This creates a "ring" of possible signers. Decoys use real outputs drawn from a gamma distribution to produce realistic patterns. For the receiver, it used stealth addresses generate a unique, ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results