Privacy and Bitcoin: Legal Boundaries, Economic Realities, and the Illusion of Technical Obfuscation
Why scaling and multiplicity of small transactions provide lawful privacy, and why mechanisms like CoinJoin and Taproot do not deliver the claimed protections
Keywords
Bitcoin, Privacy, Economics, Law, Scaling, CoinJoin, Taproot, Surveillance, Regulation, Traceability, Financial Law, Compliance
Thesis Statement
Privacy in Bitcoin is best achieved not through artificial obfuscation mechanisms like CoinJoin, Taproot, or similar cryptographic constructs, but through the lawful, economic scaling of transactions into many small, independent payments. From both an economic and legal standpoint, mandated transparency renders complex mixing or aggregation counterproductive—large CoinJoin-type transactions in fact create targets rather than protect users. True privacy comes from scale: the generation of large volumes of independent notes and transactions that blend into ordinary economic activity, making individual payments statistically insignificant and legally compliant while avoiding the spotlight of artificial anonymity.
I. Introduction: Framing Privacy in Digital Cash
Privacy as a Legal Right and Economic Necessity
Privacy in markets has always occupied a peculiar dual role. On one hand, it is recognised in law as an extension of individual autonomy: the right to transact without unwarranted intrusion, to control disclosure of financial information, and to safeguard one’s dealings from unjustified surveillance. On the other, privacy functions as an economic necessity, ensuring that trade can occur without exposing participants to strategic disadvantage, exploitation, or reputational harm. Merchants have long known that confidentiality around suppliers and volumes prevents competitors from undermining their business; consumers have valued discretion in their purchases not as a means of concealment of illegality, but as a normal condition of dignity and choice. Privacy therefore is not a by-product of trade—it is integral to the functioning of markets themselves.
Bitcoin as Digital Cash
Bitcoin, when considered in its original design, is a lawful digital cash system. Transactions are standardised, auditable, and permanently recorded on a public ledger, yet they retain the character of small notes and coins exchanged between individuals. Each transaction is valid in isolation, and each can be verified without reference to hidden channels or secret agreements. This balance between transparency of settlement and privacy of individual choice is central. It ensures that the system supports accountability—every valid payment leaves an indelible trail of proof—while avoiding the necessity for intrusive intermediaries to monitor each individual act of commerce. Bitcoin thereby achieves a model familiar from physical cash: lawful use under a legal system, with privacy generated not through secrecy but through the ordinary scale of economic activity.
Scaling Versus Contrived Obfuscation
This lawful privacy stands in sharp contrast to approaches pursued by BTC advocates, who often confuse opacity with protection. Mechanisms such as CoinJoin, Taproot, and other mixer-style constructs attempt to deliver anonymity through artificial aggregation or cryptographic obfuscation. Yet such mechanisms are not only conspicuous but also economically unsound. A large CoinJoin transaction is readily visible to chain analysis: its size, pattern, and structure mark it out immediately for scrutiny. Taproot, meanwhile, at best conceals script complexity but does nothing to shield transaction flows from regulatory mandates or forensic analytics. These contrived methods create the very opposite of privacy: they flag transactions for attention, invite regulatory suspicion, and, by deviating from standard forms, announce themselves as anomalies.
The alternative is scaling. By enabling thousands, then millions, of small, ordinary transactions per second, Bitcoin achieves what physical commerce has always known: privacy emerges from multiplicity. Just as no one scrutinises every coin in circulation, no observer can practically or economically isolate a single payment when it is one of millions of lawful notes moving through the system. Scale, not contrivance, is the true source of privacy in digital cash.
Preview of the Argument
This essay will argue, from both economic and legal perspectives, that privacy in Bitcoin cannot and should not be sought through artificial opacity. Lawful privacy arises from the ordinary operation of markets at scale: many small, standard transactions, each individually valid and compliant, together producing a level of indistinguishability that resists targeting without creating suspicion. In subsequent sections, we will explore the legal principles governing financial privacy, the economic logic of scale as a privacy mechanism, and the inadequacy of CoinJoin, Taproot, and similar constructs. The conclusion will emphasise that lawful privacy is not secrecy but ordinariness—and that scaling, not obfuscation, is the path forward for Bitcoin as digital cash.
II. Legal Foundations of Privacy and Transparency
Defining the Terms: Privacy, Anonymity, Secrecy
At the outset it is crucial to separate three terms that are often used interchangeably but which have distinct meanings in both law and economics. Privacy denotes the ability of individuals to conduct their affairs without unwarranted intrusion, within the boundaries of the law. It is the condition of not having every purchase, payment, or transaction exposed to outsiders. Anonymity, in contrast, refers to the concealment of identity altogether. Where privacy allows lawful choice within a traceable framework, anonymity attempts to strip all attribution. Secrecy is still more absolute: it is the deliberate suppression of information so that even the fact of a transaction or relationship may be hidden. Legal systems generally uphold privacy, tolerate limited anonymity in constrained contexts, but consistently reject secrecy as a basis for financial exchange.
Traceability in Economic Law
The modern framework of financial law rests on traceability. Transactions are expected to leave records that can be followed, whether through banks, payment processors, or audit trails. Principles such as Know Your Customer (KYC) and Anti-Money Laundering (AML) regulations require financial intermediaries to identify participants and maintain transaction records. Similarly, reporting standards oblige institutions to produce declarations of suspicious activity, large transactions, or cross-border flows. These obligations reflect a basic economic reality: legitimate commerce can be traced, even if individuals enjoy privacy in their choices. Privacy does not contradict transparency; rather, it exists within the architecture of accountability.
Regulatory Realities: Mandated Tracing
In practice, governments retain the power to compel disclosure. Courts can issue subpoenas, financial regulators can impose reporting duties, and law enforcement can demand production of records under statutory authority. Global frameworks such as the Financial Action Task Force (FATF) create harmonised expectations across jurisdictions. For this reason, any technical mechanism that promises “absolute anonymity” is both untenable and counterproductive: once regulators discover an untraceable cluster, they will target it specifically. Ironically, the more elaborate the obfuscation—such as in large CoinJoin transactions—the easier it becomes for authorities to detect and flag them. By contrast, ordinary standardised transactions blend into the natural flow of commerce, meeting legal requirements without drawing attention.
Implications for Bitcoin and Digital Cash
The consequence is clear: anything “untraceable” inevitably stands out. A cluster of anonymised or secret transactions signals itself as anomalous, inviting scrutiny. Far from creating privacy, it acts as a beacon. By contrast, lawful privacy arises when high volumes of ordinary transactions occur at scale, making any single payment indistinguishable within the crowd. This is why scaling is the legal and economic route to privacy in Bitcoin: millions of small, standardised transactions provide the statistical fog necessary for individual discretion while preserving transparency for the system as a whole.
In effect, privacy in digital cash is not the absence of law or traceability but the presence of lawful, routine, high-volume activity. It is the same principle that has always governed physical money: the ordinary circulation of many small notes creates privacy, whereas secrecy or contrived anonymity collapses under legal and economic reality. The sections that follow will build on this foundation, demonstrating why scaling achieves this balance while methods like CoinJoin and Taproot do not.Subscribe
III. Economic Theory of Privacy Through Scale
Indistinguishability in Large Populations
Privacy, when analysed through the lens of economics, is best understood as indistinguishability within a sufficiently large set. In statistics this is often expressed as the size of the anonymity set: the more individuals or transactions within a given pool, the harder it becomes to isolate and identify one specific participant. A lone transaction, or a handful of transactions, stands out immediately. A million routine, standardised transactions, by contrast, provide cover through sheer volume. The principle here is not secrecy but blending—the ability for any one transaction to dissolve into the background flow of commerce.
In digital cash systems such as Bitcoin, indistinguishability arises not from hiding or encrypting transactions, but from producing so many standard notes that the observer cannot meaningfully single out one from another. Scale, therefore, becomes the central economic input to privacy.
Statistical Fog Through Many Small Transactions
If one large transfer dominates a ledger, it becomes conspicuous. Observers can infer significance and target scrutiny accordingly. However, when a payment is broken into many smaller notes, each within ordinary bounds, the resulting set generates what may be described as statistical fog. Each note is lawful, auditable, and valid, yet none of them reveals the full story on its own. Instead of producing a beacon for analysis, the payer has scattered dozens or hundreds of perfectly ordinary fragments that blend into the fabric of daily trade.
The analogy to cash is straightforward. A single suitcase of notes attracts attention; hundreds of small bills circulating through tills and wallets go unnoticed. In the digital setting, the same economic logic applies: privacy emerges not from secrecy, but from dispersal.
Market Analogy: Large Trades Versus Continuous Small Trades
Financial markets illustrate this principle with clarity. A large, sudden block trade is noticed immediately; its size affects prices, liquidity, and may even attract regulatory inquiry. By contrast, the same position can be acquired gradually through a sequence of smaller trades spread across time. These smaller trades preserve informational privacy, preventing others from front-running or distorting the market in anticipation of the large order. The lesson is that scale and distribution protect privacy by smoothing visibility, rather than by attempting to erase the record.
The same applies in Bitcoin. A single large transaction is a signal. A thousand small ones, distributed over varying times and amounts, are economic noise. Observers cannot easily distinguish which note matters, and in that indistinguishability lies functional privacy.
Privacy as an Emergent Property of Scaling
Crucially, privacy in Bitcoin is not an input—it is an output of scale. It does not come from adding cryptographic masks, nor from devising opaque scripts. Instead, it emerges naturally when transaction throughput reaches a level where individual payments lose their uniqueness. Each note is ordinary; each resembles countless others. Together, they create a market environment where attempting to isolate one payment becomes prohibitively costly and operationally unworkable.
In this sense, transaction throughput is the foundation of privacy. The more the system scales, the more private it becomes—not by removing transparency, but by making transparency impractical for granular tracking. Just as economists recognise diminishing returns to information when datasets grow beyond meaningful human comprehension, so too in Bitcoin privacy is achieved by ensuring the dataset of standard transactions is so vast that one note is simply one among millions.
Summary: Privacy is best understood economically as indistinguishability within a large population. By splitting payments into many small, lawful transactions, Bitcoin produces statistical fog that frustrates analysis while retaining full auditability. The market analogy reinforces this: large trades are conspicuous, small ones preserve informational advantage. Ultimately, privacy emerges from scaling, not secrecy—an emergent property of transaction throughput rather than a feature bolted on through obfuscation.
IV. BTC, Taproot, and CoinJoin: The Fallacy of Obfuscation
BTC’s Structural Limitation: Scale Denied
At the heart of the problem lies BTC’s deliberate and artificial restriction: the one-megabyte block size cap, yielding no more than about seven transactions per second globally. This is not an inherent limitation of Bitcoin as designed, but a governance choice by BTC custodians to maintain scarcity of throughput. The result is predictable. With only a handful of transactions processed each second, BTC cannot generate the statistical fog that privacy depends upon. Instead of many millions of small payments creating indistinguishability, BTC yields a narrow, easily observable stream. In such a constrained channel, every large payment is conspicuous, every cluster of activity identifiable, and the idea of privacy by scale is mathematically impossible.
This scarcity transforms privacy from an emergent property into an unattainable goal. Observers can scrutinise each transaction in the queue, track patterns without difficulty, and attribute behaviours far more effectively than in a system that scales. Thus, BTC’s refusal to scale precludes any hope of lawful, ordinary privacy.
Taproot: Cosmetic Concealment, Not Privacy
BTC proponents have heralded Taproot as a privacy breakthrough. Its function is to compress and simplify complex scripts so that multi-signature conditions or branching logics appear uniform on-chain. In marketing language, this is called “hiding contract complexity.” In reality, Taproot does not prevent transaction flows from being traced; it merely changes how output scripts are represented. Surveillance firms and regulators can still follow coins from input to output, regardless of whether the script path is masked.
Moreover, Taproot fails the legal test. Regulators are not concerned with whether a contract had one branch or ten—they are concerned with whether funds can be traced to origin and destination. When mandated disclosure is imposed, Taproot’s script-masking becomes irrelevant: counterparties must still reveal keys and flows, and auditors can easily verify them against the public chain. At best, Taproot conceals trivia; at worst, it creates a false sense of protection that lures users into thinking privacy has been achieved when nothing material has changed.
CoinJoin: A Beacon, Not a Shield
If Taproot is cosmetic, CoinJoin is conspicuous. CoinJoin seeks to aggregate multiple participants’ transactions into a single large transaction with many inputs and many outputs, claiming to confuse observers. In practice, this structure is instantly recognisable. A CoinJoin cluster is a large, irregular footprint on the chain—its pattern so distinct that surveillance tools flag it immediately. Rather than hiding participants, it groups them together in a glowing circle for investigators to study.
From a legal perspective, CoinJoin fails outright. Regulators demand ordinary commerce to be straightforward, auditable, and compliant. A CoinJoin transaction, by design, is none of these: it obscures ownership linkages, making lawful audit impossible without extraordinary measures. Far from being defensible, it stands out as a red flag for suspicion. Governments can and will mandate that such structures be reported, traced, or outlawed, precisely because they undermine the principle of transparent traceability.
Economically, CoinJoin also backfires. In theory, it enlarges the anonymity set; in practice, it reduces plausible deniability. By herding multiple users into one visible batch, it narrows the investigative field: anyone analysing the transaction knows with certainty that the true counterparties are within this small group. In contrast, a payment broken into thousands of ordinary notes disappears into a sea of millions, vastly enlarging the effective anonymity set. CoinJoin achieves the opposite of what it promises: it concentrates attention rather than dispersing it.
Why Obfuscation Is Indefensible in Law
The law recognises the right to privacy but simultaneously imposes obligations of traceability. Mechanisms like CoinJoin and Taproot aim to circumvent these obligations. Yet the more they succeed in blurring transparency, the more visible they become as anomalies. Courts and regulators interpret such anomalies as deliberate concealment—a hallmark of secrecy, not privacy. In compliance terms, this places users and service providers at risk of sanction. A company facilitating CoinJoin transactions cannot credibly claim to be supporting lawful commerce; it is, by design, facilitating concealment. Taproot likewise cannot be defended as a privacy tool in regulatory hearings: its superficial obfuscation does not withstand the demand for underlying records.
Why Obfuscation Fails in Economics
From an economic perspective, obfuscation strategies distort the transaction landscape instead of normalising it. Privacy in markets derives from the abundance of ordinary actions. CoinJoin, by aggregating many users into one transaction, eliminates that ordinariness and produces an unmistakable shape. Taproot, by flattening scripts, conceals detail but not substance, leaving the essential transaction still exposed. Both approaches reduce, rather than increase, plausible deniability. The rational economic actor does not wish to be spotlighted as a user of suspicious constructs; he wishes to blend into the stream of normal payments.
Thus, aggregation through CoinJoin shrinks the anonymity set to a visible pool, while Taproot masks nothing that regulators care about. Both approaches collapse under the weight of legal scrutiny and economic logic. The true path to privacy remains scaling: millions of lawful, small, independent transactions that together create a fog of indistinguishability without ever departing from legal standards of traceability and auditability.
Summary: BTC’s refusal to scale, combined with its reliance on Taproot and CoinJoin as supposed privacy solutions, produces only conspicuous anomalies. Legally indefensible and economically unsound, these mechanisms fail to deliver privacy and instead invite scrutiny. Genuine privacy comes not from obfuscation but from scale—lawful, auditable, high-volume activity that renders each payment indistinguishable from countless others.
V. Legal Traceability and Government Mandates
Mechanisms of Regulatory Disclosure
Financial regulators possess a wide arsenal of tools to compel disclosure. At the domestic level, subpoenas and court orders can require banks, payment processors, and other intermediaries to release records of transactions and account details. At the systemic level, reporting frameworks impose continuous obligations: large cash transaction reports, suspicious activity reports, and routine audits of financial flows. Internationally, organisations such as the Financial Action Task Force (FATF) establish guidelines that bind states into harmonised regimes of traceability. FATF’s “travel rule” compels exchanges and custodians to attach sender and recipient data to transfers, ensuring that cross-border transactions do not escape oversight. The effect is universal: any transaction that is legally recognised within financial markets is subject to potential traceability when demanded by competent authority.
CoinJoin and Taproot Under Legal Scrutiny
Against this backdrop, technical mechanisms such as CoinJoin and Taproot collapse under scrutiny. CoinJoin transactions, with their many inputs and outputs bundled together, are instantly recognisable on-chain. This very recognisability makes them trivial for regulators to target. Once flagged, compliance officers can be compelled to identify participants, and service providers facilitating CoinJoin may face allegations of operating unregistered mixing services—already prosecuted in multiple jurisdictions. Taproot fares no better: although marketed as privacy-enhancing, it merely obscures the script path, not the transaction flow. Regulators can mandate counterparties to reveal the true path, and blockchain analytics can still follow coins across addresses. Both constructs therefore offer no defence in law; instead, they serve as markers that highlight exactly where regulators should direct their attention.
Lawful Privacy Through Scale
By contrast, scaling transactions into many small, independent notes remains fully compliant with legal requirements. Each transaction is a standard payment—valid, auditable, and traceable if required. No additional cryptographic tricks or script anomalies are involved. From a compliance standpoint, nothing distinguishes a stream of many small transactions from ordinary commerce; indeed, this is precisely how cash has circulated for centuries. The payer retains privacy in practice because no single note conveys meaningful information, while regulators retain the capacity to trace flows when warranted. Law does not criminalise smallness: there is no statute against paying in coins or breaking a sum into many lawful notes. What law targets is deliberate concealment through non-standard obfuscation, not the lawful use of ordinary instruments at scale.
The Legal-Economic Argument
The central argument is straightforward: law does not criminalise ordinary behaviour, it criminalises contrivance. A system designed to generate lawful, routine, high-volume transactions provides both compliance and privacy. In contrast, constructs like CoinJoin and Taproot that seek to hide or disguise ownership flows violate the principle of traceability and therefore attract scrutiny. Economically, the outcome is equally stark: scaling fosters indistinguishability, while obfuscation shrinks the anonymity set into a visible cluster. Legally and economically aligned, scaling is the only path to privacy that can withstand regulatory mandates.
Summary: Governments will always retain the power to compel disclosure, and regulators have established frameworks—subpoenas, FATF guidelines, reporting standards—to enforce traceability. Techniques like CoinJoin and Taproot, far from securing privacy, become conspicuous anomalies that are easy to target. Privacy consistent with law emerges instead from scaling: many small, independent transactions that blend into ordinary flow, lawful in form and auditable when required. The law does not criminalise smallness—it criminalises obfuscation.
VI. Scaling as the Path to Lawful Privacy
Scale as the Foundation
The central truth of Bitcoin, understood as digital cash, is that scale itself produces privacy. Privacy is not delivered through gimmicks or obfuscation, but through the capacity to process millions of standard transactions per second, each lawful, each auditable, each ordinary. This is what BSV demonstrates: a system engineered to handle industrial throughput, enabling individuals and enterprises to transact in countless small notes that blur into the texture of everyday economic activity. Unlike BTC, where artificial scarcity restricts throughput and renders every transaction visible as a beacon, scaling provides the sheer numerical volume that makes any single payment statistically insignificant.
Notes as Independent Transactions
In a scaled Bitcoin system, each payment note is an independent, valid, and standard transaction. It adheres to existing script rules, pays standard outputs, and can be verified by any node. Crucially, this independence allows each note to be lawful and auditable on its own, but also private in aggregate because no external observer can meaningfully isolate one from the millions in flight. Privacy is thus generated by multiplicity, not secrecy. The payer need not hide anything; the system itself ensures that each note is drowned in the stream of lawful activity.
Analogy to the Cash Economy
The analogy to cash is instructive. Privacy in the cash economy has never depended on hiding banknotes. It arises from ordinary circulation: thousands of low-denomination bills exchanged daily across countless transactions. No one can track the path of every coin or every pound note, not because they are hidden, but because the scale of movement makes them indistinguishable. Similarly, in Bitcoin, lawful privacy comes from breaking totals into small, independent transactions that circulate as routine notes on the ledger. A ledger entry recording a two-pound payment is not remarkable; thousands of such entries recorded in seconds form a fog of ordinariness in which privacy flourishes.
Case Study: Alice Pays Bob £700
Consider an example. Alice wishes to pay Bob £700. Rather than create one large, conspicuous transaction, she splits the amount into hundreds of notes, each valued between £0.50 and £2.00. The negotiation of bounds is straightforward: Bob’s policy specifies minimum and maximum note sizes, and Alice complies. Using ECDH derivations scoped to the invoice, she and Bob generate a deterministic set of addresses. Alice then pays note by note, transmitting transactions directly IP-to-IP to Bob.
From Bob’s perspective, the receipt is ordinary: each note is a standard P2PKH output, valid and lawful, but spread across hundreds of unique addresses. From Alice’s perspective, the act is private: no outsider can easily link the scatter of small notes back to her or even identify that they belong to one unified payment. Each note is independently valid; each can be settled by either party; and the aggregate total is exactly £700.
Privacy by Lawful Multiplicity
This case illustrates the fundamental point: lawful privacy comes not from secrecy but from multiplicity. Alice’s payment is entirely compliant—each note can be traced and audited if regulators require—but practically private in the mass of other small payments flowing through the system. By embracing scaling, Bitcoin achieves what no amount of contrived obfuscation can: privacy as an emergent property of lawful, ordinary use.
Summary: Scaling is the path to lawful privacy. BSV demonstrates the capacity for millions of transactions per second, enabling individuals to pay in countless small notes. Each note is lawful and auditable, yet private because it blends into the statistical fog of mass activity. Just as privacy in cash arises from ordinary circulation, so too in Bitcoin it arises from scale. Alice’s £700 payment, broken into hundreds of small notes transmitted IP-to-IP, exemplifies how privacy can be secured through lawful multiplicity rather than artificial secrecy.
VII. Economic Consequences of Privacy by Scaling
Market Efficiency and User-Level Privacy
Markets thrive on efficiency. Transparency at the systemic level—clear settlement, verifiable balances, and auditable records—ensures stability, liquidity, and trust. Yet markets also demand privacy at the individual level, where participants need to shield sensitive decisions from competitors, predators, or opportunists. Scaling Bitcoin to millions of transactions per second achieves both simultaneously. It allows the ledger to remain open and verifiable, while individual payments dissolve into the background of millions of other lawful notes. This separation—transparency at the macro level, privacy at the micro level—is precisely what efficient markets require.
The Costs of Artificial Obfuscation
By contrast, artificial mechanisms such as CoinJoin and Taproot impose significant economic costs. CoinJoin creates friction: participants must coordinate, pay extra fees, and risk delays while waiting for counterparties. Its outputs are conspicuous, ensuring that surveillance firms and regulators treat them with suspicion. This generates regulatory hostility, as governments cannot tolerate deliberately opaque structures designed to evade audit. Taproot, while less aggressive, wastes resources in a different way: it obscures script complexity but adds no meaningful privacy benefit, leaving regulators unimpressed while misleading users into believing they are protected. In both cases, the costs are borne by users, who sacrifice efficiency and risk legal exposure without gaining real privacy.
Benefits of Scaling
Scaling delivers privacy at virtually no additional cost. Small, standard transactions are efficient to process, predictable in form, and compliant with existing legal frameworks. At volume, they generate statistical indistinguishability: any single payment is lost in a sea of others. This property is not purchased through artificial mechanisms or additional overhead, but arises naturally as throughput increases. For liquidity, scaling is transformative: it enables seamless micropayments, removes bottlenecks, and ensures that no transaction stands out merely by being “too large” in a constrained system. Predictability is likewise enhanced—fees remain low, throughput remains high, and users can transact without fear of delay or surcharge.
Legal-Economic Harmony
The most powerful outcome of scaling is that it aligns legal compliance with economic efficiency. Governments and regulators can still demand disclosure: each transaction remains fully auditable, traceable, and verifiable. Yet individuals gain functional privacy because no one has the capacity to scrutinise millions of lawful microtransactions with equal intensity. This harmony—lawful auditability combined with practical privacy—creates a stable system. Instead of antagonising regulators with conspicuous obfuscation, scaling offers them what they need: transparent records and traceable flows. At the same time, it gives individuals what they require: privacy generated by ordinary, lawful multiplicity.
Summary: The economic consequences of privacy by scaling are profound. Markets gain efficiency, liquidity, and predictability; users gain statistical privacy without resorting to contrived obfuscation. CoinJoin and Taproot, by contrast, impose costs, create friction, and attract legal hostility. Scaling achieves lawful privacy by reconciling legal traceability with individual discretion, establishing a sustainable foundation for Bitcoin as digital cash.
VIII. Case Study: Privacy in Employment and Commerce
Wages in Small Notes
Consider the scenario of wages being paid in Bitcoin notes. Instead of a single, large, conspicuous transaction, an employer pays out wages as hundreds of small, lawful notes, each between modest minimum and maximum bounds. Every note is a valid Bitcoin transaction, broadcast and settled on-chain, and each one individually traceable and auditable. From a regulatory perspective, the employer complies fully: salary amounts are declared, records are logged, and each note stands as a lawful payment under financial reporting frameworks.
Spending Without Linkage
Once the employee receives these small notes, privacy emerges at the point of spending. Because each note is an independent coin with its own unique key, the employee can spend them across different time windows and contexts. A payment for groceries today, a transit fare tomorrow, and a utility bill at the end of the week can all be funded from different notes. Importantly, no note is reused and each change output is sent to a unique address, ensuring there are no shared-change or input overlaps that an observer could exploit. From the outside, the employee’s spending appears as part of the ordinary torrent of lawful microtransactions. Even the employer who issued the wages cannot reliably link these subsequent spends to their original outflow.
Compliance and Auditability
This system aligns neatly with legal and regulatory standards. Each wage note is standard, auditable, and lawful. If required, the employer can prove salary payments by showing the full set of outgoing notes, while the employee can prove selective payments—such as rent or tax—with receipts that reveal only the necessary subset of notes. Regulators or auditors can always reconstruct the flow if subpoenaed, but in the ordinary course of commerce, no participant is forced into blanket exposure. Privacy is preserved not by secrecy or obfuscation, but by lawful multiplicity.
Outcome: Privacy and Traceability in Balance
The result is a system that balances privacy for the individual with traceability for the system. Employees enjoy spending privacy—protected from employer surveillance, data brokers, or nosy observers—while the employer satisfies wage reporting and compliance obligations. For commerce, this case study demonstrates the broader principle: privacy is best achieved through scaling, where thousands of small, lawful notes circulate continuously, providing cover for individual discretion while preserving the capacity for lawful audit.
Summary: Paying wages in many small Bitcoin notes creates a lawful, auditable record of salary payments while simultaneously protecting the employee’s spending privacy. The employer remains compliant, the system remains transparent, and the individual gains the dignity of private financial activity—an equilibrium only possible through scale.
IX. Risks of Non-Scaling Approaches
CoinJoin as a Red Flag
CoinJoin transactions, designed to combine inputs from multiple parties into a single large output set, do not blend into the natural flow of commerce. They produce distinctive, conspicuous patterns on the blockchain—hundreds of inputs and outputs bound together into one oversized transaction. To a compliance officer, regulator, or surveillance system, this structure is a glowing beacon. Rather than creating cover, it highlights precisely where to investigate. The very fact that the transaction is recognisably “different” turns it into an attractive red flag.
Large Transactions Are Easier, Not Harder, to Trace
The economic fallacy of non-scaling approaches is that they confuse aggregation with privacy. A single large payment, or an artificial construct like a CoinJoin, actually reduces the anonymity set. Observers know that the counterparties must be drawn from a narrow pool of participants in that one transaction. By contrast, when value is split into many small, independent notes across time, each note joins a massive population of ordinary transactions. Investigators face the burden of distinguishing one small note from millions. Aggregation concentrates risk; dispersion dilutes it.
Legal Response: Outlaw or Mandate
From a legal standpoint, the outcome is predictable. Governments are obliged to uphold standards of traceability and reporting. Structures such as CoinJoin are inherently non-compliant because they obscure transaction linkages. This ensures they will either be explicitly outlawed (treated as unlicensed money transmission or mixing) or subjected to mandatory reporting and tracing rules. Once mandated, the supposed privacy of these transactions evaporates entirely, leaving participants exposed to enforcement and potential criminal liability. What was marketed as privacy becomes instead a legal liability.
The False Sense of Security
The most insidious risk of non-scaling approaches is the false sense of security they provide. Users believe they are shielded from observation when, in fact, their transactions are easier to identify, more likely to be flagged, and legally indefensible. This leads to greater exposure, both technically and legally. Privacy cannot be engineered through cosmetic obfuscation. It can only arise as an emergent property of lawful, high-volume, small transactions that blend into the background of ordinary commerce.
Summary: Non-scaling mechanisms such as CoinJoin and Taproot do not provide privacy; they create conspicuous anomalies. Aggregated transactions shrink the anonymity set, concentrate scrutiny, and invite regulatory sanction. Governments will either outlaw such constructs or compel disclosure. The result is not privacy but exposure, leaving users with a false sense of security. Only scaling—millions of small, lawful, auditable transactions—provides defensible privacy.
X. Conclusion: Privacy by Multiplicity, Not Obfuscation
Lawful Privacy Emerges from Scale
The central lesson of this analysis is that privacy in Bitcoin does not come from attempting to hide, distort, or obfuscate transactions. Privacy arises when the system supports scaling to millions of standard transactions per second. In such an environment, every individual payment is ordinary, lawful, and auditable. Yet each is also private, because no single note can be distinguished from the millions of others flowing through the ledger. Scale transforms visibility into indistinguishability: what matters is not secrecy, but the impossibility of standing out.
Privacy Is Not Secrecy—It Is Ordinariness
Secrecy is brittle: it attracts attention and invites legal sanction. Privacy, by contrast, is the condition of being unremarkable—of blending into the background of lawful commerce. When payments are made as many small, independent notes, they carry no markers of exceptionalism. They are simply part of the normal operation of markets. In this ordinariness lies the strength of privacy. A ledger filled with millions of standard notes is a ledger where no single transaction acts as a beacon.
Economic and Legal Harmony
Scaling achieves a harmony that artificial obfuscation cannot. Economically, it creates liquidity, predictability, and statistical indistinguishability. Legally, it ensures every transaction is standard and auditable, satisfying the requirements of regulators without sacrificing individual discretion. This balance—lawful auditability on demand, practical privacy in ordinary use—yields a stable and defensible system. In contrast, mechanisms such as CoinJoin or Taproot produce anomalies that regulators flag and economists reject as inefficient. Scaling aligns privacy with compliance, rather than putting them in conflict.
The Future of Bitcoin
The future of Bitcoin lies not in constrained throughput or contrived obfuscation but in scaling. A system capable of millions of transactions per second secures both compliance and privacy. Individuals gain discretion through multiplicity, while regulators retain the ability to trace when lawfully required. BTC’s obstructed model, built on artificial scarcity and flawed obfuscation, cannot deliver this. Bitcoin, understood as a lawful, scaled digital cash system, demonstrates that privacy is not a matter of hiding but of doing more of the ordinary.
Summary: Privacy in Bitcoin is achieved not through secrecy, not through artificial obfuscation, but through scale. Multiplicity of lawful, small, standard transactions ensures that individuals transact privately while the system remains transparent and auditable. This dual achievement—privacy by ordinariness and compliance by design—marks the true promise of Bitcoin’s future.