November 29, 2025
Stealth snacks, loud takes
How stealth addresses work in Monero
Secret burgers, public brawls: can Monero really keep you untraceable
TLDR: Monero’s stealth addresses create one-time, hard-to-link payment spots using a shared secret so only the receiver can spend. Commenters clash over real-world privacy: banks and exchanges may expose you on cash-out, some crown Monero king, and others argue ZCash offers stronger privacy.
Today’s crypto soap opera stars: Alice’s secret restaurant, Bob’s burger money, and Monero’s stealth address. The explainer walks through a simple idea: your wallet creates a one‑time pay‑to address using a shared secret (a math handshake) so only Alice can spend it. On-chain, it looks like a unique drop-off with no names attached. Monero adds ring signatures—think decoys—so investigators only see a crowd of possible senders, not the actual one.
But the comments? Fire. Skeptics warn the real boss fight happens off-chain: “the trust issues, the cost issues and the hoops… to buy Monero”, says one, while another asks, “What’s the point of hiding if the bank outs you when you cash out?” Monero maximalists roll in with “Monero is the only real cryptocurrency”, flexing default privacy, while a rival camp snipes, “sounds weaker than ZCash,” sparking a classic privacy cage match. Jokes fly about a “secret burger club” and paying rent in fries, but the serious takeaway is clear: Monero aims to keep payments private; exchanges and banks still play bouncer. Whether you’re team Monero or team ZCash, this thread is a reminder that crypto privacy is part math, part memes, and very much part real‑world friction.
Key Points
- •Alice displays public view key A and public spend key S for payments.
- •Bob generates r, computes R=rG, derives k=H(rA), and creates a one-time stealth address P=kG+S.
- •Bob sends (P, R) to Alice; P is unlinkable to Alice or Bob based on on-chain data.
- •Alice computes k via ECDH (aR=rA) and scans the blockchain for outputs to P=kG+S.
- •Alice can spend funds at P because S=sG and P=(k+s)G, giving her private key (k+s).