Hashtag Web3 Logo

Stealth Address

A privacy mechanism where unique receiving addresses are created for each transaction, preventing observers from linking payments to a single wallet or identity.

privacyAdvanced
Stealth Address

Stealth addresses create unique receiving address for each transaction, preventing payment linking. Standard blockchain: Send to same address multiple times. Observer sees all transactions to that address, links them together. Stealth addresses: Each payment creates new receiving address. Observer can't link payments. Implementation: Sender and receiver share secret key. Sender derives new address per transaction. Receiver can identify payments with secret key. Monero pioneered stealth addresses. Ethereum implementing stealth addresses (EIP-5564 proposal). Stealth addresses enable privacy without special hardware or complex protocols.

Stealth Address Mechanics

How they work:

Setup: Receiver publishes stealth public key (separate from spending public key).

Payment: Sender derives unique stealth address from receiver's stealth key + ephemeral secret.

Transaction: Sender sends payment to stealth address.

Ephemeral Key: Sender includes ephemeral public key in transaction (needed for receiver to identify payment).

Receiver: Receiver computes shared secret from ephemeral key + spending key. Derives stealth address. Checks if received payment to that address. If yes, receives payment.

Unlinking: Observer can't link multiple stealth addresses to same receiver.

Stealth addresses enable unlinkable payments.

Stealth Address Example

Concrete example:

Receiver Setup:

  • Spending key: sk
  • Stealth key: spk (derived from sk)
  • Publishes: spk

Sender Payment:

  • Generates ephemeral secret: r
  • Derives stealth address: hash(r * spk + receiver_identifier)
  • Sends 1 ETH to stealth address
  • Includes r (ephemeral public key) in transaction

Receiver Receives:

  • Scans transactions seeing ephemeral key r
  • Computes: hash(sk * r + receiver_identifier)
  • Checks if received ETH to this address
  • If yes, can spend using sk

Observer sees multiple stealth addresses. Can't link them to receiver.

Privacy Advantages

Benefits:

Payment Unlinking: Observer can't link multiple payments to same wallet.

Recipient Privacy: Sender doesn't expose recipient address publicly.

Address Reuse Prevention: Each payment uses new address (prevents address reuse dangers).

Lightweight: No heavy computation required (unlike zk-proofs).

Scalable: Can implement at application layer without protocol changes.

Stealth addresses are practical privacy tool.

Stealth Address Challenges

Obstacles:

Scanning: Receiver must scan blockchain identifying their stealth addresses. Computational cost.

Metadata: Transaction metadata (sender, amount, time) still visible.

Linking Receiver: If receiver sends payment, sender address linkable.

Adoption: Requires sender and receiver using same implementation.

Privacy-Aware Design: Users must understand to get benefits.

Stealth addresses provide privacy but not complete anonymity.

Monero Implementation

Real stealth addresses:

RingCT: Monero uses stealth addresses + ring signatures for privacy.

Confidential Transactions: Hide transaction amounts.

Ring Signatures: Hide sender among decoys.

Combination: Together enable private transactions on Monero.

Monero demonstrates practical stealth address implementation.

Proposed Ethereum Implementation

Emerging on Ethereum:

EIP-5564: Stealth address standard for Ethereum.

Implementation: Tools like Umbra enable stealth addresses on Ethereum.

Privacy Layer: Adds privacy layer on top of transparent Ethereum.

Sender Knows Recipient: Sender still knows who receiving (not anonymous to sender).

Ethereum slowly adopting stealth addresses for privacy.

Stealth Address Limitations

Important constraints:

Metadata Privacy: Stealth addresses hide only recipient identity. Sender address, amount, and timing still visible on blockchain. Observer can see "some transaction happened" but not to whom.

Sender Privacy: Receiver knows sender's address (sender must know receiver's stealth key, but reverse doesn't work). Asymmetric privacy.

Onchain Footprint: While recipient privacy improved, stealth address transactions still onchain. Forensic analysis might identify patterns.

Exchange Integration: Most exchanges don't support stealth addresses. Sending to stealth address then exchanging back to known address defeats privacy.

Regulatory: Privacy features might face regulatory scrutiny. Some jurisdictions restrict privacy-enabling technology.

Stealth addresses improve privacy but don't guarantee complete anonymity.

Stealth Address Adoption

Current landscape:

Ethereum Slow Adoption: EIP-5564 proposed but not yet implemented. Only limited tools (Umbra) support stealth addresses.

Monero Native: Monero pioneered stealth addresses. Now standard feature.

Emerging Support: Some wallets adding stealth address support. Vitalik advocated for Ethereum adoption.

Privacy Demand: Growing privacy demand driving adoption. Regulatory pressure also driving development.

Performance: Scanning broadcasts require computation. Better solutions needed for mainstream adoption.

Stealth addresses slowly gaining adoption as privacy demands increase.

Career Opportunities

Privacy infrastructure creates roles:

Privacy Researchers studying privacy mechanisms earn $130,000-$320,000+.

Cryptography Engineers implementing stealth addresses earn $120,000-$300,000+.

Smart Contract Developers building privacy contracts earn $100,000-$250,000+.

Full Stack Privacy Engineers implementing end-to-end privacy earn $130,000-$320,000+.

Security Engineers auditing privacy systems earn $120,000-$300,000+.

Privacy Product Managers designing privacy UX earn $110,000-$280,000+.

Best Practices

Using stealth addresses:

Understand Limitations: Stealth addresses don't hide transaction metadata.

Combine Methods: Combine with other privacy methods (mixers, etc) for better privacy.

Use Reputable Implementations: Use audited, proven stealth address implementations.

Avoid Linking: Don't link stealth address to known identity.

Monitor Privacy: Privacy depends on proper implementation. Stay informed.

The Future of Stealth Addresses

Privacy evolution:

Wider Adoption: More protocols implementing stealth addresses.

Scanning Solutions: Better scanning mechanisms reducing receiver computation.

Metadata Privacy: Combining with other techniques hiding metadata.

Social Recovery: Stealth addresses combined with smart contract recovery.

Threshold Cryptography: Multiple recipients sharing stealth address.

Receive Payments Privately

Stealth addresses enable private receiving while maintaining public blockchain transparency. Understanding stealth addresses helps you evaluate privacy solutions. If you're interested in privacy or cryptography, explore privacy careers at privacy projects and teams. These roles focus on building practical privacy infrastructure.

Find Stealth Address Jobs

Explore positions at companies working with Stealth Address technology

Browse open roles

Learn More

Read in-depth articles and guides about Web3 careers and technology

Explore the blog