5 Unexpected Payment Trends That Could Take 2025 by Storm
Dmytro Spilka·4 min


To understand how Dandelion protocol works, let's quickly review how a bitcoin transaction gets processed on its blockchain network. Each time a transaction is initiated at a node (computer) it gets announced publicly to other nodes on the network. This announcement is a requirement of the blockchain network, but this also creates a chain that can be traced back to the announcing or the initial node. As the transaction moves along the connected peers, every node that receives the data is immediately available for query & although the IP address of the originally transmitting node is hidden, it is easily traceable by monitoring the path of the transaction on the network. This is where Dandelion steps in with its two-step privacy procedure to secure the transaction after making the initial transaction private.
As solid as this proposal looked initially, there was some criticism from developers citing 'deanonymization' concerns whereby sophisticated hackers will still be able to identify the source of transaction by cross-checking its preceding patterns. To address this problem the developers of the Dandelion project published an update (May. 2018) to the original proposal called the Dandelion++, which has aimed to improve on the theoretical assumptions of the original paper. It has specifically addressed issues on the broadcast protocols of a Crypto blockchain network. Also, the team has built a small prototype network to test the new version of the protocol, its viability & how well it can block the traceable data of the transactions. So far it seems to be working as promised.
There have been other privacy solutions prior to Dandelion that have been tried & tested. Monero (XMR), for example, has been trying to implement the infamous TOR protocol used to access the Dark Web to its blockchain network for years, but it is resource heavy & difficult to implement and that's the reason they are still struggling with it. The ease of network layering solution presented by the Dandelion protocol makes it much more simpler to assimilate with the existing networks. Working on these lines Zcoin (XZC) became the second digital coin after Bitcoin recently to implement the Dandelion protocol to its network as an added security solution. Dandelion is finally gaining acceptance & recognition of its effective privacy solution for the Crypto blockchain networks.
Stay in touch: Twitter | StockTwits | LinkedIn | Telegram| Tradealike
Faisal is based in Canada with a background in Finance/Economics & Computers. He has been actively trading FOREX for the past 11 years. Faisal is also an active Stocks trader with a passion for everything Crypto. His enthusiasm & interest in learning new technologies has turned him into an avid Crypto/Blockchain & Fintech enthusiast. Currently working for a Mobile platform called Tradelike as the Senior Technical Analyst. His interest for writing has stayed with him all his life ever since started the first Internet magazine of Pakistan in 1998. He blogs regularly on Financial markets, trading strategies & Cryptocurrencies. Loves to travel.