Cointegrity

Decoy Transactions

Web3 / privacy technology

Decoy transactions are dummy or fake transactions intentionally broadcast alongside genuine transactions on a blockchain to obscure transaction patterns and obfuscate the true flow of funds. By mixing legitimate transfers with decoys, users can prevent external observers from easily identifying which transactions are real, making it significantly harder to trace transaction amounts and participant relationships. This technique is commonly employed in privacy-focused blockchains where transaction visibility is a default property, creating a larger anonymity set that makes statistical analysis and chain surveillance considerably more difficult for third parties attempting to deanonymize users. Example: Monero uses ring signatures combined with decoy outputs in every transaction, where multiple outputs are mixed together and observers cannot determine which output is the actual recipient's funds versus which are decoys from prior transactions. Why it matters for privacy technology: Decoy transactions significantly raise the cost of blockchain surveillance by forcing attackers to analyze larger transaction sets. They provide practical privacy protection without requiring zero-knowledge proofs, making them computationally efficient while still offering strong plausible deniability about user transaction participation and fund destinations.

Category: privacy technology, blockchain technology

Explore the full Web3 Glossary — 2,062+ expert-curated definitions. Need guidance? Talk to our consultants.