After a night run, I checked L2’s active addresses and bridge traffic, and it also reminded me of “privacy.” To put it simply, on-chain transfers are already pretty transparent; what you can hide more is not making records disappear out of thin air, but separating the address from you. The compliance side won’t suddenly stop existing just because you used a certain tool—at most, the platform or the entry point may ask you for more explanations and occasionally flag you.



Recently, modularization and DA layers have been the talk of the town among developers, and I can understand why ordinary users might feel completely lost… But no matter how the underlying building blocks are put together, users’ expectations shouldn’t be too romantic: if you want “privacy,” it’s likely to be more expensive, more troublesome, and more likely to trigger risk-control alerts. In any case, my own approach is to have fewer fantasies—treat everything as a public ledger. If I really need isolation, I use different wallets and different entry points. That’s how I do it.
View Original
This page may contain third-party content, which is provided for information purposes only (not representations/warranties) and should not be considered as an endorsement of its views by Gate, nor as financial or professional advice. See Disclaimer for details.
  • Reward
  • Comment
  • Repost
  • Share
Comment
Add a comment
Add a comment
No comments