly 24 hours.

    Coinjoin Settings

    Wasabi Wallet has automatic coinjoin. It is done by the built-in automatic coinjoin "robot". The robot contains instructions/settings, like how often and when to coinjoin. The user is able to specify these settings in the Coinjoin Settings dialog, according to his own preferences. The wallet ships with default settings, which are good enough for most users.

    Wasabi Wallet Coinjoin Settings

    Coinjoin settings are wallet specific

    As the coinjoin settings apply per individual wallet, it is possible to have multiple wallets with different coinjoin settings.

    Automatically start coinjoin

    This setting is enabled by default.

    When this is enabled, the wallet will automatically start coinjoining soon after the wallet is loaded. The wallet will coinjoin until the privacy progress is 100%.

    When this is not enabled, the user will have to manually press the Play button in order to start coinjoining.

    Coinjoin Settings Automatically Start Coinjoin

    Auto-start coinjoin threshold

    The default Auto-start coinjoin threshold is 0.01 BTC.

    The wallet will not automatically start coinjoining if the non-private balance is below the Auto-start coinjoin threshold, even if the Automatically start coinjoin is enabled. In this case the user has to manually press Play to start coinjoining. This setting can be used to prevent paying (relatively) high fees for smaller bitcoin amounts.

    For example, if the non-private balance is 0.005 BTC and the Auto-start coinjoin threshold is 0.01 BTC, the user will have to manually press Play to start coinjoining.

    Auto-start Coinjoin Threshold

    It is OK to set the Auto-start coinjoin threshold to 0

    If you have some small non-private left overs: you can coinjoin these by pressing Play, or wait until you receive more funds. If you want to always automatically coinjoin ALL your coins, this can be set to 0 BTC. Note that you might pay relatively more fees for coinjoining smaller amounts.

    Coinjoin Strategy

    Wasabi ships with 3 coinjoin strategies: Minimize Costs, Maximize Speed, and Maximize Privacy. Each of these contain different configurations, as shown in this table. They determine the Anonymity score target, Coinjoin time preference, and if Red coin isolation is enabled or not.

    Coinjoin Strategy Settings

    The default strategy is Maximize Speed.

    It is possible to make your own custom strategy by using the customize button.

    Coinjoin Strategy

    Wasabi Coinjoin examples

    Here's a list of Wasabi coinjoin examples and how they appear on a block explorer:

    - + diff --git a/using-wasabi/ColdWasabi.html b/using-wasabi/ColdWasabi.html index 39ab35ef9..3014e0cf5 100644 --- a/using-wasabi/ColdWasabi.html +++ b/using-wasabi/ColdWasabi.html @@ -27,11 +27,11 @@ Hardware Wallet | Wasabi Docs - - + +

    Cold-Wasabi Hardware Wallet Mode

    Using hardware wallet step-by-step

    1. Start your Wasabi Wallet and go to Add Wallet.
    2. Click on Connect to hardware wallet and then connect the hardware wallet via cable. Alternatively, you can import a Coldcard skeleton file via SD card by using Import Wallet at the Add Wallet dialog.
    3. Confirm that the detected hardware wallet is correct.
    4. Click Open, and wait for the wallet to load.
    5. Now you can receive bitcoin to addresses controlled by the hardware wallet.
    6. You can spend these coins in the Send dialog, though the hardware wallet must be connected via USB to sign the transaction. Alternatively, you can build a PSBT, export this via SD card to your Coldcard wallet for signing, then import the final transaction to Wasabi for broadcasting.

    No coinjoin

    Unfortunately, as of now, you cannot coinjoin with just the private keys on your hardware wallet. The keys need to be on the internet-connected computer to be able to coinjoin.

    What is Cold Storage

    Cold storage refers to generating and storing private keys completely offline. This is an often-used security precaution, especially dealing with large amounts of bitcoin. Because the private keys are not on a computer that is connected to the internet, many remote attack vectors are nullified.

    Methods of cold storage include keeping private keys on a:

    • USB drive or other data storage medium
    • Paper wallet
    • Bearer item such as a physical bitcoin
    • Hardware wallet

    Use a hardware wallet for cold storage

    There are multiple ways to exercise cold storage, however it is highly reccommended to use a hardware wallet. This is by far the best and most secure way of using bitcoin for almost all users.

    Hardware Wallet with Wasabi

    You can use Wasabi Wallet with almost any hardware wallet out there because Wasabi utilizes Bitcoin Core Hardware Wallet Interface [HWI]open in new window. The setup is thoroughly tested for Trezor model Topen in new window, Ledger Nano S, Nano S Plus and Nano Xopen in new window, and Coldcardopen in new window.

    Connecting via USB

    Import the wallet

    1. Go to Add wallet.
    2. Click on Connect to hardware wallet.
    3. Give the wallet a name.
    4. Connect the hardware wallet to the PC and enter the pin on the hardware wallet to unlock it.
    5. Confirm that the correct hardware wallet is detected.
    6. Open the wallet.

    This wallet can be used as a watch-only wallet when the hardware wallet device is not connected.

    Wasabi remembers the wallet's information like xpub, wallet fingerprint and addresses etc. But it never knows the private keys, which are on the hardware wallet. So, you can see the balance and all it's transactions in Wasabi and you can generate addresses, but you cannot send without the hardware wallet being connected. Because you need to sign (confirm) the outgoing transactions on the hardware wallet.

    Receiving bitcoin

    After the first time you loaded a new device, the public keys will be stored locally on the computer, and you can use Wasabi to receive bitcoin to the hardware wallet without having it connected.

    Verify the receive address on the hardware wallet for extra security

    It's always a good practice to verify that the receive address on Wasabi corresponds to the one on the hardware wallet, before receiving (large amounts of) bitcoin. This could prevent malicious firmware which replaces a receive address with a fake one. You can do this by clicking on Show on the hardware wallet at a receive address. The address will now be displayed on the hardware wallet, check that the addresses correspond and then confirm this on the hardware wallet.

    Sending bitcoin

    Only when you want to send bitcoin you need to connect the device over USB again.

    1. Click the Send button.
    2. Enter the amount and destination address.
    3. Enter the label of whom you are sending to.
    4. At the Preview Transaction screen, check that everything is correct.
    5. Click Send Now.
    6. Connect the hardware wallet & unlock it.
    7. Check on the hardware wallet that everything is correct.
    8. Confirm on the hardware wallet.
    9. The transaction is sent!

    The private keys are not on the computer, thus the transaction is signed on the hardware wallet after you confirm with a physical button click. The final transaction is automatically broadcast over Tor with Wasabi Wallet.

    Connecting Coldcard via SD card

    You can use Wasabi Wallet together with Coldcard without ever connecting it via USB, thus further reducing possible attack vectors. For more details see the Coldcard documentationopen in new window.

    Import the skeleton wallet

    Power your Coldcard on a power bank or electricity socket, then unlock it with your pin. Put in a MicroSD card and go to Advanced > MicroSD Card > Export Wallet > Wasabi Wallet. This will write the public keys, wallet fingerprint, derivation path and other metadata to a skeleton file new-wallet.json.

    Protect your public keys!

    This file does not include your private keys, so an attacker cannot use it to spend your bitcoin. However, he can use it to derive a full transaction history, thus it is a potential privacy leak.

    Now insert the SD card to your computer, and open Wasabi Wallet. Go to the Add Wallet dialog, and click Import a wallet, browse to the SD card and select the new-wallet.json file. Wasabi will automatically import and modify this skeleton file and store it in your Wallets and WalletBackups folders.

    Receiving bitcoin

    After the skeleton wallet is imported, you can open the wallet from the wallet list at the NavBar, without having to power on the Coldcard. Generate a receive address as usual. The private key corresponding to this address is on the hardware wallet.

    Sending bitcoin

    Sending bitcoin airgapped works as follows:

    1. Enable PSBT workflow in the Wallet Settings
    2. Click the Send button.
    3. Enter the amount and destination address.
    4. Enter the label of whom you are sending to.
    5. At the Preview Transaction screen, check that everything is correct.
    6. Click Save PSBT file, and save the file on the MicroSD card.
    7. Remove the MicroSD card from the computer and put it into your Coldcard.
    8. On the Coldcard, click Ready to Sign.
    9. Verify the transaction details shown on the Coldcard, and approve to sign the transaction.
    10. Remove the MicroSD card from Coldcard and insert it into the computer.
    11. In Wasabi, click on Broadcaster (in the search bar).
    12. Select Import Transaction.
    13. Select the final signed transaction, which looks like this xxx-final.txn.
    14. Broadcast the transaction.

    Enable PSBT workflow in the settings

    You need to have PSBT workflow enabled in the wallet settings in order to have Save PSBT file show up at the Preview Transaction screen. After it is enabled, a Broadcast button will appear next to the Send button for an easier workflow.

    Cold-Wasabi protocol

    This is how you can safely eat cold Wasabi, or store your coins on a hardware wallet after coinjoining with Wasabi Wallet. Because you cannot do coinjoin with the private keys on the hardware wallet, you will need to generate and load two different wallets in Wasabi. A 'hot' (coinjoin) and a 'cold' (storage) wallet will both be running in parallel, label them accordingly so you don't mix them up.

    GUI tutorial

    Coinjoin on the hot Wasabi

    First

    You should make your existing coins private. It is useful to generate a complete new hot wallet for this, so as to keep the coinjoin transaction history separate from other wallets.

    1. Generate a new hot-Wasabi Wallet.
    2. Open the Receive dialog to get a new address.
    3. Send bitcoin into this Hot-Wasabi Wallet.
    4. Start the automatic coinjoin process and wait for the coinjoin to be done (i.e. privacy progress 100%).

    Set up your cold-Wasabi

    Second

    In order to separate these new private coins, you should generate a fresh wallet on your hardware device.

    1. Generate a new set of keys on your hardware wallet and make a backup.
    2. Load your hardware wallet device to Wasabi, either via USB or SD card.
    3. Label and generate a receive address for the hardware wallet. For the first setup, you need to connect the hardware wallet to the computer that runs Wasabi, afterwards, you can generate receive addresses without the device being connected.
    4. Copy the receiving address from the cold-Wasabi.

    Send bitcoins from hot to cold Wasabi

    Third

    When your coins are private, it is a good practice to send them out in multiple batches in order to not consolidate all your coins. Wait some time in-between sending them, so that timing analysis becomes more difficult.

    1. Go to the hot-Wasabi Send dialog and enter the amount.
    2. Paste the cold-Wasabi address.

    Send bitcoins from cold Wasabi

    Finally

    You can at any time spend the bitcoin from the cold-Wasabi.

    1. Connect your hardware wallet to the computer.
    2. Load the cold Wasabi wallet.
    3. Go to the Send dialog, enter the amount and the destination address, then sign the transaction with the hardware wallet.

    Success!

    おめでとうございます!

    You are now eating Cold Wasabi!

    WARNING

    The anonymity score is tied to the wallet that you used to coinjoin, if you send a mixed coin to another Wasabi Wallet (in this case your hardware wallet), it will have an anonymity score of 1 (and will be marked as non-private) because this wallet doesn't know that the coin was coinjoined.

    You should use a meaningful label when you generate a receive address in your hardware wallet, e.g. "Myself coinjoin private" (something that reminds you that you got this utxo from your Wasabi Wallet and it was coinjoined).

    - + diff --git a/using-wasabi/Daemon.html b/using-wasabi/Daemon.html index eab596be2..c7d7bc092 100644 --- a/using-wasabi/Daemon.html +++ b/using-wasabi/Daemon.html @@ -27,8 +27,8 @@ Headless Wasabi Daemon | Wasabi Docs - - + +

    Headless Wasabi Daemon

    Introduction

    The default of how to interact with your Wasabi wallet is the graphical user interface (GUI). There is also a headless daemon where you do not run a resource-intensive GUI, but only the command line interface. Running the daemon minimizes the usage of resources (CPU, GPU, Memory, Bandwidth) with the goal of making it more suitable for running all the time in the background. The RPC interface can be used to interact with the Daemon.

    The daemon is included in the package starting from Wasabi version 2.0.4open in new window and can be launched using the command line.

    The desktop app (GUI) is built on top of the daemon. Meaning that command line arguments/variables can also be used to configure the desktop app.

    The available startup parameters can be found at the Starting Wasabi with parameters pillar.

    How to run

    If the package is installed

    Depending on your operating system, open the command line and execute:

    Linux

    wassabeed
    @@ -43,6 +43,6 @@
     

    Check the Wasabi Daemon version

    $ wassabeed --version
     Wasabi Daemon 2.0.8.1
     
    - + diff --git a/using-wasabi/DeterministicBuild.html b/using-wasabi/DeterministicBuild.html index 8ab118382..d26d52032 100644 --- a/using-wasabi/DeterministicBuild.html +++ b/using-wasabi/DeterministicBuild.html @@ -27,11 +27,11 @@ Deterministic Build | Wasabi Docs - - + + - + diff --git a/using-wasabi/DiscreetMode.html b/using-wasabi/DiscreetMode.html index ef761b7f6..dc6b498f6 100644 --- a/using-wasabi/DiscreetMode.html +++ b/using-wasabi/DiscreetMode.html @@ -27,11 +27,11 @@ Discreet Mode | Wasabi Docs - - + +

    Discreet Mode

    Discreet Mode is a Wasabi Wallet feature that hides sensitive and critical information from physical observers and allows you to post screenshots without worrying about your privacy.

    Wasabi Wallet Discreet Mode


    How to activate/deactivate Discreet Mode

    You can activate or deactivate by clicking the Discreet Mode icon in the bottom left corner of the main view.

    Enable Discreet Mode in Wasabi Wallet

    Disable Discreet Mode in Wasabi Wallet

    More information on Discreet Mode

    • In Discreet Mode the wallet is still usable, meaning that you can send and receive payments, as well as coinjoin.
    • Discreet Mode only masks the surface. This means that when you click to see more Details, some information (which wasn't visible at first) will be shown.
    • When hovering over the ### chars with the cursor, the content will be visible for a short amount of time.
    • Some justification of design decisions can be seen hereopen in new window.
    - + diff --git a/using-wasabi/ELI5.html b/using-wasabi/ELI5.html index 1e1227dee..2068af8b2 100644 --- a/using-wasabi/ELI5.html +++ b/using-wasabi/ELI5.html @@ -27,11 +27,11 @@ Explain Wasabi like I'm 5 | Wasabi Docs - - + +

    Explain Wasabi like I'm 5

    Introduction

    Wasabi Wallet is an open-source, non-custodial, privacy-focused Bitcoin wallet with built-in coinjoins. It is a piece of software that runs on your computer and helps you to manage your bitcoins. Although Wasabi has some very advanced magic under the hood, it is rather easy to use. You can generate a new set of seed words, or import already existing ones. With Wasabi you can receive bitcoins into your full control, and you can send them to someone else without needing permission from any other person or entity. There is also a powerful auto-coinjoin feature to help obfuscate your transaction history. You can use Wasabi to manage your hardware wallet, and it even connects to your own full node. Of course, Wasabi is libre and open-source, which means you have full control over the software you manage your money with.

    Installing Wasabi

    Installing Wasabi is super-easy. Go to the official website wasabiwallet.ioopen in new window and download the version for your operating system. You can then install Wasabi as you would do any other software on your computer.

    See this chapter for a detailed step-by-step tutorial for all operating systems, and also how to verify the PGP signature.

    Generating a Wallet

    When you start Wasabi for the first time, the dialog to generate a new wallet will be open. You can set a unique name for the wallet so that you remember what it is for. In the next step, Wasabi will show your 12 recovery words. These must be carefully backed up, in the correct order, as they are needed to recover your wallet (together with the passphrase) on another computer or in another wallet software. Next, choose a very secure passphrase, as this encrypts the secrets, and should not be guessed by others. You will always need this passphrase in order to spend your bitcoins, so take great care to back it up properly. Make sure you store the backup of your recovery words in a different location than the backup of your passphrase.

    Backup both!

    If you ever need to restore your wallet in Wasabi, or any other wallet, you will need both: your passphrase AND your 12 recovery words.

    See this chapter for more information on how to securely generate your wallet.

    Receiving bitcoin

    In order to receive bitcoin, you need to generate an address in the Receive dialog. But first, you must label it with the names of any observers who know that this address is yours. For example, if Alice pays you back for last nights pizza, then the label is Alice. This is an important feature for you and the wallet to know which coin is from whom, and it will help with your privacy in the future. Once this newly generated address receives some coins, Wasabi Wallet will automatically hide this used address, so you don't reuse it by accident.

    See this chapter for a tutorial on how to properly label your addresses and receive bitcoin.

    Sending bitcoin

    Sending process is different depending on the privacy of coins you have. Assuming you have enough private coins the sending process is the following:

    1. Click the Send button (top right corner) at the main view.
    2. Insert the address of the receiver and type in the amount the receiver should get, then click Continue.
    3. Enter the name of the person or company receiving the payment and click Continue.
    4. Make sure everything is filled in correctly in Preview Transaction window and click Confirm.
    5. Type in your passphrase and click Continue.

    You will now see a pop-up window telling you that the transaction is broadcasted to the Bitcoin network.

    See this chapter for more details about sending bitcoin and the privacy nuances of it.

    Coinjoin with Wasabi

    If you don't like that your employer knows where you spend your money, or that a merchant can find out how much money you have, then you should coinjoin your bitcoin, as this breaks link to its transaction history. Although the coinjoin protocol is a bit complex, it is very easy to use in Wasabi. The wallet automatically coinjoins all your funds, so that your money becomes private. This process might take some time (hours/days). You can still use your wallet in the mean time, however it is a best practice to only use private funds, which the wallet does automatically when possible. At the wallet's homescreen the percentage indicates the progress to making your wallet fully private. The exact available private amount of bitcoin is listed as PRIVATE.

    See this chapter for a thorough analysis of coinjoin, details on the Wasabi implementation and best practices on how to use it properly.

    - + diff --git a/using-wasabi/ExternalRestore.html b/using-wasabi/ExternalRestore.html index 321eb206a..25a39e950 100644 --- a/using-wasabi/ExternalRestore.html +++ b/using-wasabi/ExternalRestore.html @@ -27,11 +27,11 @@ Restoring Wasabi Wallet in Other Wallets | Wasabi Docs - - + +

    Restoring Wasabi Wallet in Other Wallets

    Potential privacy leak!

    If you do not run your own node or your own Electrum server, you will leak all your addresses to random third-party servers, losing anonymity against those entities, so you must make a judgement call by being aware of this.

    You should set up Tor on Network preferences, connect to your own node or install your own Electrum server (if the wallet supports it) via Electrum Personal Serveropen in new window, ElectrumXopen in new window or Electrsopen in new window.

    Compatibility List for Segwit Addresses (bc1)

    Wasabi uses script type Native SegWit (P2WPKH) and derivation path m/84'/0'/0' to generate Segwit addresses.

    Wallets generated with Wasabi also require a passphrase.

    Here are major wallets you can use to recover a Wasabi Wallet for Segwit addresses:

    • Blue Wallet
    • BTCPay Server
    • Electrum Wallet
    • Sparrow
    • Specter Desktop

    For a complete list of compatible wallets, see here: https://walletsrecovery.org

    Compatibility List for Taproot Addresses (bc1p)

    Wasabi uses script type Taproot (P2TR) and derivation path m/86'/0'/0' to generate Taproot addresses.

    Wallets generated with Wasabi also require a passphrase.

    Here is a wallet you can use to recover a Wasabi Wallet for Taproot addresses:

    • Sparrow Wallet
    - + diff --git a/using-wasabi/InstallPackage.html b/using-wasabi/InstallPackage.html index d6fd88e31..601011fab 100644 --- a/using-wasabi/InstallPackage.html +++ b/using-wasabi/InstallPackage.html @@ -27,11 +27,11 @@ Install-package | Wasabi Docs - - + +

    Install package

    Introduction

    The easiest way to start with Wasabi is to download, verify and install the released package. This is a version of the software that is thoroughly reviewed by the contributors. The package has the binary code that is needed to run the Wasabi Wallet client including the graphical user interface. For compiling the open-source code with cutting edge development features, also including the backend server, see this tutorial here.

    Download the packages either from the official WasabiWallet.ioopen in new window clearnet website or for your privacy's sake, from the official Tor onion service http://wasabiukrxmkdgve5kynjztuovbg43uxcbcxn6y2okcrsg7gb6jdmbad.onionopen in new window.

    Operating systems supported by Wasabi Wallet

    Although there is automatic signature verification on Windows and macOS, it is still recommended to manually VERIFY PGP SIGNATURES of the downloaded package with zkSNACKs' PGP public key 6FB3 872B 5D42 292F 5992 0797 8563 4832 8949 861Eopen in new window before installing Wasabi. This protects you against malicious phishing sites giving you back-doored wallet software. If you have personally verified zkSNACKs' PGP public key 6FB3 872B 5D42 292F 5992 0797 8563 4832 8949 861Eopen in new window and you are familiar with the Web Of Trustopen in new window, please consider also signing itopen in new window.

    Always

    Don't trust - Verify!

    Install Wasabi step-by-step

    1. Download the Wasabi package relevant to your operating system from wasabiwallet.ioopen in new window.
    2. Verify the PGP signatures of the download.
    3. Install Wasabi package as you would do any other software on your operating system.

    Windows

    1. Downloadopen in new window the .msi installer of the latest Wasabi release.

    Download Wasabi Wallet for Windows

    1. Install Wasabi by double-clicking the .msi and following the GUI instructions.

    2. Make sure that you see this window that verifies the installer was signed by zkSNACKs Limited. Manual PGP verification is optional, as the package is signed and verified automatically on Windows.

    Wasabi Wallet Windows signature verification

    Wasabi will be installed to your C:\Program Files\WasabiWallet\ folder. You will also have an icon in your Start Menu and on your Desktop. After the first run, a data folder will be created. Among others, here is where your wallet files and your logs reside.

    Debian and Ubuntu

    If you have already imported zkSNACKs' PGP public key, then jump to step 2.

    1. Download zkSNACKs' PGP public key hereopen in new window, and then import it with gpg --import PGP.txt.

      Verify that the fingerprint is 6FB3 872B 5D42 292F 5992 0797 8563 4832 8949 861E by running this command gpg --list-keys zkSNACKs.

    2. Downloadopen in new window the latest Wasabi release, both the .deb package and the corresponding .asc signature file.

    Download Wasabi Wallet for Debian

    1. Verify the signature in the Download repository with gpg --verify Wasabi-2.0.8.1.deb.asc Wasabi-2.0.8.1.deb. If the message returned says Good signature from zkSNACKs and that it was signed with Primary key fingerprint: 6FB3 872B 5D42 292F 5992 0797 8563 4832 8949 861E, then the software was not tampered with since the developer signed it.

      TIP

      The output from the verify command may contain WARNING: This key is not certified with a trusted signature!. You can ignore this, but if you want to fully verify your download, you need to ask people you trust to confirm that the key fingerprint belongs to zkSNACKs.

    2. [GUI] Install by double-clicking and follow the GUI Instruction.
      [CLI] In the Download repository, execute the command sudo apt install ./Wasabi-2.0.8.1.deb to install Wasabi and after that run Wasabi by executing wassabee.

    After the first run, a data folder will be created. Among others, here is where your wallet files and your logs reside.

    Other Linux

    If you have already imported zkSNACKs' PGP public key, then jump to step 2.

    1. Download zkSNACKs' PGP public key hereopen in new window, and then import it with gpg --import PGP.txt.

      Verify that the fingerprint is 6FB3 872B 5D42 292F 5992 0797 8563 4832 8949 861E by running this command gpg --list-keys zkSNACKs.

    2. Downloadopen in new window the latest Wasabi release, both the .tar.gz archive and the corresponding .asc signature file.

    Download Wasabi Wallet for Linux

    1. In the Download folder, run gpg --verify Wasabi-2.0.8.1.tar.gz.asc Wasabi-2.0.8.1.tar.gz.

      If the message returned says Good signature from zkSNACKs and that it was signed with Primary key fingerprint: 6FB3 872B 5D42 292F 5992 0797 8563 4832 8949 861E, then the software was not tampered with since the developer signed it.

      TIP

      The output from the verify command may contain WARNING: This key is not certified with a trusted signature!. You can ignore this, but if you want to fully verify your download, you need to ask people you trust to confirm that the key fingerprint belongs to zkSNACKs.

    2. Extract the archive while keeping the file permissions: tar -pxzf Wasabi-2.0.8.1.tar.gz.

    3. Run Wasabi by executing ./wassabee.

    After the first run, a data folder will be created. Among others, here is where your wallet files and your logs reside.

    macOS

    1. Downloadopen in new window the .dmg package of Wasabi 2.0.8.1 for your machine's processor. There are two types of packages for macOS, one for Intel and one for the Apple Silicon chip. If you're not sure what processor your device has, you can check itopen in new window.

    Download Wasabi Wallet for macOS

    1. Double-click .dmg to open it.

    2. Install Wasabi by dragging it into your Applications folder.

    3. At first startup, there will be a pop-up that Wasabi was downloaded from the internet. Click on Open and restart Wasabi.

    After the first run, a data folder will be created. Among others, here is where your wallet files and your logs reside.

    Optional PGP Verification

    If you have already imported zkSNACKs' PGP public key, then jump to step 4.

    1. Get GnuPGopen in new window.

    2. Copy zkSNACKs' PGP public keyopen in new window into a new TextEdit document and saving it as zkSNACKsPubKey.txt. Before saving, you need to go to Format / Make Plain Text (otherwise TextEdit will not be able to save it as a .txt file).

    3. Open Terminal and go to the folder in which you saved the zkSNACKsPubKey.txt file and import the PGP public key with sudo gpg --import zkSNACKsPubKey.txt. This should return the output: key 856348328949861E: public key "zkSNACKs <zksnacks@gmail.com>" imported.

    4. Downloadopen in new window the latest Wasabi release, both the .dmg package and the corresponding .asc signature file.

    5. In the Download folder, run sudo gpg --verify Wasabi-2.0.8.1.dmg.asc Wasabi-2.0.8.1.dmg. If the message returned says Good signature from zkSNACKs and that it was signed with Primary key fingerprint: 6FB3 872B 5D42 292F 5992 0797 8563 4832 8949 861E, then the software was not tampered with since the developer signed it.

      TIP

      The output from the verify command may contain WARNING: This key is not certified with a trusted signature!. You can ignore this, but if you want to fully verify your download, you need to ask people you trust to confirm that the key fingerprint belongs to zkSNACKs.

    Watch the videoopen in new window

    Watch the videoopen in new window

    - + diff --git a/using-wasabi/PasswordBestPractices.html b/using-wasabi/PasswordBestPractices.html index dbdd2cdbf..844195808 100644 --- a/using-wasabi/PasswordBestPractices.html +++ b/using-wasabi/PasswordBestPractices.html @@ -27,13 +27,13 @@ Password Best Practices | Wasabi Docs - - + +

    Password best practices

    Introduction

    You shouldn't try to re-invent the wheel for something as complicated and nuanced as cryptography, and especially in regards to entropy.

    These are some of the industry best practices:

    TIP

    Don't "roll your own" crypto.

    Password basics

    1. Randomness is the single-most important requirement for a strong password, because randomness means that the password has no predictable pattern to it. This makes it impossible to crack without doing an exhaustive, "brute-force" attack.

    2. Assuming a password is constructed randomly, its length has the most impact on its strength. However, a password that is very long, but not randomly constructed, such as: thequickbrownfoxjumpedoverthelazydogsback, or a passage from literature, is certain to be on every serious hacker's guess list.

    3. "Entropy" is a term commonly used to define the strength of a random password. There is a tutorial about how to calculate and evaluate entropy in your password here.

    What not to do

    Here are a few examples that do it completely wrong. You should not generate your password like this:

    1. Do not use publicly known information like your grandma's maiden name and the birthday of your dog. Emma1992 is a really, really, really bad password, because it can easily be guessed and it is very short. Here is a list of the worst and most commonly used passwordsopen in new window in recent years. Password hackers start with lists like this.

    2. Do not use the same password that you have used in other places. Because if one password is leaked, then other ones are compromised.

    3. Do try to use a mix of uppercase and lowercase letters, numbers, and special characters (&$%@ etc.) in your password.

    4. Do not take a famous quote, or well-known passage from literature and use it for a password. It will not fool any serious hacker, even if you throw in substitutions such as: "@" instead of "a", or "$" instead of "s".

      Make a secure password!!

      It is of utmost importance to generate a secure password following best practices.

    Use Diceware

    Rolling dice is an easy and effective way to get high entropy and randomness in a password that can even be memorized.

    The Diceware method is a great strategy for your most precious passwords (e.g. the password to your computer, your backups, or your encryption key). You can even use Diceware to create secure wallets.

    To generate a password using Diceware, you just need a high-quality die, a pen, and some paper. You can find EFF's Diceware list at the Electronic Frontier Foundation websiteopen in new window. Make sure you are alone and there are no cameras nearby. For maximum protection, disconnect your computer from the internet (after you save the Diceware list) and cover your webcam.

    To start, roll the die five times. Record the number from each roll using the pen and paper. You will end up with a five-digit number. We got 52611. Now search on the Diceware list for the five digit number you just created. Write down the word the number corresponds to, in our case it is salvo. This word by itself is not a good password, it would only take about a thousandth of a second to crack. Repeat the dice rolling process at least five more times.

    After six sets of five rolls, we ended up with 52611 51631 63432 43123 21641 and 14146. This corresponds to the password salvo rhoda walton mudd croft bride.

    This six-word passphrase, even though easy to remember, is just one of 2.21 x 10^23, or 221 sextillion possible six-word combinations taken from the list of 7776 words. A computer capable of 1 trillion guesses/second would take, on average, over 3500 years to correctly guess this or any six-word combination of words from the list, if they are chosen randomly.

    A 6-word passphrase derived as just discussed has 77 bits of entropy. Best practices for being secure against any adversary currently recommendopen in new window a minimum of near 80 bits of entropy, so this example phrase barely qualifies.

    Use a dictionary

    All of the major languages have at least 100,000 words in their dictionaries. Most have over 300,000 words. You can take a dictionary in any language that you are comfortable with and create a very strong password by randomly selecting as few as 5 words from it.

    The quick, but not technically random way would be to flip open your chosen dictionary to any seemingly random page, close your eyes, and put your fingertip down on the page. Choose the word nearest your fingertip that has at least 4 letters. Repeat this process at least 4 more times.

    If you'd prefer a truly random way to select pages, and you are using either Windows or Linux, you can easily create random numbers in a selected range (such as the number of pages in your dictionary) from your terminal.

    Assuming your dictionary has, for example, 854 pages:

    Windows: Open a Powershell terminal and enter:

    [C:\User>] get-random -maximum 854
     

    Linux: Open a terminal and enter:

    [user@you:~$] echo $(( $RANDOM % 854 ))
     

    Each time you repeat this command, your operating system will return a random number somewhere in the range of available pages of your dictionary.

    Use this function to pick pages in a truly random manner, and select the needed words in the same way as before.

    Both this and the Diceware method are good ways to create a password with sufficient randomness that was generated completely off-line.

    Use an open-source password manager

    There are several well-known, cross-platform, and open-source password managers available. The main requirement besides being open-source, is a cryptographically secure random number generator, with the ability to generate significant entropy while using letters, numbers, and special characters.

    It is recommended that you use all available characters when generating a password, and the length of the password should be at least 12 characters for minimally sufficient entropy.

    It is up to the user to choose between a password manager that stores its data in the cloud, making it easy to stay in sync across various devices, or one that only stores its data locally.

    As it so often happens, more convenience means less security in this decision.

    Password entropy

    "Entropy" is a term commonly used to define password strength. It is typically used to describe the combined effect of randomness, length, and number of characters (lowercase/uppercase letters, numbers, and special characters) or words in a password or passphrase.

    Calculating entropy allows the strength of different randomly constructed passwords or phrases to be compared. It also defines the size of the search-space an attacker would need to cover to find the password by trying all possibilities.

    How to calculate entropy

    Assuming a password or passphrase is constructed randomly, its level of entropy can be calculated in this way:

    • For a password, the total number of possible outcomes given a specific length (L), and number of characters used (C), is: C raised to the power of L, or C^L.
      Example: jwodnrosqf is lowercase only (C = 26) and 10 characters long (L = 10). So, 26^10 = 141,000,000,000,000 (141 trillion).

      Including uppercase letters in the same password: jWoDNrosqF to double (C), results in 52^10 possible passwords = 145,000,000,000,000,000 (145 quadrillion).

      Including special characters in the same password: jW0DNro$qF raises (C) to 95, resulting in 95^10 possibilities = 59,900,000,000,000,000,000 (59.9 quintillion).

    • For a passphrase chosen randomly from a list of words, the total number of possible outcomes given a specific number of words (N) and wordlist size (S) is: S raised to the power of N, or S^N.
      Example: The EFF Diceware list contains 7776 words. Randomly selecting 5 words from the list results in 7776^5 possible passphrases = 28,400,000,000,000,000,000 (28.4 quintillion).

    Just knowing how to do these basic calculations allows you to compare the strength of different randomly-generated passwords or phrases.

    "Bits" of entropy

    Password entropy is often discussed and compared in a context of bits of entropy. This is, of course, because computers can only process 0's and 1's, or bits, so everything related is expressed that way. To calculate bits of entropy, use a calculator that does logarithmsopen in new window and compute log2(x), where x = the total number of possible outcomes for an event.

    For example, there are 7776 words on the EFF wordlist commonly used with dice to create passphrases. Plugging 7776 into the calculator to get log2(7776), it is shown that each word taken randomly from the list contributes 12.92 bits of entropy to the strength of the passphrase. So, a 5-word passphrase selected randomly from the EFF list will have 5 x 12.92 = 64 bits of entropy.

    Since the combination of: lowercase + uppercase letters, numbers, and special characters = 95, a password constructed using all of these will have log2(95), or 6.57 bits of entropy for each character that comprises the password.

    From that, we can now calculate that, in order to get the same level of entropy with a password instead of a 5-word passphrase, the password must be at least 10 characters in length.

    How much entropy is needed

    Entropy matters because it allows one to compare the required search-space of a potential password with the search-speed known to be available to various potential adversaries. In doing so, it is possible to then know how long it would take an adversary with known resources to attempt every mathematically possible password or passphrase for a given level of entropy.

    Edward Snowden revealed in 2013 that the NSA had the ability to guess passwords at a rate of 1 trillion guesses/second. At that speed of guessing, the password in the above example (28.4 quintillion possibilities) could be guessed in at most, 11 months.

    Since there is an equal chance of finding the password in the first half of the total number of guesses as there is in finding it in the second half of the total number, it is accurate to assume that on average, a password will be found in 1/2 of the time required to do an exhaustive search. That means just over 5 months for the example just mentioned.

    Keep in mind that Snowden's information in quite old, in a processing-power context. We have no way of knowing what is currently possible, so if a State-Level attacker is a part of your assumed threat-model, it would be wise to assume that their tools are now much more powerful.

    Even if a given threat-model does not include State-Level attackers, it is still important to consider that there are GPU-based password hacking tools publicly available that are capable of guessing well into the billions of guesses/second.

    - + diff --git a/using-wasabi/PayJoin.html b/using-wasabi/PayJoin.html index 94ef5727d..5924ba256 100644 --- a/using-wasabi/PayJoin.html +++ b/using-wasabi/PayJoin.html @@ -27,8 +27,8 @@ PayJoin | Wasabi Docs - - + +

    PayJoin

    Sending PayJoin step-by-step

    1. Load a wallet and open the Send dialog.

    2. Request from the receiver a BIP21 Bitcoin URIopen in new window with the flag pj= and paste it into the To field of the Send dialog. (E.g. bitcoin:tb1q0382a3m2jzvyk5lkea5h5jcht88xa6l0jufgwx?amount=0.00010727&pj=https://payjoin.test.kukks.org/BTC/pj)

    Enter the label of the recipient.

    Send Bitcoin PayJoin transaction in Wasabi Wallet

    1. Click Continue.

    2. At Preview Transaction, verify that the information is correct.

    PayJoinPreviewTransaction

    1. Click Confirm, and type in the passphrase.

    The success of a PayJoin transaction is not something that depends on Wasabi.

    It may happen that the transaction is broadcast with success, but that it is not a PayJoin. This can happen for several reasons including:

    • The receiver did not have any utxos to contribute towards a PayJoin.
    • Your wallet does not use the same address format as the receiver's.
    • The PayJoin server is not available.

    The goal of PayJoin

    PayJoin is a collaborative transaction between the sender and the receiver of a payment, for example the merchant and the customer. The goal of the protocol is to break the common input ownership heuristic, while making it difficult to fingerprint that the transaction is in fact a CoinJoin. Further, it reduces the transaction fees paid by the merchant due to consolidation of coins.

    Coordination

    The coordination of this coinjoin is done with the PayToEndPoint [P2EP] concept. The receiver is reachable over the internet, either over a Tor onion service or clearnet IP address. The link is included in a BIP21 Bitcoin URI, and is provided to the sender as the payment invoice. The sender uses this onion service or IP address to connect to the server of the receiver and communicate the further protocol. The coordination is usually done within seconds, and will abort to the fallback transaction after some time if the connection breaks.

    Fallback transaction

    In the very first request to the receiving server, the sender provides a finalized signed transaction which has only the inputs of the sender, like any other Bitcoin transaction. The inputs are only from the sender. The outputs are the address of the receiver, as well as the change address of the sender. For example here, Alice pays Bob 0.2 bitcoin.

    Alice input   1 bitcoin   -->   Bob output            0.2 bitcoin
    @@ -36,6 +36,6 @@
     

    Both the sender and the receiver could broadcast this transaction.

    PayJoin transaction

    The receiving server responds to this initial proposal, with a transaction that adds more inputs to the transaction. Thus, the output belonging to the receiver increases in value, above the value that the payment amount is due.

    Alice input   1 bitcoin   -->   Bob output            0.7 bitcoin
     Bob input     0.5 bitcoin -->   Alice change output   0.8 bitcoin
     

    The sender broadcasts this transaction to the Bitcoin network.

    Advantages of PayJoin

    First and foremost, the common input ownership heuristic is broken, meaning that the inputs do not belong to one single entity, but to several of them. This breaks one of the most important assumptions of transaction surveillance companies. Contrarily to other coinjoin implementations, the outputs are not of equal value, so it is not obvious that this transaction is in fact a coinjoin.

    Further, the outputs do not reflect the actual value of the transaction. In our example, the economic transfer is of 0.2 bitcoin from Alice to Bob, but the outputs are worth 0.7 bitcoin and 0.8 bitcoin. This is obfuscating the actual amount payed.

    Finally, the receiver is consolidating his coins, thus saving on future transaction fees. Without the PayJoin, the receiver would have two coins, worth 0.2 bitcoin and 0.5 bitcoin, and he would have to pay twice the transaction fee to spend these coins. But because of using PayJoin, he only has one coin, worth 0.7 bitcoin, thus reducing his future transaction costs when spending this coin.

    - + diff --git a/using-wasabi/RPC.html b/using-wasabi/RPC.html index 1d15bfcd0..815158c96 100644 --- a/using-wasabi/RPC.html +++ b/using-wasabi/RPC.html @@ -27,8 +27,8 @@ RPC Interface | Wasabi Docs - - + +

    Wasabi Remote Procedure Call Interface

    Wasabi Wallet provides an RPC interface to interact with the wallet programmatically. The RPC server is listening by default on port 37128.

    Limitations

    The RPC server does NOT support batch requests or TLS communications (because it is not supported on Linux and on Macopen in new window). Requests are served in order one-by-one in series (no parallel processing). It is intentionally limited to serve only one whitelisted local address and it is disabled by default.

    The more user friendly command line interface wcli can be found hereopen in new window.

    Configure RPC

    The RPC server has to be configured and enabled. This is done in the Config.json file and the relevant settings are:

    JsonRpcServerEnabled: [true | false] (default: false)
    @@ -452,7 +452,7 @@
       "result": "65c21ec1-9865-4cd6-bd67-c2f058a45d24",
       "id": "1"
     }
    -

    The first parameter is the destination address, the second parameter is the amount in sats. The result is the paymentId.

    A payincoinjoin is written to the logs and its status can be seen by using the listpaymentsincoinjoin method.

    Payments in coinjoin can in theory be made to any ScriptPubKey, however the zkSNACKs coordinator currently only accepts P2WPKH and P2TR outputs.

    Currently the default maximum is 4 payments per client per coinjoin.

    payincoinjoin only registers a payment, so if coinjoin is not running or the amount is lower than the wallet balance, the payment is queued.

    Pending payments can be removed by using the cancelpaymentincoinjoin method. Pending payments are also removed if the Wasabi client restarts.

    listpaymentsincoinjoin

    Lists the current payments in coinjoins.

    curl -s --data-binary '{"jsonrpc":"2.0", "id":"1", "method":"listpaymentsincoinjoin", "params":[]}' http://127.0.0.1:37128/WalletName | jq
    +

    The first parameter is the destination address, the second parameter is the amount in sats. The result is the paymentId.

    A payincoinjoin is written to the logs and its status can be seen by using the listpaymentsincoinjoin method.

    Payments in coinjoin can theoretically be made to any ScriptPubKey. However, the coordinator may only accept certain types of outputs.

    Currently the default maximum is 4 payments per client per coinjoin.

    payincoinjoin only registers a payment, so if coinjoin is not running or the amount is lower than the wallet balance, the payment is queued.

    Pending payments can be removed by using the cancelpaymentincoinjoin method. Pending payments are also removed if the Wasabi client restarts.

    listpaymentsincoinjoin

    Lists the current payments in coinjoins.

    curl -s --data-binary '{"jsonrpc":"2.0", "id":"1", "method":"listpaymentsincoinjoin", "params":[]}' http://127.0.0.1:37128/WalletName | jq
     
    {
       "jsonrpc": "2.0",
       "result": [
    @@ -534,6 +534,6 @@
       "id": "1"
     }
     
    - + diff --git a/using-wasabi/Receive.html b/using-wasabi/Receive.html index 448cf7b56..bcf934617 100644 --- a/using-wasabi/Receive.html +++ b/using-wasabi/Receive.html @@ -27,8 +27,8 @@ Receive | Wasabi Docs - - + +

    Receive bitcoin

    Receive bitcoin in Wasabi Walletopen in new window

    Generating addresses step-by-step

    1. Start Wasabi and open the wallet that you want to receive coins into.
    2. Click the Receive button in the main view's top right corner.
    3. Type in the name of the entities who know that this address is yours. If you have already used a label before, simply choose it from the suggested labels.

    Receive label in Wasabi

    1. Press Continue and the wallet will generate a new address.

    Bitcoin address in Wasabi

    Bitcoin public keys and addresses

    The Bitcoin protocol utilizes public key cryptographyopen in new window to defend and verify the property rights of the individuals holding and transacting bitcoin. A private key is a large random number that should be kept secret. With the elliptic curve digital signature algorithmopen in new window, based on the private key you can calculate a public key. If someone has only the public key, it is computationally infeasible [pretty much impossible] to calculate the private key. Whoever knows the private key can calculate a cryptography signature over a message, which proves that the private key was known by the signer, without actually revealing the secret.

    For data size efficiency, in Bitcoin, the public key is hashedopen in new window and encoded into a bech32 address. This address commits to the public key, which commits to the private key. In a Bitcoin transaction, the output creates a new unspent transaction output which is "locked up" by an address. The input of the transaction spends a UTXO by providing a valid signature of the public key that the address committed to.

    TIP

    Wasabi Wallet does not "store your money", rather it stores your public keys and an encrypted secret that requires your passphrase to derive the private keys. It creates addresses for receiving bitcoin, and it signs transactions that spend your bitcoin.

    The problem with address reuse

    Whenever you use the same address to lock up different UTXOs, then all these coins can be spent by anyone who knows the same private key. This makes it obvious for anyone that this one entity [you] owns all these coins, which is very bad for privacy. The first rule of Bitcoin privacy is never reuse addresses!

    TIP

    This is why Wasabi removes the address from the Addresses Awaiting Payment list as soon as it has received a coin.

    The importance of labeling

    Satoshis are the base unit currency of the Bitcoin network and are truly fungible, meaning that any 100 000 000 satoshis are always equal to 1 bitcoin. Just like with gold atoms, it doesn't matter which specific gold atoms you have, as long as it's gold, it's gold. However, an unspent transaction output, a bitcoin, is a chunk of money and is not fungible, because it has a different amount of satoshis in it, a different public key locking it up, a unique transaction history, and a unique index number. This is just like a gold coin, with a unique amount of gold atoms, and either a pretty mintage or an old chipped broken coin. Because UTXOs are not fungible, it is very important to know exactly which coin is which, and that is done by carefully labeling.

    For example, if I create a new address to receive a 0.5 BTC payment from Andrew for a laptop that I sold to him then the label has to be: Andrew.

    The label is not for describing the reason for payment, but rather to list those who know that this address is yours. Understanding this difference between labeling an address and describing a transaction is very important for your privacy.

    TIP

    In Wasabi it is mandatory to give every receive address a label of those who know that this address is yours, so that later you know what to do with it, and it also helps the auto coin selection algorithm when sending.

    Clusters

    Following the previous example, if I have to send a fraction (0.1 BTC) of the previously received coin to Charlie then in the Send tab the observers should be: Charlie. In that way, the change (0.4 BTC) will be known by Andrew and Charlie because they both will be able to follow the change. That's exactly what Wasabi displays in the coins list (cluster column), Wasabi tells us who are the ones that know about each of our coins in order to allow us to decide what to do with the coins.

    Let's take a look at another example: Imagine you have three coins, one known by Alice, one known by a KYC exchange and finally one known by Charlie. Imagine you need to sell a few sats to Charlie, which coin/s should you send? The obvious selection is the one already known by Charlie because by doing that he cannot learn anything new about our wallet, moreover, neither Alice nor the KYC exchange can learn anything new! But what if the coin is not big enough and we need to use more than one coin? You can use the one known by Alice or the one known by the KYC exchange, but are you okay with Charlie knowing about your deposit/withdrawal from the exchange? Are you okay with Alice knowing about your deal with Charlie? In case none of those combinations are acceptable for you then you should CoinJoin your coins.

    Coinjoined coins

    Those inputs that participate in a Wasabi coinjoin transaction get transformed into arbitrary sized outputs with an increased anonymity score. By default, Wasabi tries to create big coinjoin transactions with many inputs and outputs, but the individual coins' privacy varies depending on the final amounts and values of the inputs and outputs of other participants. The higher the anonymity score of a coin, the harder it is for an observer to know who that coin belongs to. For that reason, coins with a high anonymity score are usually the ones preferred when making a payment transaction. When coins achieve the target anonymity score of the selected coinjoin strategy, their values will the visible under the Privacy Progress bar.

    Final words about labels and examples

    4 coins with good labels:

    Andrew
    @@ -38,6 +38,6 @@
     

    2 coins with bad labels:

    Payment from Andrew for my laptop
     From my old wallet
     

    In case we take the two first coins with good labels and send them to María, look how the change cluster will be displayed: Maria, Andrew, David, Me (these people know about the coin). Now, look how this will be displayed if I use the two coins with bad labels: Maria, Payment from Andrew for my laptop, From my old wallet (Is this high-quality info about the privacy level of my coin? Not really.).

    So, think about coins, think about who knows and make sure to make decisions about privacy based on what you are going to reveal and to whom. Wasabi doesn't care about why you transact with bitcoins, it only cares about who you transact with because this is what helps you reclaim your privacy.

    - + diff --git a/using-wasabi/Send.html b/using-wasabi/Send.html index 6a33b15a1..90c86ec4f 100644 --- a/using-wasabi/Send.html +++ b/using-wasabi/Send.html @@ -27,11 +27,11 @@ Send | Wasabi Docs - - + +

    Send

    Send in Wasabi Walletopen in new window

    How to send bitcoin step-by-step

    1. Click the Send button.

    Wasabi Wallet Send Button

    1. Enter/paste the destination address.

    Wasabi Wallet Send To Field

    1. Specify the amount of bitcoin to send to the destination address. Optionally, you can specify the dollar amount to send instead.

    Wasabi Wallet Send Amount Field

    1. Label the recipient by entering the name of the person or company who you are sending to.

    Wasabi Wallet Send Recipient Label

    1. Click Continue.

    Wasabi Wallet Send

    1. Preview Transaction.

      • Verify the amount, recipient, and the address.
      • Review the estimated time for confirmation and the transaction fee. Optionally, you can change the transaction fee or confirmation time by clicking on the edit fee icon.

      Wasabi Wallet Send Change Fee

      • Review the suggestions to improve your privacy by clicking the shield icon in the top right corner. For example, you may want to slightly increase or decrease your payment amount to avoid change.

      Wasabi Wallet Send Privacy Suggestion

    2. Click Confirm.

    Wasabi Wallet Send Preview Transaction

    1. Type in your passphrase, then click Send.

    Wasabi Wallet Send Passphrase

    1. Transaction successfully sent!

    Wasabi Wallet Payment Successful

    Coins

    A coin is an unspent transaction output (UTXO): a chunk of bitcoin that can be sent in a future transaction. Unlike fiat currencies which have fixed denominations, each UTXO contains a variable amount of bitcoin. You can get coins by first receiving them from someone else. When you want to send some bitcoin you simply enter the amount to send and the address after clicking the Send button. Wasabi Wallet does the job of automatically selecting the appropriate combination of coins to include as inputs in the transaction.

    Clusters

    Every time you receive a payment, you first must label the observers who know this address is yours. This transaction metadata is used to build a cluster of which people know about your coins. For example, if you receive a coin from Alice, then the cluster is Alice. If you now send half of this coin to Bob, then the cluster of your change coin is Alice, Bob. The goal is to know the observers who know about your coins and try to reduce their number for each coin.

    Anonymity Set

    A typical bitcoin transaction will contain one input and two outputs - one of the outputs is the coin you are sending and the other output is the change coin that goes back to your wallet. Your change coin can be linked to this one input. There is a 1 in 1 chance to find this link and no plausible deniability. Thus, Wasabi denotes this coin's anonymity set as 1.

    In a Wasabi coinjoin, many peers register coins in the input of the transaction, and in the output there are several equal value coins. For example, the output may contain 20 coins worth exactly 0.3 bitcoin. This means that when looking at one of these coinjoin outputs, there is a 1 in 20 chance to find the corresponding input: thus an anonymity set of 20. Therefore, the higher the anonymity set, the more your post-coinjoin coin is delinked from the pre-coinjoin history.

    There are three coinjoin strategies to choose from in Wasabi Wallet which effect the target anonymity score for your coins. These three strategies are Minimize Cost, Maximize Speed, and Maximize Privacy. Each of these strategies come with different trade-offs.

    Alternatively, custom coinjoin settings can be configured.

    Coinjoin Strategy

    Receiving Address

    When sending bitcoin, you need to know the destination address of the receiver. This commits to the spending condition that the receiver agrees to have for this coin. The address can be a public key hash [starting with 1], a script hash [starting with 3], a native SegWit bech32 public key hash [starting with bc1q], or a Taproot bech32m public key [starting with bc1p]. Make sure that you ask the receiver for a new address for every payment to protect your privacy and theirs. Wasabi will calculate the checksum and notify you if the provided address is wrong.

    Observers

    In Wasabi it is mandatory to provide one or more labels each time you initiate a transfer of bitcoin. These labels should be the observers of the transaction. An observer of a sending transaction is, of course, the receiver, as well as any other third party that knows that you are the sender of this transaction. For example, you should include as a label the payment processor or the bitcoin exchange if you use their services. This metadata will be used to build an accurate cluster of observers who know about your coins.

    Amount

    In the Amount text box you can specify how many bitcoins the receiving address will gain. You can also see and enter the current US Dollar value of the sending amount.

    Avoid sending rounded values

    If you specify a rounded amount, like 0.0100 0000 bitcoin, then the change output will not be rounded, like 0.0896 8413 bitcoin. This makes it easy for an observer to conclude that the spending amount was the 0.01 bitcoin, and that the other output is the change back to the sender. So in order to increase your privacy, you can set a non-rounded amount, like 0.0101 6843.

    Send Amount Field

    Mining Fee

    Every transaction must specify a fee which incentives the miner to include it in a block, it is calculated by value of inputs - value of outputs. The higher the fee per virtual byte (vByte) transaction size, the more likely miners are to confirm this transaction. Wasabi uses Bitcoin Core's smart fee algorithm to estimate the time it will take to confirm at the given fee level. You can change the fee by moving the slider, or by manually setting the transaction fee rate.

    Wasabi Wallet Fee Slider

    In some cases, there is very little demand for block space, and then Wasabi will set the minimum fee of 1 sat/vByte.

    High-priority transaction fees

    If you have a transaction that is high-priority and you really want it to be confirmed ASAP:

    1. Use a mempool monitoropen in new window (available Tor onion websiteopen in new window) to see what fees are likely to get a transaction to be confirmed in the next block.
    2. Select a fee that is well above the current highest fee (perhaps double or triple it) if it is very important to you that the transaction is confirmed soon.

    For a deeper dive into the fee estimation process, this articleopen in new window is worth reading.

    Privacy Suggestions

    Since Wasabi version 2.0.4open in new window the Preview Transaction dialog contains privacy suggestions. The privacy suggestions help the user to improve their transaction. They are displayed when hovering over the triangle or shield in the top right corner. The suggestions are based on the current coin selection for this transaction. For example, the suggestions will warn the user when the transaction contains non-private coins.

    There are warnings for:

    • Interlinking labels
    • Using non-private coins
    • Using semi-private coins
    • Creating change
    • Consolidating 10 coins or more
    • Using unconfirmed coins
    • Using coinjoining coins

    There are clickable suggestions to:

    • Manage labels (when interlinking labels)
    • Only use private coins
    • Not use non-private coins (only use private and semi-private)
    • Avoid change

    The suggestion to only use semi-private or private coins is only shown if the amount difference is less than or equal to 25%.

    TIP

    Each suggestion has a tooltip. Hover over the suggestion to see more information.

    Password

    In order to spend a coin, the transaction must be signed by the private key corresponding to that coin. Wasabi stores a secret on the computer, encrypted with the passphrase that you specified during the wallet generation. To spend a coin you need to type in the passphrase, which decrypts the encrypted secret, and then derive the child private key that signs the transaction. Afterwards, the passphrase is wiped from memory.

    Broadcast

    Once the transaction is signed, Wasabi will connect to a random Bitcoin P2P node over Tor and provide this transaction, then it will immediately disconnect. This first node will gossip the transaction throughout the network, then miners can include it in a block.

    If for some reason the first broadcast fails, then if you have Wasabi connected to your own Bitcoin full node this node will broadcast the transaction to the network. If this also fails, then the transaction is sent to the backend coordinator with a new Tor identity, who then broadcasts the transaction to the network.

    Speed Up or Cancel Transaction

    Pending (unconfirmed) Bitcoin transactions can be replaced by sending a new transaction that pays a higher fee rate using the same (or some) coins/UTXOs. This can be used to speed up or cancel a transaction. The miners are incentivized to mine the transaction with the higher fee rate, as this will earn them more money. If the new higher fee rate paying transaction is confirmed, the old transaction can be considered "replaced".

    Since Wasabi version 2.0.4open in new window it is possible to easily speed up or cancel a pending transaction. Speeding up and cancelling are similar to each other, the main difference being that a Cancel Transaction will send the coins to a new address owned by the user/wallet (this is all done automatically). The transaction is then "cancelled" because the bitcoin (minus the fees) is returned to the user's wallet.

    Speeding up or cancelling a transaction costs additional fees, because a new bitcoin transaction with a higher fee rate (than the previous transaction) has to be sent.

    Wasabi first tries to utilize RBF, if that's not possible it tries to do CPFP.

    To Speed Up or Cancel a Transaction, right-click on the pending transaction in the history.

    History Right Click

    Click one of the two options and then confirm that you want to pay the additional fee for this action. After which the succesfully speed up/cancelled dialog is displayed.

    In the history, the transaction will now have a rocket (speeded up) or a cross (cancelled) icon. The transaction is still pending, but it should be confirmed sooner than the initial transaction.

    How to speed up Bitcoin transactionopen in new window

    - + diff --git a/using-wasabi/StartupParameters.html b/using-wasabi/StartupParameters.html index 23b78e581..098f9b589 100644 --- a/using-wasabi/StartupParameters.html +++ b/using-wasabi/StartupParameters.html @@ -27,11 +27,11 @@ Starting Wasabi with parameters | Wasabi Docs - - + +

    Starting Wasabi with parameters

    Available commands

    It is possible to start Wasabi with specific parameters. The parameters override the configurations in the configuration file.

    When entering the commands on the command line, they are capital letter insensitive.

    The parameters work for both the GUI and the Daemon.

    Help about the options is available when using the command line by adding --help to the executable: wassabeed --help or dotnet run -- --help when building from source.

    Config file configurations

    All configuration options available via the Config.json file are also available as command line arguments:

    Config FileCommand LineEnvironment variable
    ""Network": "TestNet"--network=testnetWASABI-NETWORK=testnet
    "MainNetBackendUri": "https://api.wasabiwallet.io/"--mainnetbackenduri="https://api.wasabiwallet.io/"WASABI-MAINNETBACKENDURI="https://api.wasabiwallet.io/"
    "TestNetClearnetBackendUri": "https://api.wasabiwallet.co/"--testnetbackenduri="https://api.wasabiwallet.co/"WASABI-TESTNETBACKENDURI="https://api.wasabiwallet.co/"
    "RegTestBackendUri": "http://localhost:37127/"--regtestbackenduri="http://localhost:37127/"WASABI-REGTESTBACKENDURI="http://localhost:37127/"
    "UseTor": "Enabled"--usetor=enabledWASABI-USETOR=enabled
    "TerminateTorOnExit": false--terminatetoronexit=falseWASABI-TERMINATETORONEXIT=false
    "TorBridges": "[TorBridge]"--torbridges="[TorBridge]"WASABI-TORBRIDGES="[TorBridge]"
    "DownloadNewVersion": true--downloadnewversion=trueWASABI-DOWNLOADNEWVERSION=true
    "StartLocalBitcoinCoreOnStartup": false--startlocalbitcoincoreonstartup=falseWASABI-STARTLOCALBITCOINCOREONSTARTUP=false
    "StopLocalBitcoinCoreOnShutdown": true--stoplocalbitcoincoreonshutdown=trueWASABI-STOPLOCALBITCOINCOREONSHUTDOWN=true
    "LocalBitcoinCoreDataDir": "/home/UserName/.bitcoin"--localbitcoincoredatadir="/home/UserName/.bitcoin"WASABI-LOCALBITCOINCOREDATADIR="/home/UserName/.bitcoin"
    "MainNetBitcoinP2pEndPoint": "127.0.0.1:8333"--mainnetbitcoinp2pendpoint="127.0.0.1:8333"WASABI-MAINNETBITCOINP2PENDPOINT="127.0.0.1:8333"
    "TestNetBitcoinP2pEndPoint": "127.0.0.1:18333"--testnetbitcoinp2pendpoint="127.0.0.1:18333"WASABI-TESTNETBITCOINP2PENDPOINT="127.0.0.1:18333"
    "RegTestBitcoinP2pEndPoint": "127.0.0.1:18444"--regtestbitcoinp2pendpoint="127.0.0.1:18444"WASABI-REGTESTBITCOINP2PENDPOINT="127.0.0.1:18444"
    "JsonRpcServerEnabled": true--jsonrpcserverenabled=trueWASABI-JSONRPCSERVERENABLED=true
    "JsonRpcUser": ""--jsonrpcuser=""WASABI-JSONRPCUSER=""
    "JsonRpcPassword": ""--jsonrpcpassword=""WASABI-JSONRPCPASSWORD=""
    "JsonRpcServerPrefixes":["http://127.0.0.1:37128/", "http://localhost:37128/"]--jsonrpcserverprefixes=["http://127.0.0.1:37128/", "http://localhost:37128/"]WASABI-JSONRPCSERVERPREFIXES=["http://127.0.0.1:37128/", "http://localhost:37128/"]
    "DustThreshold": "0.00005"--dustthreshold=0.00005WASABI-DUSTTHRESHOLD=0.00005
    "EnableGpu": true--enablegpu=trueWASABI-ENABLEGPU=true
    "CoordinatorIdentifier": "CoinJoinCoordinatorIdentifier"--coordinatoridentifier="coinjoincoordinatoridentifier"WASABI-COORDINATORIDENTIFIER="coinjoincoordinatoridentifier"
    "MaxCoordinationFeeRate": 0.0--maxcoordinationfeerate=0.0WASABI-MAXCOORDINATIONFEERATE=0.0
    "MaxCoinJoinMiningFeeRate": 150.0--maxcoinjoinminingfeerate=150.0WASABI-MAXCOINJOINMININGFEERATE=150.0
    "AbsoluteMinInputCount": 21--absolutemininputcount=21WASABI-ABSOLUTEMININPUTCOUNT=21

    Non-Config file configurations

    There are a few special switches that are not present in the Config.json file and are only available using the command line:

    SwitchCommand LineEnvironment variable
    Ignore P2P transactions--blockonly=trueWASABI-BLOCKONLY=true
    The level of detail used during logging--loglevel=traceWASABI-LOGLEVEL=trace
    Specify to log only to specific target*--logmodes=consoleWASABI-LOGMODES=console
    The path to the directory used during runtime--datadir="$HOME/temp/wasabi-1"WASABI-DATADIR="$HOME/temp/wasabi-1"
    Open wallet "WalletName"--wallet=WalletNameWASABI--WALLET=WalletName
    Expose the RPC as onion service--rpconionenabled=trueWASABI-RPCONIONENABLED=true
    Tor will listen to this SOCKS5 port--torsocksport=35000WASABI-TORSOCKSPORT=35000
    Tor will listen to this control port--torcontrolport=35001WASABI-TORCONTROLPORT=35001
    Folder to use where Tor binary is located--torfolder="$HOME/tor-browser_en-US/Browser/TorBrowser/Tor"WASABI-TORFOLDER="$HOME/tor-browser_en-US/Browser/TorBrowser/Tor"
    • Available options are "" (don't log at all), "file" (log only to file), "console" (log only to console) and "file,console" (log to file and console).
    - + diff --git a/using-wasabi/Testnet.html b/using-wasabi/Testnet.html index 6800f471d..949f2f70e 100644 --- a/using-wasabi/Testnet.html +++ b/using-wasabi/Testnet.html @@ -27,11 +27,11 @@ Testnet | Wasabi Docs - - + +

    Testnet

    Bitcoin testnet

    The Bitcoin testnet is a network that behaves almost exactly the same as the Bitcoin mainnet. The major difference is that the bitcoin on the testnet do not have any economical value, they should not be used to buy or sell goods and services. This makes the network very useful for testing software and features, because there is no risk of losing precious "real" bitcoin from the main network.

    Don't loose your bitcoin

    When testing cutting edge software like Wasabi, use testnet to ensure that your mistakes don't cost you money!

    Activating testnet in Wasabi

    First, open your Wasabi Wallet and click the Settings button in the bottom left corner.

    Settings button

    Select the Bitcoin tab, click on the Network dropdown and select TestNet.

    Settings Network Dropdown

    Restart Wasabi to activate the change. After the restart, you should see the TestNet indicator in the top right corner of the wallet.

    Bitcoin testnet network activated in Wasabi Wallet

    When Wasabi is started in testnet, it will fetch testnet BIP 158 block filtersopen in new window from the backend. For the first start, this may take a couple of minutes.

    After the testing, set the settings back to mainnet, and close Wasabi. It will load on mainnet the next time you start it.

    TIP

    Alternatively, you can edit the Config.json file in your Wasabi data folder. In the second line you can modify the value of "Network":, to "Main", "TestNet", or "RegTest". The changes will apply on the next launch of Wasabi.

    Loading a wallet

    Wasabi differentiates between Mainnet and TestNet wallets. Meaning that a TestNet wallet will not show up when the Main network is active, and vice versa. You have to create a new wallet when you activate TestNet for the first time.

    Receiving testnet bitcoin

    You can generate a receive address the same way as on mainnet, by labeling the known by entities in the Receive dialog. Notice that testnet SegWit addresses start with tb1q..., and not with bc1q... as mainnet addresses.

    Because testnet bitcoin don't have economical value, they are gifted by different sources. There are faucetsopen in new window like this oneopen in new window or bitcoinfaucet.uo1.netopen in new window that give a certain amount of testnet bitcoin per time period. You may also ask other developers if they have a couple of spare testnet coins available.

    Coinjoin on testnet

    CoinJoin on testnet is as easy as on mainnet. Usually there are other testers doing a coinjoin, but if you are the only one at the moment, then load two wallets and start coinjoining in both of them.

    - + diff --git a/using-wasabi/WalletGeneration.html b/using-wasabi/WalletGeneration.html index b7f6a97b6..8c0cc5dbb 100644 --- a/using-wasabi/WalletGeneration.html +++ b/using-wasabi/WalletGeneration.html @@ -27,8 +27,8 @@ Wallet Generation | Wasabi Docs - - + +

    Wallet Generation

    Introduction

    With Wasabi you can generate an unlimited number of Bitcoin wallets very quickly, without any cost, and without asking anyone for permission. Each wallet has separate private and public keys in a unique backup, and they are not at all linked to the other wallets generated on the same computer. So, with several wallets, you can conveniently manage your bitcoin for different use cases without worrying about revealing that you control them.

    Generating the wallet step-by-step

    1. Launch Wasabi Wallet. The very first time you run the software the Add Wallet dialog will be open automatically, but you can also access it by clicking on Add Wallet in the NavBar or Searchbar.

    2. Click Create a new wallet to generate a new wallet.

    Add a Bitcoin wallet with Wasabi

    1. Give the wallet a name. This name is not shared with anyone, it is only stored locally on your computer. (If there are no wallets then this step is skipped and the new wallet will automatically be named Wallet) Click Continue.

    Add Wallet Wallet Name

    1. Write down the 12 recovery words (mnemonic seed phrase) in the correct order and store them in a safe place. You have to use this seed phrase together with your passphrase to recover your wallet (using Wasabi or another BIP 39open in new window compliant wallet).

      Back up your recovery words!

      Without the recovery words (Seed phrase) AND the passphrase, you cannot recover your wallet. So, triple-check that you have a proper backup! Make sure the backup of your recovery words is stored separately from the passphrase backup.

    Wasabi Wallet recovery words

    1. You must confirm the Recovery Words by clicking on the right word in the right order, as a check to make sure that your Recovery Words are backed up. So, confirm the Recovery Words, and click Continue.

    Wasabi Wallet confirm recovery words

    1. Write a long and random passphrase and back it up. It encrypts your secrets, and you will need it every time you want to open the wallet, spend bitcoin from this wallet or recover your wallet.

      If you are uncertain about how to create a secure passphrase, refer to Password Best Practices for helpful information.

      Back up your passphrase!

      Without the passphrase, you cannot spend your bitcoin or recover your wallet, even if you have the recovery words (Seed phrase). So, triple-check that you have a proper backup!

    2. Confirm the passphrase and click the Continue button.

    Wasabi Wallet Add Passphrase

    1. Select the coinjoin strategy for this wallet and click Continue.

    Add Wallet Coinjoin Strategy

    1. The wallet is succesfully added and will automatically be opened.

    Wallet Successfully Added

    Important info about your wallet password

    Wasabi integrates BIP 38: Password-Protected Private Keyopen in new window, which means that the secrets needed to spend the bitcoin are encrypted on the computer. If someone has compromised your operating system and hardware and he only has the encrypted secrets, then no bitcoin can be spent by him. You need both the encrypted secrets and the passphrase in order to enable the private key which can sign a spending transaction. This means that the passphrase is your last line of defense against anyone who tries to steal your bitcoin.

    How are the secrets created

    Wasabi uses BIP 38: Password-Protected Private Keyopen in new window

                          +--------------+
    @@ -73,6 +73,6 @@
                       +--------------------+
     
     
    - + diff --git a/using-wasabi/WalletLoad.html b/using-wasabi/WalletLoad.html index 754e2b0f5..a7dba3761 100644 --- a/using-wasabi/WalletLoad.html +++ b/using-wasabi/WalletLoad.html @@ -27,11 +27,11 @@ Wallet Load | Wasabi Docs - - + +

    Wallet Load

    Loading wallet step-by-step

    To load a wallet and start the synchonization process, you need to open your wallet by typing in the passphrase. The first time synchronization of your wallet might take some time depending on the size of its history.

    Wallet list

    On the left side of Wasabi Wallet is the Wallet list, where you see an alphabetically sorted list of all the previously generated wallets.

    Click the wallet you want to view, type in the passphrase and press Open.

    Type your passphrase to open the wallet

    Synchronization

    Filter download

    As soon as you start Wasabi, it connects to the backend server with a new Tor identity and requests the BIP 158 block filtersopen in new window. At the first start, this can take a while because all filters need to be downloaded, but for the subsequent starts, this is faster as only the most recent filters are requested.

    Wallet is synchronizing itself with the Bitcoin network

    Filter scanning

    When you load a wallet, it checks if the generated addresses within the gap limit hit against a block filter. Most filters do not hit, and then the wallet is certain that this block does not contain a transaction of yours so it will not download it. If a transaction of yours is in a block, then the corresponding filter will always be hit, and the wallet will know this is a relevant block for you. There can be a small chance for a false positive where the filter matches, but the block actually does not contain a transaction.

    Block download

    When a block filter hits, either a true match or a false positive, then this block is important for you, so the wallet will download it. If you have a Bitcoin full node connected, then it will fetch the verified block locally. If not, then Wasabi will connect to a random Bitcoin P2P node with a new Tor identity, request only this block for download, and then disconnect. In this step, your Wasabi behaves like any other full node, and cannot be differentiated.

    TurboSync

    Since Wasabi version 2.0.4open in new window a new feature is added called TurboSync. TurboSync leads to a significant reduction of wallet loading time, especially for a big wallet.

    During a coinjoin, a new address (key) has to be generated for each output. As a result, wallets that use the coinjoin service a lot have a quickly growing set of generated addresses. This is a problem for wallet synchronization: each address has to be tested against each filter, with a small probability of matching as false-positive for every address. As a result, wallets with many derived addresses will have to download many false-positive blocks, making the synchronization more time consuming.

    It leverages a simple heuristic: addresses used as coinjoin outputs or as change (internal keys) should only be used once. In other terms, once an internal address has been used to receive a coin and then this coin was used as input in a new transaction (the coin has been spent), the address should never be used again, and there is no need to test it against the remaining filters.

    Wallets coinjoining a lot will benefit the most from this feature, as the vast majority of their addresses will be skipped, reducing the number of blocks to download because of false-positive matches.

    Once the wallet is opened, the skipped addresses will be tested in the background, in the case that some funds have been received on those addresses. Users in that edge case would see their balance update automatically after some time. Once done the message Wallet is fully synchronized. is written to the logs file to indicate that the verification process has finished.

    You can disable it!

    TurboSync feature shouldn't cause any problem, but you might want to disable it to debug potential issues with the synchronization of your wallet. In that case, go to your wallet file (search for Wallet Folder using Wasabi's searchbar then open the file corresponding to your wallet) and set UseTurboSync to false.

    - + diff --git a/using-wasabi/WalletRecovery.html b/using-wasabi/WalletRecovery.html index d550b70e4..477500857 100644 --- a/using-wasabi/WalletRecovery.html +++ b/using-wasabi/WalletRecovery.html @@ -27,11 +27,11 @@ Recover a Wallet | Wasabi Docs - - + +

    Recover a Wallet

    There are two different ways that you can recover an already used wallet in Wasabi.

    Mnemonic Recovery Words and Password

    Wasabi uses the BIP 39open in new window mnemonic code for generating BIP 32open in new window hierarchical deterministic wallets. Both your passphrase and the generated 12 mnemonic recovery words are the necessary secrets to recover your wallet. The recovery words are spell checked based on the official wordlistopen in new window, with the right word shown below the text box.

    To recover a wallet:

    1. Click on Add Wallet at the bottom left corner of the main view.

    Wasabi Wallet Add Wallet

    1. Click on Recover a wallet.

    Wasabi Wallet Add Wallet

    1. Give the wallet a name for future recognition of the wallet.

    Wasabi Wallet Name Wallet

    1. Type in the Recovery Words in the correct order and click Continue.

    Wasabi Wallet Recover Wallet

    1. Type in the Passphrase.

    Add Wallet Add Passphrase

    Now Wasabi will recover your wallet.

    With this, only the private keys are imported, but not the labels of your addresses.

    DANGER

    At recovery, Wasabi is unable to check if your passphrase is correct or not. If you type a wrong passphrase a completely different wallet will be recovered.

    You can also use the Advanced Recovery Options to specify the gap limit. The gap limit is about how far Wasabi will check the HD wallet structure for consecutive addresses that have no coins, in some cases, you may want to increase this limit.

    Wasabi Wallet Recovery Advanced

    TIP

    With this method, you can recover a wallet that was generated with any BIP39 compatible software, not just a Wasabi generated wallet.

    Back up Wallet File and Password

    Wasabi Wallet creates a backup of your wallet file inside WalletBackups in your Wasabi data folder. If you have done a backup of this file, then you can import it at Add Wallet, by clicking on Import a wallet.

    Alternitavely: copy the wallet file to the Wallets folder, and upon the next restart of Wasabi, it will show this wallet in the NavBar, from there you can open it as usual.

    Using this method will also backup your address labels and cluster history.

    WARNING

    Make sure to back up your passphrase separately because it is necessary to spend your bitcoin.

    - + diff --git a/using-wasabi/WasabiSetupVM.html b/using-wasabi/WasabiSetupVM.html index a4fd97ae7..730ca4a43 100644 --- a/using-wasabi/WasabiSetupVM.html +++ b/using-wasabi/WasabiSetupVM.html @@ -27,8 +27,8 @@ Wasabi Setup in Virtual Machines | Wasabi Docs - - + +

    Wasabi Setup in Virtual Machines

    Benefits of Virtual Machines

    Virtualization allows you to create and run as many virtual machines (VMs) on a single computer at one time as desired. The only constraints are the amount of RAM and hard disk space available on the host computer.

    Each VM is isolated from the host machine. Therefore, such things as corrupted files, configuration errors, malware, etc., encountered during the use of a VM do not affect the host computer.

    If you are a developer, using virtual machines gives you several powerful features. You can easily:

    • Create snapshots of a VM's state at any time. These snapshots can be restored later if a problem or undesired condition arises in the current state of the VM.

    • Set up a template VM with a desired development environment or configuration, and then quickly create lightweight, disposable clones of the template for specific tests.

    • Develop and/or test applications in Windows, Linux, and macOS at the same time, on the same computer. You can link them together in a customizable internal network if desired.

    For developers, the use of virtual machines offers some of the basic version control features of git but applied to operating systems rather than files or projects.

    Qubes

    Qubesopen in new window is a free and open-source security-oriented operating system meant for single-user desktop computing. Qubes OS leverages xen-based virtualization to allow for the creation and management of isolated virtual machines (VMs) called qubes. This is valuable for users of high security software like Wasabi Wallet, and especially useful for testers of cutting edge developer branches. There is a separation of the virtual machines running Wasabi on testnet, and those running on mainnet with valuable private keys. If a reviewer compiles a malicious developer branch, then his mainnet private keys are secure in a different qube.

    This is a step-by-step guide on how to properly compile Wasabi Wallet from source in independent qubes. For tutorials on how to downloadopen in new window and installopen in new window Qubes, please see their exhaustive documentation.

    Generate Template VM

    The dependencies to compile Wasabi from source will be downloaded and installed in a new template VM, which is generated by cloning the Debian template from the dom0 terminal.

    [user@dom0 ~]$ qvm-clone debian-12-xfce template-wasabi
    @@ -59,6 +59,6 @@
     your@vm:~$ git checkout <development branch>
     

    Pull the latest commits.

    your@vm:~$ git pull
     

    If you are comfortable with Gitopen in new window, you can now have several versions of Wasabi running for testing purposes, at the same time, on the same computer.

    Install Latest Package

    Alternatively, you can also install the package in a new VM. This is a stable version suitable to use on mainnet and is separated from the development VM. There are no additional dependencies required to run this version.

    Download, verify and install the latest Wasabi-2.0.8.1 package in your VM, then start Wasabi.

    Have fun, and please consider contributing to the Wasabi project!

    - + diff --git a/using-wasabi/index.html b/using-wasabi/index.html index 05cfa2a67..d946726ed 100644 --- a/using-wasabi/index.html +++ b/using-wasabi/index.html @@ -27,11 +27,11 @@ Using Wasabi | Wasabi Docs - - + +
    - + diff --git a/why-wasabi/AddressReuse.html b/why-wasabi/AddressReuse.html index b1934edb5..5323f3bd2 100644 --- a/why-wasabi/AddressReuse.html +++ b/why-wasabi/AddressReuse.html @@ -27,11 +27,11 @@ Address Reuse | Wasabi Docs - - + +

    Address Reuse

    The first rule of Bitcoin privacy:

    Never reuse addresses!

    The second rule of Bitcoin privacy:

    NEVER reuse addresses!!


    Problem

    Easy wallet clustering

    If an address is used more than once, it means that the same private key can spend all its coins. It is very easy to find all the UTXOs of an address, and thus to find out how many bitcoin the private key holds.

    Further, in a transaction where one output has a reused address, then it is very likely that this output is the payment destination, and not the change. Most wallets automatically generate new change addresses for every transaction, but payment addresses are selected manually by the user.

    Read more about the privacy concerns of address reuse in the separate entryopen in new window and the privacy chapteropen in new window of the Bitcoin wiki.

    There are different types of address reuse:

    Publicly advertised addresses (donations)

    Here, a person publishes a single address to a public forum, like in the bio of a social media network or on a website, and anyone can send bitcoin to this address.

    Dusting

    With a forced address reuse attackopen in new window, an attacker sends a small amount of bitcoin to an already existing address. The attacker hopes that this dust coin is consolidated with another coin, thus linking the two in a cluster.

    Intentionally malicious

    Since Wasabi is libre and open-source, anyone can modify a fork of Wasabi to make sure the same two addresses are recycled in every CoinJoin registration. This is someone intentionally deanonymizing himself, and he might have quite dubious motives.

    Wasabi's Solution

    Remove used address from GUI

    Wasabi encourages the user to not reuse addresses. You always get a new Bitcoin address whenever you generate one. Previously generated addresses, which haven't received bitcoin yet, are displayed at Addresses Awaiting Payment. An address is automatically removed from the Addresses Awaiting Payment list once that address receives funds.

    To protect against forced address reuse attack (Dusting), Wasabi has a modifiable dust limit, where the wallet does not show coins below a certain threshold value.

    - + diff --git a/why-wasabi/Coins.html b/why-wasabi/Coins.html index a9d301d63..9d60ad290 100644 --- a/why-wasabi/Coins.html +++ b/why-wasabi/Coins.html @@ -27,8 +27,8 @@ Coins | Wasabi Docs - - + +

    Coins

    Bitcoin has an accounting model of unspent transaction output [UTXO]open in new window. A transaction has inputs: the coins that are being spent, and outputs: the corresponding newly created coins (unspent). The input of a transaction has to be an unspent output of a previous transaction. Each UTXO is the tip of the chain of links between inputs and outputs, all the way back to a coinbase transactionopen in new window that pays the miner.


    Problem

    UTXOs are not fungible

    Each UTXO is a unique snowflake with a public transaction history. For example, when Alice sends a coin to Bob, then Bob does not just have any random UTXO, but he has specifically the coin that Alice has sent him. When Bob sends this coin to Charlie, then Charlie can check the history of the coin and see the transaction from Alice to Bob. But due to the pseudonymity of Bitcoin, he does not necessarily find out that Alice is involved.

    Further, when Alice has one non-private coin and one private coin, and she selects both of them as the inputs of a transaction, the linking of these two coins strongly suggests that the coin that was private also belongs to Alice. This means that coin consolidation can lead to an overall decrease in privacy, especially when using an automatic coin selection algorithm.

    Wasabi's Solution

    Manual coin labeling and selection

    Using Wasabi it is mandatory to label every receiving and destination address. This helps the user to know where their coins came from so that they can judge whether there are privacy concerns when sending a specific coin to a specific receiver. The default Send workflow uses the auto coin selection algorithm, which is based on the labeling system.

    Read more here.

    Change avoidance suggestion

    When sending bitcoin, the transaction might contain change (back to the sender). This can have privacy downsides as explained here. When sending in Wasabi the user will be shown with an option to avoid change by slightly increasing or decreasing the send amount in order to avoid change (if possible). There is a shield icon shown at the Preview Transaction screen at the top right corner which displays the options when hovering over with the cursor.

    Heuristics identifying change

    One prime goal of transaction surveillance companies is to identify the change coin of a Bitcoin transaction, as this is vital information for building a cluster of coins belonging to one entity. There are several heuristics, practical assumptions which are not guaranteed to be accurate or optimal, that are used to deanonymize users:

    Address reuse

    When several coins have the same address, then they are owned by the same entity. Thus if a transaction has a reused address in the output, it is very likely to be the payment amount from one entity to another. Thus the other output of this transaction is likely to be the change of the entity providing the inputs of the transaction.

    Remember

    Never reuse addresses!

    Wallet fingerprinting

    Different software wallets have different methods of creating Bitcoin transactions. So if it is known that a transaction was created by a specific wallet, then it can be checked how this wallet handles change.

    Wasabi tries to build the most common form of transaction structure, thus reducing the likelihood of identifying any given transaction as being from Wasabi. However, Wasabi CoinJoins are very easily fingerprinted, and any coin associated is clearly managed with Wasabi Wallet.

    Round numbers

    When making a payment, then often the destination address receives a round number of bitcoin. Because the input is usually a non-round number, the other output will also be a non-round number. This makes it clear that the non-round number output is the change back to the sender.

    A [0.1293 0112 btc]  -->  B [0.0500 0000 btc]
    @@ -48,6 +48,6 @@
     A [1.3576 1516 btc]  -->  B [1.0135 6515 btc]
                               C [0.3440 4721 btc] (= change)
     
    - + diff --git a/why-wasabi/LegalConcern.html b/why-wasabi/LegalConcern.html index 3b7c3b9f7..790b8b853 100644 --- a/why-wasabi/LegalConcern.html +++ b/why-wasabi/LegalConcern.html @@ -27,11 +27,11 @@ CoinJoin Legal Concern | Wasabi Docs - - + +

    CoinJoin Legal Concern


    Using Bitcoin and other cryptocurrencies in the everyday course of businesses is becoming more and more popular. Digital money has a lot of advantages, from unstoppable transactions to relatively low fees, and quick final settlement of international payments. But all come at a price: the blockchain stores sensitive information like the amount and involved addresses of a transaction, giving away too much business-related information to the public. However, this does not necessarily need to be the case.

    Overview

    A CoinJoin transaction obfuscates the history of a given coin, making it hard to trace the coin back to the originator of the funds. The implementation of Wasabi Wallet CoinJoin allows the original user to get back his funds with an obfuscated history.

    It is often assumed that the main problem with an obfuscated transaction history is that financial regulators may have concerns about money laundering. However, this is only the first impression, if we go into the details it can become more transparent why institutions should not worry about violating AML rules and why companies could have a direct competitive advantage using CoinJoin transactions.

    With a transparent financial track record, companies paying with cryptocurrencies may find themselves in a squeezing situation, where their suppliers, clients, and competitors are aware of all of their payment steps and prices. For institutional investors, each step would be scrutinized by the market causing intentional or unintentional price manipulation.

    While the Bitcoin blockchain does not store personal information about the owners of the specific Bitcoin addresses, using metadata makes it possible to link Bitcoin addresses to certain companies and individuals. If such a link can be established, all past and future transactions can be traced.

    CoinJoin transactions

    Difference between ordinary banking and blockchain

    The ordinary banking system is closed, a very non-transparent system, where the data inside this system is hidden from outside observers. “Only” the bank and the user know the transactions made inside the system. In opposition, the blockchain is transparent and open to everyone. This means not only the “bank” (custodial service provider) but also outsider 3rd party observers are capable of tracking these transactions.

    Service providers' obligations regarding privacy

    There is no question a service provider who keeps a record of personal information needs to deal with the different privacy regulations and act according to them. In the ordinary banking system personal financial information is handled as a secret thus preserving individual privacy from third parties. Whereas in the open blockchain system this information by the nature of the technology cannot be kept secret, so there is a large risk of a privacy leak of sensitive financial information. This is obviously not intentional and even though the personal information might be protected, the financial information is nevertheless leaked due to the pseudonym nature of the system. This information has similar sensitivity as name, address, gender, etc. so it should be handled with great care.

    CoinJoin as a privacy-preserving tool

    Since the Bitcoin blockchain is transparent, transactions cannot be kept secret. Currently, one prevalent solution in Bitcoin to gain privacy is to CoinJoin the different coins to obfuscate their history. By the use of this tool, a custodial service provider can at least start to protect its users' financial privacy.

    Privacy perspective from the companies' point of view

    The essence of competitive advantages is to keep and hold business secrets. Each and every successful company has developed its own mechanism to deliver the best products and services to its customers. To reach this, they usually use a secret sauce, called the business secret to deliver the results. If anything, when a financial payment becomes fully transparent this business secret is evaporating Let’s look a bit deeper into what exactly this means for companies, who would like to use Bitcoin as the payment method, where all transactions are recorded on the blockchain.

    Suppliers

    Companies use suppliers to acquire products and services they use in their own production stages. For these products and services, of course, they pay a reasonable price. However, this price is usually negotiable, especially in B2B relationships or large scale orders. What would happen if all of a sudden, the price of raw materials for a company becomes fully public? Other competitors can now demand similar discounts, forcing industries into a vicious cycle of price reduction. As each and every price discount is negotiated on a case by case basis, considering factors as creditworthiness and timing of payment, transparent supplier prices would only cause enormous pressure on suppliers to deal with negotiations.

    Beyond the price of products, the timing of payments is also fully transparent on the blockchain. However, in certain circumstances, it is also a crucial business secret to keep the information on the sequence of invoice payments indoors. Considering cash flow implications, it can happen that one invoice is paid on time, while other invoices are still pending payment. In the case of blockchain transactions however all payments are transparent, so it can be clear for each counterparty that only a selected number of invoices has been paid even if the sufficient funds are available which can cause unnecessary tension between business partners.

    Additionally, if all historical transactions of a company are known, its creditworthiness might be considered incorrectly. It can happen that the creditworthiness is considered better than it is if the incoming funds to a specific address are extraordinarily high, but these funds are needed in other parts of the business, so the overall solvency of the business can be still negative despite the large funds. On the other hand, creditworthiness can be considered worse than it actually is, if only a handful of addresses are taken into consideration for the solvency analysis, neglecting other forms of wealth, like other Bitcoin addresses, or fiat accounts.

    Clients

    From the client’s perspective, the factors listed under suppliers are all applicable. If a client knows the revenue stream of the company, they can draw an incorrect conclusion about the actual financial situation of a company and make a decision of purchasing a product based on this assumed financial situation. If for example, there are no incoming funds for a given period, clients may stay away from purchasing products and services, solely because they might consider the company dormant or insolvent. But in reality, the seasonality of incoming funds is not disclosed for all companies, so it can be a perfectly stable business situation to receive incoming funds only in a given period of a year, while still being able to deliver service throughout the year.

    Another aspect is the possible price negotiations on the client-side. If a client finds out that another client is paying less for a service or product, they can demand similar discounts which can result in downward price pressure in the industry. This can ultimately result in companies going out of businesses if they cannot adjust to the lower price levels which are below the equilibrium prices.

    Competitors

    Everyone can agree that the pricing structure of services is a very sensitive topic and is the core of the business secret which makes a company successful. If all competitors can look at the transactions of the company, it also means they can adjust their own pricing structure to follow the successful market leaders in the industry, causing turbulence in competition. Each company has its own pricing structure which should be coming from the internal processes, know-how, and resources. Although external factors should be considered in pricing, they should not be the main driving force in pricing decisions.

    Employees

    There is now a growing number of companies that are paying their employees salaries in bitcoin due to the trustless transactions with relatively low fees, especially with international transactions.

    With transparent transaction history, employees would be aware of each other’s salaries without the company disclosing this information. Although there are some theories supporting a transparent salary structure, up to now the majority of the companies prefer to keep salaries as secret and obligate employees to keep salary and wage information confidential. Obfuscated transaction history can help companies to keep salary information confidential which can keep a relaxed atmosphere among employees with no wage pressures.

    Phishing attacks

    Disclosing financial information for a company makes them more vulnerable to phishing attacks. If the exact time and amount of payment are publicly known, attackers can use this information to build trust with the company and squeeze out other crucial business information pretending to be a trusted partner.

    Privacy perspective from the institutional investor’s point of view

    The Bitcoin market is considered fairly concentratedopen in new window in the sense that out of the millions of Bitcoin addresses, less than 1% holds 87% of bitcoins.

    Bitcoin address distribution

    Institutional investors and cryptocurrency exchanges are holding large sums of bitcoin on a blockchain where transactions are completely transparent. These so-called whales sometimes need to move large amounts of coins for any reason which can often lead to unintentional price manipulation. If a large bitcoin holding is on the move, it can always raise concern in the media regarding the future of Bitcoin, causing unnecessary price fluctuations. In the case of unintentional price manipulation, it is difficult to prove there has been no insider trading on the institutional side, which can cause loss of faith from the clients.

    Using obfuscated transaction history in large bitcoin transactions can help to keep the market stable and avoid unintentional price manipulations.

    Resolving AML conflicts

    Privacy is not just for criminals. One of the major critiques against using CoinJoin is that if the transaction history is not known for a company, it may be used as a way to launder money. From the above-listed cases, we already see that currently using fiat payments, during the normal course of businesses, companies do not disclose all financial information as that would result in a loss of business secrets. Why would they need to do this if they are just using a new method of payment, called Bitcoin? Using privacy tools to obfuscate Bitcoin transactions is completely legal and in accordance with the current legal framework.

    User privacy

    In all jurisdictions, there are different laws and acts that are made to protect customers privacy. This is not limited only to personal data but also financial data. In the EU there is GDPR, in the USA there is the Privacy Act of 1974, in Canada, there is the Privacy Act of 1985, etc. These set different rules to be kept in order to preserve individual privacy both on personal and financial levels.

    KYC/AML

    By now in mainly all jurisdictions, custodial cryptocurrency service providers (wallet, exchange, payment processor, etc.) are requested to run KYC/AML checks on users and their transactions. The KYC process and inner policies should ensure personal data protection. The accounts are assigned to these individual users, who are verified by the provider. This means the provider identifies the user just like a legacy bank would do. The different AML checks are run on deposits or withdrawals. The suspicious transactions can be linked to users based on the transactions that are initiated by them personally. KYC and AML procedures now ensure that all transactions involving fiat (like buying and selling bitcoin on exchanges for fiat currency) have a detailed background in terms of who is sending what money to whom, the identification of transactions are even more strict than in the current banking world, where two companies or individuals can send even large funds without the need to verify their source.

    Using CoinJoin as a custodial service provider

    As soon as a user deposits the funds to any of these service providers, the funds are in one large cluster. From now on the funds are possessed by the service provider and the actual user balances are only kept on internal records. At this point all KYC/AML procedures are done, funds should be considered “clean”. The funds are controlled by the service provider and different policies are set for securing these funds (hot and cold storage, multisig, etc.). The record system of the provider will show the exact value of funds belonging to the different users. This is the time when a provider could preserve its users’ privacy by applying CoinJoin on these funds. In case of a withdrawal, coinjoined UTXOs could be sent to the user. Again, this user is already KYC-ed, the provider has full knowledge about the user. In case of a law enforcement request, all data can be provided, since the deposit history of the user in question is still available. The only thing CoinJoin does, in this case, is protecting the user from third-party observers, while the service provider is still enabled to provide data for law enforcement if requested.

    Conclusion

    Companies using Bitcoin as a method of payment currently do not have sufficient privacy regarding their financial information. Outsiders can get valuable business-related information by studying the public transaction history of a company, causing economic damage in the long run. Using CoinJoin transactions can help businesses to keep their privacy while still enjoying the benefits that Bitcoin transactions can provide. Concerns from the AML perspective are not valid, as the necessary data can be provided to authorities upon investigation requests.

    - + diff --git a/why-wasabi/NetworkLevelPrivacy.html b/why-wasabi/NetworkLevelPrivacy.html index 1f14f867b..54a63e672 100644 --- a/why-wasabi/NetworkLevelPrivacy.html +++ b/why-wasabi/NetworkLevelPrivacy.html @@ -27,11 +27,11 @@ Network-Level Privacy | Wasabi Docs - - + +

    Network-Level Privacy - Bitcoin Core vs Wasabi Wallet

    Bitcoin is a peer-to-peer network of full nodes that define, verify, and enforce the Bitcoin consensus rules. There is a lot of communication between them and metadata can be used to de-anonymize Bitcoin users.

    Problem

    Clearnet light clients

    When the communication to the network is unencrypted over clearnet, then there is an easy correlation of the Bitcoin transactions to the IP address of the peer who sent it. The IP address can even be used to find the physical location of the user!

    A Bitcoin full node broadcasts not just the transactions of its user, but it also gossips all of the other transactions that it has received from its peers. Thus it is very difficult to find out which transactions originated from which full node. However, when a node or a wallet does not gossip all transactions, but only the transactions of its user, then it is easier to find out which node has sent those specific transactions.

    There are light wallets, which query a backend server to get information regarding specific addresses or use BIP 37open in new window bloom filtering SPV wallet protocol, which is extremely bad for privacyopen in new window. And there is Electrum, which sends your addressesopen in new window to random Electrum servers.

    DANGER

    When the user sends the extended public key or a filter of all the addresses to the central server, then the server can COMPLETELY deanonymize the users.

    Wasabi's solution

    Full node by default & block filters over Tor

    Wasabi checks if there is a local Tor instance installed, and if so, it uses this to onion-route all the traffic to and from the network. If Tor is not already installed, then it is accessed automatically from within Wasabi. This means that by default, all network communication is secured from outside snooping and the IP address is hidden.

    In order to fully verify everything, running a full node is essential. If bitcoindopen in new window is installed and run on the same computer as Wasabi, then it will automatically and by default connect to the full node. It is also possible to connect Wasabi to a remote full node on another computer by specifying the local IP address or Tor onion service in the settings. Then, Wasabi pulls the verified blocks and queries the mempool from the full node.

    Wasabi ships with Bitcoin Knots!

    Wasabi has a partial Bitcoin Knots integration. This means that it is possible (but not mandatory) to start Bitcoin Knots during the launch of Wasabi, without having to install or configure anything manually.

    However, even if no full node is installed, Wasabi has a light client mode based on BIP 158 block filtersopen in new window. The Wasabi server sends a filter of all the transactions in each block to all the users. Then, users check locally if the block contains any transactions with their addresses. If not, then the filter is stored for later reference, and no block is downloaded. However, if there is a user transaction in that block, then Wasabi connects to a random Bitcoin P2P node over Tor and asks for this entire block, not only one transaction. This block request is indistinguishable from the regular P2P gossip, and thus nobody, neither the server nor the full node, know which addresses belong to the user.

    Privacy by default!

    Wasabi has network-level privacy as good as a Bitcoin full node.

    In-depth comparison

    Furthermore, network-level privacy consists of two sub-categories.

    • Private UTXO Retrieval
    • Private Transaction Broadcasting

    Bitcoin Core

    Private UTXO retrieval

    Bitcoin Core downloads all the blocks ever created and establishes your wallet balances locally. This is as good as it gets.

    Private transaction broadcasting

    Bitcoin Core broadcasts transactions to other peers on the clearnet, unencrypted. Other peers cannot figure out which transaction originates from a specific node because Core does not only broadcast its own transactions but also propagates every other transaction that hits its mempool. However, some papers note it’s not bulletproof:

    Bitcoin transaction propagation does not hide the source of a transaction very well, especially against a “supernode” eavesdropper that forms a large number of outgoing connections to reachable nodes on the network. Dandelion: Privacy-Preserving Transaction Propagationopen in new window.

    Adversaries identified

    • Malicious Peer
    • Supernode

    Bitcoin Core + Tor

    You can use Bitcoin Core with Tor, which solves some of the above-mentioned issues. In this case, a supernode cannot track back transactions to your IP address.

    An entity that can break Tor is a universal adversary, however, most Tor attacks are not possible if exit nodes are not involved. It is reasonable to assume that this entity can break the onion routing, not Tor's encryption itself.

    Adversaries identified

    • Tor breaker

    Wasabi Wallet light node

    Private UTXO retrieval

    The backend server serves block filters to all the clients over Tor. From those filters, the clients figure out which blocks they are interested in and download them [and some false positive blocks] from peers. One block per peer, and always over a fresh Tor stream. When a block is acquired, the peer gets disconnected. Because of the end-to-end encryption of the onion network, it immediately defeats an ISP adversary and makes the already impossible job of the Sybil adversary even more impossible. The only adversary that could possibly overcome this would have to setup thousands of full nodes over Tor and also break Tor itself.

    Private transaction broadcasting

    All Wasabi traffic is tunneled through Tor. Wasabi connects only to onion nodes, so end-to-end encryption is enforced between the wallet and peers. All this without involving any exit node. Wasabi connects to each peer through a different Tor stream. A new Bitcoin peer is chosen for every transaction broadcast.

    Everything over Tor!

    Wasabi broadcast transactions to only one peer over Tor, and immediately after that the peer is disconnected.

    Adversaries identified

    • ISP
    • Tor Breaker Sybil Attacker With Thousands Of Full Nodes Over Onion

    Wasabi Wallet + full node

    TIP

    Wasabi has a partial Bitcoin Knots integration. This means that it is possible (but not mandatory) to start Bitcoin Knots during the launch of Wasabi, without having to install or configure anything manually.

    Private UTXO retrieval

    If you have a listening full node running in the background (not only Bitcoin Core, any full node) then Wasabi automatically picks it up and instead of asking peers for blocks, it asks for blocks from your own node. Using Wasabi this way results in the same privacy model as Bitcoin Core's, regarding Private UTXO Retrieval.

    Private transaction broadcasting

    Even when Wasabi is connected to your own node, it will broadcast the transaction in the above-described way: to one new peer over Tor.

    Universal Attacks

    Every time you use software that interacts with a Bitcoin network, and especially a Bitcoin node, you leave a sticky fingerprint in your traffic. It comes in the form of a small but unavoidable spike in volume every time a new block is mined and the nodes start gossiping about it. The blocks in Bitcoin are quite big, and the propagation speed is critical for consensus (greater delay means more frequent accidental forks), so such effect is predictable, and, in a sense, inherent to the Bitcoin architecture.

    Notably, the volume of block-related messages was drastically reduced since the introduction of Compact Block Relay (BIP 152open in new window. Instead of requesting whole blocks, mostly consisting of transactions already known to the node, the peer informed of a new block is only requesting the missing transactions. Yet the amount of extra communications in the seconds following a new block is still considerable. This effect may not be noticeable for a single block, but over time it gets statistically significant and may get exploited.

    As reported by Niko Kudriastev and Michael Maltsevopen in new window, it is possible to detect Bitcoin communications using nothing but traffic volume over time - a piece of information even most privacy concerned individuals are likely leaking to their law-abiding Internet Service Provider. In this case, using a VPN and running the node over Tor may not be enough to avoid being detected.

    Protection

    There are many ways to go about it, but staying completely undetected is far from trivial - traditional privacy-enhancing tools mostly focus on the packet level, which is orthogonal to the technique. Let’s break down the potential defense vectors.

    • VPN / Tor - unlikely to affect the time series shape much, and therefore for larger traffic lengths the statistical significance of block-related spikes will inevitably become overwhelming.

    • Traffic mixing - for traffic volumes that are orders of magnitude higher than Bitcoin P2P communications, mixing is likely to be very effective. That would, however, demand constant shielding of both upstream and downstream communications, and couldn't be done effectively by just running the node on a general-purpose machine - any noticeably long unshielded period may be enough for detection.

    • Being your own ISP - too spicy for most, but that should work.

    • Blockstream Satellite - the ultimate solution. Eliminates the traffic analysis threat altogether.

    Beyond active measures available now, both the privacy and the bandwidth efficiency of Bitcoin communications are actively worked on. It is entirely possible that the messaging protocol will get to the point where block propagation doesn't trigger any significant spikes in traffic volume.

    You can read more about BitSniff hereopen in new window and check the interactive demo hereopen in new window.

    Watch the videoopen in new window

    - + diff --git a/why-wasabi/TransactionGraph.html b/why-wasabi/TransactionGraph.html index f95ea7058..2b87c1df4 100644 --- a/why-wasabi/TransactionGraph.html +++ b/why-wasabi/TransactionGraph.html @@ -27,11 +27,11 @@ Transaction Graph | Wasabi Docs - - + +

    Transaction Graph

    Problem

    Public transaction history

    Because of the input and output model of Bitcoin, there is a chain of digital signatures all the way from the coinbase reward to the current UTXO. This transaction history can reveal sensitive information about the spending patterns of individuals. The receiver of a coin can look back into the transaction history of the sender. And the sender can see the future spending of the receiver.

    Wasabi's Solution

    WabiSabi coinjoins

    In order to obfuscate the link between inputs and outputs, Wasabi uses the WabiSabiopen in new window coinjoin protocol. The Wasabi central coordinator cannot steal and cannot spy, it simply helps many peers to build a huge transaction, with many inputs, and many outputs. The non-private inputs can be linked to their previous transaction history. However, the coinjoin outputs with an anonymity score cannot be tied to the inputs.

    This means that when sending an anonscore coin, the receiver does not know about the transaction history before the coinjoin. And when the receiver does a coinjoin himself, then the sender cannot spy on the later spending patterns. An outside observer can only guess the correct link at a rate of 1 in the anonscore, for example, 1-in-100, or 1%.

    - + diff --git a/why-wasabi/TransactionSurveillanceCompanies.html b/why-wasabi/TransactionSurveillanceCompanies.html index a6d5c61d0..59ccd72cf 100644 --- a/why-wasabi/TransactionSurveillanceCompanies.html +++ b/why-wasabi/TransactionSurveillanceCompanies.html @@ -27,11 +27,11 @@ Transaction Surveillance Companies | Wasabi Docs - - + +

    Transaction Surveillance Companies

    A transaction surveillance company is one that attempts to spy on bitcoin users. Their business model is usually to sell the data to any governments, corporations and individuals willing to pay for their services.

    Spying technology

    There are a number of techniques probably used by transaction surveillance companies:

    AML/KYC information

    Many bitcoin exchanges require users to undergo Anti-Money Laundering (AML) and Know-Your-Customer (KYC) checks, which requires users to reveal all kinds of invasive personal information such as their real name, residence, occupation, net worth and income. All this information is usually passed onto the exchange's partner transaction surveillance company, which keeps a database linking the victim's personal information with their bitcoin addresses and transactions.

    Blockchain analysis

    Bitcoin on-chain transactions are visible to all and so can be analyzed. Important techniques are the common-input-ownership heuristic and address reuse.

    Wallet synchronization analysis

    Bitcoin lightweight wallets often download their own history and balance by querying a third-party server. Transaction surveillance companies often try to exploit this to learn which addresses and transactions belong to certain wallets and IPs. The companies have been known to collect BIP 37open in new window filters from BIP37-enabled wallets. They almost-certainly also run many Electrum servers which can spy on any Electrum wallet that connects to them.

    Transaction broadcasting

    Surveillance companies have been known to sybil and eclipse attack the bitcoin network, and specific nodes, in order to try to find the source IP addresses of unconfirmed transactions.

    Criticisms

    Attempt to invade privacy

    The right to privacy is recognized as a human right, for instance in the US constitution, European Union regulations and the Constitution of India.

    Financial privacy is an essential criteria for the efficient operation of a free market: if you run a business, you cannot effectively set prices if your suppliers and customers can see all your transactions against your will. You cannot compete effectively if your competition is tracking your sales. Individually your informational leverage is lost in your private dealings if you don't have privacy over your accounts: if you pay your landlord in Bitcoin without enough privacy in place, your landlord will see when you've received a pay raise and can hit you up for more rent.

    Financial privacy is essential for personal safety: if thieves can see your income, holdings, and spending, they can use that information to target and exploit you. Without privacy, malicious parties have more ability to steal your identity, snatch your packages from your doorstep, or impersonate businesses you transact with. They also know exactly how much to try to scam you for.

    Financial privacy is essential for human dignity: no one wants the snotty barista at the coffee shop or their nosy neighbors commenting on their income or spending habits. No one wants their baby-crazy in-laws asking why they're buying contraception (or sex toys). Your employer has no business knowing what church you donate to. Only in a perfectly enlightened discrimination-free world where no one has undue authority over anyone else could we retain our dignity and make our lawful transactions freely without self-censorship if we don't have privacy.

    Most importantly, financial privacy isn't incompatible with things like law enforcement or transparency. You can always keep records, be ordered (or volunteer) to provide them to whomever, have judges hold against your interest when you can't produce records (as is the case today). None of this requires globally visible public records.

    Globally visible public records in finance are completely unheard-of. They are undesirable and arguably intolerable. The Bitcoin whitepaper made a promise of how we could get around the visibility of the ledger with pseudonymous addresses, but the ecosystem has broken that promise in a bunch of places and we ought to fix it. Bitcoin could have coded your name or IP address into every transaction. It didn't. The whitepaper even has a section on privacy. Sufficient privacy is an essential prerequisite for a viable digital currency.

    Attempt to destroy fungibility

    Privacy invasions can lead to damaging or destroying bitcoin fungibility. The aim of bitcoin is to be a decentralized digital currency, but if all users are eventually required to consult centralized blacklists before accepting bitcoin, then its decentralization will be destroyed.

    How is financial privacy an essential element to fungibility in Bitcoin?

    No mechanism for oversight or appeal

    There appears to be no recourse for someone affected by false positive identification of exchange-disapproved transaction history. This could result in them wrongly having their coins confiscated.

    Jurisdiction

    Transaction surveillance company market themselves as a tool for finding "bad guys", but it's unclear which jurisdiction that applies to. For example, could one day the government of China pressure those companies into marking certain coins as "bad" because they belong to users who disagree with Chinese government policy?

    Incentivized to oppose bitcoin updates

    During the deployment of segregated witness, certain transaction surveillance companies were believed to have spread misinformation about it, because the update enables Lightning Network. The companies saw it as a threat to their business, since it can enable transacting with bitcoin more privately.

    Oversold effectiveness

    Transaction surveillance companies rely on heuristics or assumptions when analyzing the blockchain. These heuristics are sometimes not true, for example, the common-input-ownership heuristic is broken by CoinJoin. Even if that heuristic is true, it still requires actually identifying the cluster, which is not always possible.

    Laws surrounding anti-money-laundering typically require businesses to make reasonable efforts to investigate the source of funds. Usually, the transaction surveillance company's customers simply want to legally protect themselves, regardless of whether the surveillance actually works. There is a lot of money in this space from governments and other authorities, who usually don't understand the underlying technology and are happy to throw money at several startups who claim to be able to accurately track everything. Whether the activities of transaction surveillance companies actually help against money laundering is an open question.

    image

    According to an excerpt from Chainalysis in their 2021 reportopen in new window, in 2019, criminal activity represented only 2.1% of all cryptocurrency transaction volume.

    Examples

    - + diff --git a/why-wasabi/WhyFinancialPrivacy.html b/why-wasabi/WhyFinancialPrivacy.html index 27c9325f3..e9615fe84 100644 --- a/why-wasabi/WhyFinancialPrivacy.html +++ b/why-wasabi/WhyFinancialPrivacy.html @@ -27,11 +27,11 @@ Why Financial Privacy is Especially Important | Wasabi Docs - - + +

    Why Financial Privacy is Especially Important

    The possibility to be anonymous or pseudonymous relies on you not revealing any identifying information about yourself in connection with the bitcoin addresses you use. If you post your bitcoin address on the web, then you're associating that address and any transactions with it with the name you posted under. If you posted under a handle that you haven't associated with your real identity, then you're still pseudonymous. For greater privacy, it's best to use bitcoin addresses only once.

    By Satoshi Nakamoto in How anonymous are bitcoins? - Bitcointalkopen in new window

    Gaining privacy with Wasabi Wallet for Bitcoin transactions


    Why it is important to keep your funds private

    One of the apparent contradictions of Bitcoin is the notion that your transactions can be private but have a public transaction record.

    As a financial system, Bitcoin functions completely differently from the established banking network. Bitcoin allows you to store funds yourself, without the need for a third party and therefore places the burden on you of keeping said funds secure and accessible.

    While opening an account with a traditional bank or other financial institution requires significant cost and effort, creating a Bitcoin wallet is quick and easy to do on your home computer. This speedy process makes it possible to create hundreds of separate wallets if you wish.

    Two aspects —in particular privacy and identity— function very differently with Bitcoin than in the legacy financial system.

    Pseudonyms protect your identity in Bitcoin

    A bank account, PayPal account, or credit card is always tied to a real identity, making it difficult for many people to open one. Bitcoin doesn't require any identity to be part of this network.

    Being able to use the internet anonymously or pseudonymously is the only way for many people to truly be themselves. Hundreds of millions of people around the globe are not accepted in their societies for reasons they cannot control.

    Maintaining an identity with a large following might require paid services such as blogs, logo designs, stock photos, VPNs, or translations. Without the ability to pay for these services anonymously, you would be forced to reveal your true identity in order to maintain your pseudonym situation. This clearly makes no sense and has potentially dangerous ramifications.

    How Bitcoin empowers anonymity

    Bitcoin is an important, empowering technology. Using Bitcoin protects your right to remain anonymous on the internet. It allows anonymous or pseudonymous fundraising. Groups can collectively control Bitcoin accounts and choose to either hide or reveal financial information at will.

    There are many positive reasons for a private and secure banking system like Bitcoin.

    For example, a workers' rights group could raise funds with Bitcoin. The money could be used for servers, flyers, remote helpers… and all without tying any transaction to the real identities of the volunteers.

    Likewise, a domestic abuse victim might use Bitcoin to securely stack away funds to prepare for an independent life.

    Privacy through pseudonymous accounts

    Privacy in traditional banking is guaranteed by the institutions that make up the system, such as banks, credit card companies, and governments. They (try to) ensure that your bank balance stays a secret. This puts them in a powerful position, where only they have complete oversight as to what is going on.

    In the Bitcoin ecosystem, everyone can see the history and balance of every address, but they cannot necessarily see who controls it. All addresses and transactions are recorded in Bitcoin's publicly distributed database, the blockchain. The addresses do not have names or IP addresses attached to them, so it is not always possible to know which transaction belongs to which individual.

    Threat model

    When considering privacy you need to think about exactly who you're hiding from. You must examine how a hypothetical adversary could spy on you, what kind of information is most important to you and which technology you need to use to protect your privacy. The kind of behaviour needed to protect your privacy therefore depends on your threat model.

    Newcomers to privacy often think that they can simply download some software and all their privacy concerns will be solved. This is not so. Privacy requires a change in behaviour, however slight. For example, imagine if you had a perfectly private internet where who you're communicating with and what you say are completely private. You could still use this to communicate with a social media website to write your real name, upload a selfie and talk about what you're doing right now. Anybody on the internet could view that information so your privacy would be ruined even though you were using perfectly private technology.

    For details read the talk Opsec for Hackers by grugqopen in new window. The talk is aimed mostly at political activists who need privacy from governments, but the advice generally applies to all of us.

    Most of the time plausible deniability is not good enough because lots of spying methods only need to work on a statistical level (e.g. targeted advertising).

    - + diff --git a/why-wasabi/WhyPrivacyImportant.html b/why-wasabi/WhyPrivacyImportant.html index 35fddb949..43e104fca 100644 --- a/why-wasabi/WhyPrivacyImportant.html +++ b/why-wasabi/WhyPrivacyImportant.html @@ -27,11 +27,11 @@ Why Privacy is Important | Wasabi Docs - - + +

    Why Privacy is Important

    It's not that I have something to hide. It's that I have nothing to share.

    Privacy is the selective revealing of your Self to your peers. You have many thoughts in your mind which you choose to never tell anyone, and many of your actions are never witnessed by another person. The ability to keep a secret is an essential part of the human experience.

    • Why do you draw the curtains at night?
    • Why do you close the door when in the shower?
    • Why do you send your love letters only to your spouse?

    Watch the videoopen in new window

    Economic trade of goods and services is based on mutual beneficial voluntary action. But when an outside authority demands that the peers reveal the details of their exchange, then they must beg for permission of every act. Yet individuals can use the tools of self-defense at their disposal to regain their sovereignty.

    Without financial privacy, there is no human dignity.

    Privacy? I don't have anything to hide

    Over the last 16 months, as I've debated this issue around the world, every single time somebody has said to me, "I don't really worry about invasions of privacy because I don't have anything to hide." I always say the same thing to them. I get out a pen, I write down my email address. I say, "Here's my email address. What I want you to do when you get home is email me the passwords to all of your email accounts, not just the nice, respectable work one in your name, but all of them, because I want to be able to just troll through what it is you're doing online, read what I want to read and publish whatever I find interesting. After all, if you're not a bad person, if you're doing nothing wrong, you should have nothing to hide." Not a single person has taken me up on that offer. - Glenn Greenwald in Why privacy matters - TED Talkopen in new window

    The primary reason for window curtains in our house, is to stop people from being able to see in. The reason we don’t want them to see in is because we consider much of what we do inside our homes to be private. Whether that be having dinner at the table, watching a movie with your kids, or even engaging in intimate or sexual acts with your partner. None of these things are illegal by any means but even knowing this, we still keep the curtains and blinds on our windows. We clearly have this strong desire for privacy when it comes to our personal life and the public. - Joshua in The Crypto Paperopen in new window

    Read also

    Quotes

    Arguing that you don't care about the right to privacy because you have nothing to hide is no different than saying you don't care about free speech because you have nothing to say. - Edward Snowden on Redditopen in new window

    The NSA has built an infrastructure that allows it to intercept almost everything. With this capability, the vast majority of human communications are automatically ingested without targeting. If I wanted to see your emails or your wife's phone, all I have to do is use intercepts. I can get your emails, passwords, phone records, credit cards. I don't want to live in a society that does these sort of things... I do not want to live in a world where everything I do and say is recorded. That is not something I am willing to support or live under. - Edward Snowden in The Guardianopen in new window

    We all need places where we can go to explore without the judgmental eyes of other people being cast upon us, only in a realm where we're not being watched can we really test the limits of who we want to be. It's really in the private realm where dissent, creativity and personal exploration lie. - Glenn Greenwald in Huffington Postopen in new window

    - + diff --git a/why-wasabi/index.html b/why-wasabi/index.html index f3bf49426..9f0bcae22 100644 --- a/why-wasabi/index.html +++ b/why-wasabi/index.html @@ -27,11 +27,11 @@ Why Wasabi | Wasabi Docs - - + + - +