Privacy Technologies in Practice - What Actually Works Today | Privacy vs. Control in CBDCs | XRP Academy - XRP Academy
3 free lessons remaining this month

Free preview access resets monthly

Upgrade for Unlimited
Skip to main content
beginner55 min

Privacy Technologies in Practice - What Actually Works Today

Learning Objectives

Assess Technology Readiness Levels (TRL) for specific privacy-preserving technologies with evidence from actual deployments

Analyze production systems (Zcash, GNU Taler, zkSync) for lessons about privacy technology at scale

Identify deployment barriers beyond technical capability (regulatory, usability, political)

Evaluate CBDC privacy timelines realistically, distinguishing achievable near-term from aspirational long-term

Apply lessons from crypto deployments to assess CBDC privacy feature claims

Your Action Items0/5 completed

8+ Years of Production Privacy

ZCASH OVERVIEW:

Launch: October 2016
Technology: zk-SNARKs (zero-knowledge succinct non-interactive arguments of knowledge)
Purpose: Private cryptocurrency transactions
Scale: ~$500M market cap, millions of transactions

WHAT ZCASH PROVES:
├─ ZKPs work at production scale
├─ Privacy-preserving transactions are technically viable
├─ 8+ years of security (no fundamental breaks)
├─ Continuous improvement possible
└─ Technology matures over time

PRIVACY MECHANISM:
├─ Shielded transactions hide sender, receiver, amount
├─ Transparent transactions are Bitcoin-like (visible)
├─ Users choose privacy level per transaction
├─ Both coexist on same blockchain
└─ Cryptographic validity proven without revealing data

Performance Reality

ZCASH PERFORMANCE METRICS:

PROOF GENERATION TIME:
├─ Original (2016): 30-60 seconds
├─ Sapling upgrade (2018): ~7 seconds
├─ Orchard (2022): ~2-3 seconds
└─ Trend: Continuous improvement

PROOF SIZE:
├─ Original: ~1KB
├─ Current: ~200-300 bytes
└─ Compact enough for blockchain

VERIFICATION TIME:
├─ Fast: Milliseconds
├─ Scales well for validators
└─ Not a bottleneck

TRANSACTION THROUGHPUT:
├─ ~27 TPS (shielded)
├─ Limited by proof generation, not verification
├─ Lower than transparent transactions
└─ Sufficient for current usage

CBDC IMPLICATION:
ZKP performance has improved dramatically
3 seconds per transaction is potentially usable
But CBDC scale (thousands TPS) needs more work

Adoption Reality

ZCASH ADOPTION CHALLENGE:

SHIELDED VS. TRANSPARENT:
├─ Only ~10-15% of transactions are shielded
├─ Most Zcash transactions are transparent
├─ Exchanges often don't support shielded
├─ Default is often transparent
└─ Privacy is option, not default

WHY LOW SHIELDED ADOPTION:
├─ Slightly higher fees
├─ Slightly slower
├─ Exchange compatibility issues
├─ Regulatory pressure on exchanges
├─ Users don't prioritize privacy when optional
└─ "Good enough" transparent is path of least resistance

LESSON FOR CBDCs:
Privacy-by-default matters enormously
Optional privacy = minority adoption
Default determines actual privacy outcome
If privacy requires user action, most won't have it

ZKPs Beyond Privacy

LAYER 2 ZKP ROLLUPS:

zkSync:
├─ Ethereum Layer 2 using ZK rollups
├─ Transactions batched, ZK proof submitted to L1
├─ Primary purpose: Scalability (not privacy)
├─ Transactions still visible on L2
└─ Proves: ZKPs work at higher throughput

Polygon zkEVM:
├─ EVM-compatible ZK rollup
├─ Full smart contract support
├─ Also primarily for scaling
├─ Privacy is secondary
└─ Proves: ZKPs compatible with complex computation

THROUGHPUT ACHIEVED:
├─ zkSync: 2,000+ TPS
├─ Polygon zkEVM: 2,000+ TPS
├─ Far higher than Zcash
└─ But optimized for scaling, not privacy

LESSON FOR CBDCs:
ZKPs can achieve high throughput
But requires engineering focus
Privacy-focused ZKPs haven't achieved same scale yet
Trade-offs between privacy and throughput exist

Current Status

ZKP TECHNOLOGY READINESS (2025):

PROVEN AT SCALE:
├─ Basic transaction privacy (Zcash): TRL 9
├─ Validity proofs for batches (zkSync): TRL 9
├─ Simple compliance proofs (threshold checks): TRL 7

DEPLOYMENT READY:
├─ Range proofs (amount in valid range): TRL 8
├─ Membership proofs (sender in valid set): TRL 7
├─ Simple policy enforcement: TRL 6-7

REQUIRES MORE DEVELOPMENT:
├─ Complex compliance (AML pattern matching): TRL 4-5
├─ Arbitrary computation privacy: TRL 5
├─ High-throughput full privacy: TRL 5-6

THEORETICAL/RESEARCH:
├─ Post-quantum ZKPs: TRL 3
├─ Perfect regulatory acceptance: TRL 2
├─ Full privacy + full compliance: TRL 2

CBDC DEPLOYMENT TIMELINE:
├─ Simple ZKP features (range proofs): 2-3 years
├─ Moderate complexity (membership): 3-5 years  
├─ Full privacy compliance: 5-10+ years (if ever)
└─ Regulatory acceptance: Highly uncertain

Deployed Privacy Infrastructure

GNU TALER OVERVIEW:

Status: Operational system, limited deployment
Technology: Chaumian blind signatures (40-year-old tech)
Purpose: Anonymous electronic payments
Architecture: Privacy for payers, transparency for merchants

1. Customer withdraws from bank
2. Bank signs blinded tokens (doesn't see what it signs)
3. Customer unblinds tokens (now valid, unlinkable)
4. Customer pays merchant with tokens
5. Merchant deposits tokens at bank
6. Bank validates signature, credits merchant
7. Bank CANNOT link withdrawal to deposit

PRIVACY PROPERTIES:
├─ Buyer: Fully anonymous (bank can't trace spending)
├─ Merchant: Fully identified (deposits visible)
├─ Bank: Sees withdrawals and deposits, not link between
└─ Result: Cash-like buyer privacy with merchant tax compliance

Deployment Status

GNU TALER DEPLOYMENTS:

CURRENT STATUS:
├─ Open source, freely available
├─ Swiss pilot programs
├─ Some European interest
├─ Limited production deployment
└─ Technically mature, politically ignored

WHY LIMITED ADOPTION:
├─ Central banks prefer visibility
├─ "Cash-like" privacy concerns regulators
├─ No powerful advocate within central banking
├─ Inertia toward surveillance-oriented designs
├─ Privacy doesn't win CBDC contracts
└─ Technical readiness ≠ political readiness

TECHNOLOGY READINESS:
├─ Core protocol: TRL 9 (proven, deployed)
├─ Scale capacity: TRL 7-8 (adequate for CBDC)
├─ Regulatory framework: TRL 3 (not developed)
├─ Central bank adoption: TRL 2 (no significant interest)
└─ Gap is political, not technical

What GNU Taler Proves

PROVEN BY GNU TALER:

1. TECHNICAL VIABILITY

1. ARCHITECTURAL POSSIBILITY

1. POLITICAL BARRIER

IMPLICATION FOR CBDC PRIVACY:
Privacy-preserving payment technology is mature
Non-deployment is choice, not necessity
When told "privacy isn't possible," this is false
Accurate statement: "Privacy isn't chosen"

Ring Signatures and Stealth Addresses

MONERO APPROACH:

Technology:
├─ Ring signatures (transaction mixed with decoys)
├─ Stealth addresses (one-time addresses per transaction)
├─ RingCT (confidential transaction amounts)
└─ Privacy by default, not opt-in

Privacy Properties:
├─ Sender: Hidden among ring members (plausible deniability)
├─ Receiver: Stealth address prevents linkage
├─ Amount: Encrypted, only parties know
└─ Stronger default privacy than Zcash

Trade-offs:
├─ Larger transaction sizes
├─ Lower throughput than transparent chains
├─ Regulatory hostility (delisted from some exchanges)
├─ No selective transparency option
└─ "Too private" for some use cases

LESSON FOR CBDCs:
Default privacy dramatically increases actual privacy
But regulatory hostility increases too
Monero shows privacy is possible but politically costly
CBDC designers must navigate same tension

Privacy Pool Shutdown

TORNADO CASH CASE:

What It Was:
├─ Ethereum smart contract for transaction mixing
├─ Users deposit, withdraw from common pool
├─ Breaks transaction linkage
└─ Privacy tool on transparent chain

What Happened:
├─ US Treasury sanctioned Tornado Cash (August 2022)
├─ First time protocol/code sanctioned
├─ Developer arrested
├─ Exchanges blocked interaction
└─ Effective shutdown of major privacy tool

Legal Status:
├─ Sanctions partially overturned (2024)
├─ Legal situation remains uncertain
├─ Chilling effect on privacy tool development
└─ Regulatory risk clearly demonstrated

LESSONS FOR CBDC PRIVACY:
├─ Privacy tools face severe regulatory risk
├─ "Code is speech" hasn't fully protected developers
├─ Even legitimate privacy use can't prevent sanction
├─ CBDC privacy tools would face similar pressure
├─ Regulatory environment is hostile to privacy
└─ Technical capability doesn't mean legal permissibility

Early Implementation Attempts

DIGITAL EURO OFFLINE STATUS:

PILOT CHARACTERISTICS:
├─ Secure element based (phone or card)
├─ Device-to-device transfer
├─ Limited amounts (€50-150 per transaction)
├─ Periodic sync required
└─ "Cash-like" privacy claimed

TECHNICAL CHALLENGES OBSERVED:
├─ Secure element availability varies
├─ User experience friction
├─ Sync requirements reduce true offline use
├─ Device loss/theft concerns
├─ Recovery mechanisms may compromise privacy
└─ Scale deployment uncertain

PRIVACY ASSESSMENT:
├─ Genuine privacy improvement if works as designed
├─ Sync data could reveal transaction patterns
├─ Implementation details matter enormously
├─ Currently too early to assess actual privacy
└─ Promising but unproven

TIMELINE:
├─ Pilot: 2023-2025
├─ Refinement: 2025-2027
├─ Production: 2027-2028 (if launched)
└─ Actual privacy evaluation: 2028+

What Tiers Actually Deliver

TIERED PRIVACY ASSESSMENT:

WHAT TIERS PROMISE:
├─ Low tier: Cash-like privacy for small transactions
├─ Middle tier: Pseudonymous with limits
├─ High tier: Full KYC for large transactions
└─ "Best of all worlds"

WHAT TIERS DELIVER (in practice):

eCNY "Tiers":
├─ All tiers: Full central bank visibility
├─ Tiers only control limits, not privacy
├─ "Tiered privacy" is marketing fiction
└─ Reality: No tier has privacy

Digital Euro (proposed):
├─ Offline tier: Potentially genuine privacy
├─ Online tier: PSP visibility (like current banking)
├─ Privacy only if offline widely usable
└─ Reality: TBD, depends on implementation

KEY INSIGHT:
"Tiered privacy" term is often misleading
May mean tiered limits (not privacy)
Or tiered visibility (only some tiers private)
Always ask: "Private from whom at each tier?"


---

The Approval Gap

REGULATORY BARRIERS:

FINANCIAL REGULATORS:
├─ Prefer visibility for compliance monitoring
├─ Privacy creates blind spots for enforcement
├─ Risk-averse (innovation isn't rewarded)
├─ "What if criminals use it?" dominates thinking
└─ No regulator was ever fired for too much visibility

AML/CFT REQUIREMENTS:
├─ FATF recommendations assume visibility
├─ Travel Rule requires identity disclosure
├─ Suspicious activity reporting needs transaction data
├─ Privacy conflicts with current framework
└─ Framework change required, politically difficult

INTERNATIONAL COORDINATION:
├─ Privacy standards need global agreement
├─ Surveillance-oriented countries resist
├─ Lowest common denominator prevails
├─ Race to bottom, not top
└─ Privacy-preserving CBDC may face interoperability barriers

TIMELINE FOR REGULATORY CHANGE:
├─ Near-term (0-5 years): Unlikely
├─ Medium-term (5-10 years): Possible with advocacy
├─ Long-term (10+ years): Possible with political shift
└─ Not primarily technical timeline

User Experience Reality

USABILITY BARRIERS:

PRIVACY REQUIRES USER ACTION:
├─ Zcash: Most users don't choose shielded
├─ Signal: Encrypted by default = high adoption
├─ Privacy must be default, not option
└─ Friction kills privacy adoption

PERFORMANCE TRADE-OFFS:
├─ Privacy features often slower
├─ Users prioritize convenience
├─ Milliseconds matter in payment UX
├─ Privacy that slows transactions loses
└─ Must be as fast as surveillance alternative

RECOVERY AND SUPPORT:
├─ Privacy complicates customer support
├─ "Prove you made this transaction" harder
├─ Fraud disputes more complex
├─ Users may not understand trade-offs
└─ Support costs increase

- Default (not opt-in)
- Fast (no noticeable delay)
- Simple (no user decisions required)
- Recoverable (support possible)

Why Privacy Doesn't Get Built

POLITICAL ECONOMY BARRIERS:

WHO DECIDES CBDC DESIGN:
├─ Central banks (want policy visibility)
├─ Finance ministries (want tax visibility)
├─ Regulators (want compliance visibility)
├─ No powerful actor wants privacy
└─ Privacy advocates lack decision power

VENDOR INCENTIVES:
├─ Ripple, Mastercard, etc. sell to central banks
├─ Central banks want surveillance features
├─ Privacy features don't win contracts
├─ Vendors build what sells
└─ Market doesn't reward privacy

TECHNOLOGY DEVELOPMENT FUNDING:
├─ Privacy tech often underfunded
├─ Surveillance tech well-funded (government contracts)
├─ Academic research exists but implementation lags
├─ Commercial incentives favor surveillance
└─ Privacy research → implementation gap

CHANGING THE DYNAMIC:
├─ Public demand (weak currently)
├─ Privacy scandal (unpredictable)
├─ Competitive pressure (from crypto?)
├─ Legal mandate (requires political will)
└─ No clear path currently visible

What's Achievable

NEAR-TERM REALISTIC FEATURES:

LIKELY:
├─ Tiered KYC (lower verification for small amounts)
├─ Limited offline capability (restricted amounts/duration)
├─ PSP data minimization (slightly less than current banking)
├─ Pseudonymous elements (account numbers, not names visible)
└─ Incremental improvements on current banking

POSSIBLE BUT UNCERTAIN:
├─ Genuine offline privacy (Digital Euro attempt)
├─ Simple ZKP features (range proofs)
├─ Reduced central bank visibility (ECB claims)
└─ Depends on specific implementation choices

UNLIKELY NEAR-TERM:
├─ Full blind signature privacy
├─ Complex ZKP compliance
├─ Cash-equivalent anonymous digital currency
├─ Widespread regulatory acceptance of privacy
└─ Privacy-by-default architecture

TIMELINE DRIVERS:
├─ Digital Euro legislation: 2025-2026
├─ Implementation: 2027-2028
├─ Other CBDCs following/leading
└─ First major privacy-respecting CBDC: Uncertain

Possible Developments

MEDIUM-TERM POSSIBILITIES:

OPTIMISTIC SCENARIO:
├─ Digital Euro succeeds with offline privacy
├─ Competitive pressure drives privacy features elsewhere
├─ ZKP technology matures for compliance
├─ Some jurisdictions differentiate on privacy
└─ Privacy-respecting CBDCs exist (minority)

BASE CASE SCENARIO:
├─ Most CBDCs remain surveillance-oriented
├─ Some limited privacy features in some jurisdictions
├─ Technical capability exceeds deployment
├─ Privacy advocates achieve partial victories
└─ Mixed landscape, mostly surveillance

PESSIMISTIC SCENARIO:
├─ Surveillance-oriented designs dominate
├─ Cash marginalized or eliminated in some jurisdictions
├─ Privacy technology exists but isn't deployed
├─ Regulatory hostility to privacy hardens
└─ Window for privacy-respecting CBDC closes

PROBABILITY ASSESSMENT:
├─ Optimistic: 20%
├─ Base case: 55%
├─ Pessimistic: 25%
└─ Driven primarily by political, not technical factors

Structural Possibilities

LONG-TERM SCENARIOS:

PRIVACY RECOVERY:
├─ Public backlash against surveillance
├─ Court decisions protecting financial privacy
├─ Political realignment favoring privacy
├─ Retrofit of privacy features onto existing CBDCs
└─ Probability: 25%

SURVEILLANCE LOCK-IN:
├─ Current trajectory continues
├─ Surveillance normalized
├─ Privacy expectations decline
├─ Technical capability irrelevant without political will
└─ Probability: 50%

FRAGMENTATION:
├─ Some jurisdictions privacy-respecting
├─ Others surveillance-oriented
├─ Geographic arbitrage possible
├─ Privacy becomes luxury good
└─ Probability: 25%

KEY UNCERTAINTY:
├─ Technical capability: Relatively predictable
├─ Political will: Highly uncertain
├─ Public opinion: Shapeable but unpredictable
├─ Regulatory evolution: Slow and path-dependent
└─ Long-term outcome determined by non-technical factors

ZKP privacy technology works at production scale. Zcash has operated for 8+ years with millions of transactions. The technology is proven, secure, and continuously improving.

Blind signature technology is mature and deployable. GNU Taler demonstrates that Chaumian blind signatures work for payment systems. The 40-year-old technology is thoroughly analyzed and production-ready.

Performance is adequate for CBDC use. Current ZKP proof generation (~2-3 seconds) and blind signature operations are fast enough for retail payments. Performance is not the blocking factor.

The gap is political and regulatory, not technical. Privacy-preserving technology exists but isn't deployed because decision-makers prefer surveillance, not because technology isn't ready.

⚠️ Whether regulatory frameworks will evolve. Current AML/CFT frameworks assume visibility. Whether and when frameworks might accommodate privacy-preserving compliance is uncertain.

⚠️ How tiered privacy systems will actually perform. Digital Euro offline privacy is promising but unproven at scale. Implementation details will determine actual privacy.

⚠️ Whether public demand for privacy will materialize. Privacy technology requires political will for deployment. Whether citizens will demand privacy strongly enough to change dynamics is unclear.

⚠️ Long-term trajectory of surveillance vs. privacy. Technical trends favor privacy; political trends favor surveillance. Which dominates over 10-20 years is uncertain.

🔴 Optional privacy = low adoption. Zcash shows that when privacy is opt-in, most users don't opt in. CBDC privacy must be default or it won't be used.

🔴 Regulatory hostility is real. Tornado Cash sanctions demonstrate that privacy tools face severe regulatory risk. CBDC privacy features would face similar scrutiny.

🔴 Market doesn't reward privacy. Vendors build what customers (central banks) want. Central banks want surveillance. Commercial incentives oppose privacy development.

🔴 Technical capability exceeds political will. The technology to build privacy-preserving CBDCs exists today. It's not being deployed because privacy isn't wanted by those making decisions.

Privacy-preserving technology is mature enough for CBDC deployment today. Blind signatures are 40 years old and production-tested. ZKPs have improved dramatically and work at scale. The gap between technical capability and deployment is political and regulatory, not technical.

This is both discouraging and clarifying. Discouraging because it means advocacy, not engineering, is the binding constraint. Clarifying because it refocuses effort: privacy advocates need political wins, not just technical demonstrations.

When evaluating CBDC privacy claims, the question isn't "Is this technology ready?" (usually yes for basic features). The question is "Will this jurisdiction actually deploy privacy features?" (usually uncertain).


Assignment: Select one privacy-preserving technology and assess its readiness for CBDC deployment, incorporating lessons from existing deployments.

  1. Zero-knowledge proofs (zk-SNARKs or zk-STARKs)
  2. Blind signatures (Chaumian eCash)
  3. Ring signatures (Monero-style)
  4. Secure multi-party computation
  5. Tiered offline systems (Digital Euro-style)
  6. Homomorphic encryption

Requirements:

  • How does the technology work?

  • What privacy properties does it provide?

  • What are the fundamental trade-offs?

  • Where is this technology deployed today?

  • What performance characteristics are observed?

  • What adoption patterns exist?

  • What problems have emerged?

  • What lessons apply to CBDC deployment?

  • How would this technology apply to CBDCs?

  • What privacy features would it enable?

  • What compliance capabilities would remain?

  • What scale would it support?

  • Technology Readiness Level assessment (TRL 1-9)

  • What technical barriers remain?

  • What regulatory barriers exist?

  • What usability challenges apply?

  • What political economy factors affect deployment?

  • Realistic CBDC deployment timeline

  • What would accelerate deployment?

  • What would block deployment?

  • Overall assessment for privacy advocates

  • Technical accuracy (25%)

  • Quality of deployment lesson extraction (25%)

  • CBDC application analysis rigor (20%)

  • Barrier analysis thoroughness (20%)

  • Realistic timeline assessment (10%)

Time investment: 5-6 hours
Value: Technology readiness assessment distinguishes feasible from aspirational CBDC privacy claims. This methodology applies to evaluating any privacy technology proposal.

Submission format: Document of 2,500-3,000 words with citations


Knowledge Check

Question 1 of 5

(Tests Deployment Knowledge):

  • Electric Coin Company documentation
  • Zcash Foundation research
  • Academic papers on zk-SNARKs
  • Zcash transaction statistics and analysis
  • GNU Taler technical documentation
  • Chaum's original blind signature papers
  • Swiss pilot program reports
  • Privacy assessment analyses
  • zkSync documentation
  • Polygon zkEVM technical papers
  • Performance benchmarks
  • Comparative analyses
  • Tornado Cash sanctions documents and court rulings
  • FATF guidance on virtual assets
  • FinCEN regulations
  • EU AML directive privacy provisions
  • Academic cryptography conferences (CRYPTO, Eurocrypt)
  • BIS/central bank working papers on privacy-preserving CBDC
  • Privacy-focused crypto project documentation

For Next Lesson:
In Lesson 13, we examine cross-border CBDC interoperability and its privacy implications. How do privacy protections (or lack thereof) interact when CBDCs from different jurisdictions connect? What happens when a privacy-respecting CBDC must interoperate with a surveillance-oriented one?


End of Lesson 12

Total words: ~6,300
Estimated completion time: 55 minutes reading + 5-6 hours for deliverable

Key Takeaways

1

ZKP technology is production-ready for basic privacy features.

Zcash proves ZKPs work at scale. Performance has improved from minutes to seconds per proof. Simple CBDC privacy applications are technically feasible today.

2

Blind signature technology is mature but politically ignored.

GNU Taler demonstrates cash-like digital payment privacy is possible. The technology is 40 years old and thoroughly proven. Non-deployment is choice, not technical limitation.

3

Optional privacy fails; default privacy succeeds.

Zcash's ~10-15% shielded transaction rate shows that opt-in privacy has low adoption. Privacy must be default or friction prevents usage.

4

The gap is political and regulatory, not technical.

Decision-makers prefer surveillance; markets reward surveillance; regulators assume surveillance. Technical capability exceeds political will to deploy.

5

Realistic CBDC privacy timeline is 5-10+ years for meaningful features.

Near-term CBDCs will likely have limited privacy. Privacy-respecting CBDCs require political changes that are uncertain in timing. ---