Chain Analysis
Chain analysis is the practice of tracing Bitcoin transactions on the public blockchain to de-anonymize users, identify fund flows, and link addresses to real-world identities. Companies like Chainalysis and Elliptic sell these surveillance services to governments, exchanges, and law enforcement.
How It Works
Bitcoin transactions are public. Every input, output, amount, and address is permanently recorded on the blockchain. Chain analysis companies exploit this transparency by applying heuristics — rules of thumb — to cluster addresses and trace fund flows. The most common heuristic is the "common input ownership" assumption: if two inputs are spent in the same transaction, they are likely controlled by the same entity. Change address detection, timing analysis, and amount correlation are other techniques.
The real power of chain analysis comes from linking on-chain data with off-chain identity information. When you buy bitcoin on a KYC exchange, the exchange knows which addresses belong to you. Chain analysis companies partner with exchanges and law enforcement to build databases linking addresses to identities. From that anchor point, they trace funds forward and backward through the transaction graph. If your KYC-purchased bitcoin eventually reaches an address you thought was private, chain analysis can connect the dots.
Defense requires breaking the assumptions chain analysis relies on. CoinJoin disrupts common input ownership heuristics. Never reusing addresses prevents address clustering. Coin control lets you choose which UTXOs to spend together, avoiding accidental linkage. Acquiring bitcoin without KYC eliminates the identity anchor point entirely. Running your own node prevents leaking address queries to third-party servers that may feed data to chain analysis companies. No single technique is sufficient — effective privacy requires applying all of these practices consistently.
Key Points
- Exploits Bitcoin's public blockchain to trace transactions and link addresses to identities
- Common input ownership and change detection are the primary heuristics used for clustering
- KYC exchange data provides the identity anchors that make chain analysis effective
- CoinJoin, avoiding address reuse, and coin control break the assumptions chain analysis depends on
- Acquiring bitcoin without KYC eliminates the identity link that powers most chain analysis