It goes through most ways to use the network in a privacy conscious way, trying to minimize the attack surface. That said the conclusion is clear: "Bitcoin’s base layer does not have any privacy guarantees and neither does Lightning. There are ways to attempt to hide amongst the activity of the network, but it’s no guarantee."
Excellent article.
It goes through most ways to use the network in a privacy conscious way, trying to minimize the attack surface. That said the conclusion is clear: "Bitcoin’s base layer does not have any privacy guarantees and neither does Lightning. There are ways to attempt to hide amongst the activity of the network, but it’s no guarantee."