DEX in the City: How Privacy in Crypto Makes Everyone's Finances More Secure - Ep. 982
Episode
53 min
Read time
2 min
Topics
Crypto & Web3
AI-Generated Summary
Key Takeaways
- ✓Compliance with Less Data: Cryptographic tools enable meeting regulatory compliance goals while collecting less personal data through selective disclosure and zero-knowledge proofs. This reduces data breach attack surfaces that have caused major national security failures like the OPM hack affecting 21 million federal employees.
- ✓Privacy Tool Spectrum: Builders should evaluate cryptography-based privacy solutions across a spectrum rather than mandate universal implementation. Tools include proof of innocence protocols, Know Your Transaction monitoring, deposit time delays, and withdrawal safeguards that balance user protection with permissionless access for vulnerable populations.
- ✓Tokenization Requires Privacy: Mainstream tokenized equities and assets moving on-chain create economic necessity for transaction privacy to prevent market manipulation and protect competitive trading strategies. Traditional finance institutions need confidential settlement capabilities similar to current banking systems to participate in blockchain-based markets.
- ✓Shielded Pool Risk: Using privacy protocols like mixers contributes to shielded pools that can inadvertently provide cover for illicit actors. Even legitimate users enable bad actors to hide within the same anonymity set, creating legal gray areas around facilitation liability that regulators and developers must address.
What It Covers
SEC hosts sixth crypto roundtable on privacy tools featuring builders and policymakers. Discussion covers cryptography-based compliance solutions, programmable risk management, data breach mitigation, and balancing privacy rights with accountability after regulatory hostility shifts toward engagement.
Key Questions Answered
- •Compliance with Less Data: Cryptographic tools enable meeting regulatory compliance goals while collecting less personal data through selective disclosure and zero-knowledge proofs. This reduces data breach attack surfaces that have caused major national security failures like the OPM hack affecting 21 million federal employees.
- •Privacy Tool Spectrum: Builders should evaluate cryptography-based privacy solutions across a spectrum rather than mandate universal implementation. Tools include proof of innocence protocols, Know Your Transaction monitoring, deposit time delays, and withdrawal safeguards that balance user protection with permissionless access for vulnerable populations.
- •Tokenization Requires Privacy: Mainstream tokenized equities and assets moving on-chain create economic necessity for transaction privacy to prevent market manipulation and protect competitive trading strategies. Traditional finance institutions need confidential settlement capabilities similar to current banking systems to participate in blockchain-based markets.
- •Shielded Pool Risk: Using privacy protocols like mixers contributes to shielded pools that can inadvertently provide cover for illicit actors. Even legitimate users enable bad actors to hide within the same anonymity set, creating legal gray areas around facilitation liability that regulators and developers must address.
Notable Moment
Builder Jill shares losing thirty thousand dollars to hackers who deposited stolen funds into Railgun privacy protocol while preparing SEC privacy presentation remarks. The incident demonstrates how victims experience privacy tools differently than advocates, highlighting tension between civil liberties principles and practical accountability needs.
You just read a 3-minute summary of a 50-minute episode.
Get Unchained summarized like this every Monday — plus up to 2 more podcasts, free.
Pick Your Podcasts — FreeKeep Reading
More from Unchained
Want to Hire an AI Agent? Check Their Reputation Via ERC-8004
Feb 8 · 63 min
The TWIML AI Podcast
How to Engineer AI Inference Systems with Philip Kiely - #766
Apr 30
More from Unchained
Uneasy Money: How the Increasingly Better AI Agents Are Being Used Onchain
Feb 7 · 82 min
Eye on AI
#341 Celia Merzbacher: Beyond the Buzzword: The Real State of Quantum Computing, Sensing, and AI in 2025
Apr 30
More from Unchained
We summarize every new episode. Want them in your inbox?
Want to Hire an AI Agent? Check Their Reputation Via ERC-8004
Uneasy Money: How the Increasingly Better AI Agents Are Being Used Onchain
When AI Agents Take Over, What Does a Post-Human Economy Look Like?
DEX in the City: Why AI Agents Are Good for Crypto and Stablecoins
Why Bitcoin Is Down, Plus the Rare Bright Spot in Crypto: Hyperliquid
Similar Episodes
Related episodes from other podcasts
The TWIML AI Podcast
Apr 30
How to Engineer AI Inference Systems with Philip Kiely - #766
Eye on AI
Apr 30
#341 Celia Merzbacher: Beyond the Buzzword: The Real State of Quantum Computing, Sensing, and AI in 2025
Moonshots with Peter Diamandis
Apr 30
Google Invests $40B Into Anthropic, GPT 5.5 Drops, and Google Cloud Dominates | EP #252
Citeline Podcasts
Apr 30
Carna Health On Closing the Gap in CKD Prevention
Alt Goes Mainstream
Apr 30
Lincoln International's Brian Garfield - how is AI impacting private markets valuations?
Explore Related Topics
This podcast is featured in Best Crypto Podcasts (2026) — ranked and reviewed with AI summaries.
You're clearly into Unchained.
Every Monday, we deliver AI summaries of the latest episodes from Unchained and 192+ other podcasts. Free for up to 3 shows.
Start My Monday DigestNo credit card · Unsubscribe anytime