Unchained
December 18, 2025

Why Privacy for Crypto Is in the Public Interest: DEX in the City

The single most important argument is that privacy in crypto, far from being an ideological or illicit concept, is a public good and a strategic necessity for both individual users and mainstream financial institutions. The key insight is that advanced cryptographic tools (like ZK proofs) enable a "programmable risk management" framework, allowing for compliance and accountability with less data collection, thereby moving past the false trade-off between privacy and regulation.

The Shifting Regulatory Stance on Crypto Privacy:

  • “We can still meet compliance goals but with less data collection. And I think that that is like if I could just tattoo one thing onto the brains of policy makers and regulators, it is that sentence.” (Jill)
  • “I think we're all kind of trying to find our way back to that place where the starting point for privacy is privacy is okay.” (Katherine)

Privacy as a Human Right and a National Security Imperative:

  • “If your privacy theory can't explain how a vulnerable person would get help, restitution or protection, then it's not a privacy theory for humans. It's one for ideology.” (Jesse)
  • “Every major national security failure involving data in the last decade has come from too much visibility, not too little.” (Katherine)

The Nuance of Privacy Tools and Programmable Risk Management:

  • “I do think that there has been this kind of new generation of privacy builders who've been really, really thoughtful about how to implement things like proof of innocence either in depositing into a private domain or withdrawing from the private domain.” (Jill)
  • “Programmable risk management can be the mechanism that lets both privacy, regulation, and compliance exist together.” (Jesse)

Key Takeaways:

  • Strategic Implication: The shift in regulatory tone and corporate demand for privacy signals a maturation of the crypto industry. Solutions that balance privacy with accountability will capture significant market share.
  • Builder/Investor Note: Focus on projects building privacy-preserving compliance tools and "programmable risk management" frameworks. These are the infrastructure plays for mainstream adoption. Avoid projects that offer absolute privacy without any recourse mechanisms, as they face significant regulatory risk.
  • The "So What?": Over the next 6-12 months, expect increased innovation and investment in ZK-based privacy solutions that enable selective disclosure and verifiable compliance. This will be crucial for onboarding institutional capital and protecting individual users in a data-exposed world.

For further insights, watch the podcast: Link

The SEC's surprising pivot on crypto privacy reveals a critical shift: privacy is no longer an ideological battle but a national security and market imperative.

SEC Embraces Crypto Privacy Dialogue

  • The Securities and Exchange Commission (SEC) demonstrates a significant shift in its approach to crypto, hosting a well-attended roundtable focused on privacy tools and policy. This engagement marks a departure from previous anti-crypto stances, signaling a new era of regulatory curiosity and collaboration.
  • Builder-Regulator Interaction: The roundtable featured builders demonstrating privacy tools, followed by policy discussions, highlighting the SEC's intent to understand practical applications.
  • Changing Perceptions: Jill from Espresso Systems notes a decade-long shift from a "subpoena vibe" to an open-minded, positive engagement from SEC staffers.
  • Innovation for American Investors: Jesse from Rivet Capital asserts the SEC now recognizes that innovation within the United States benefits the market and American investors.
  • Policy Evolution: The panel's existence itself signifies a major change, as previous government roles often involved prosecuting crypto cases with an anti-privacy bias.

“Everyone I met there yesterday, even the staffers who'd been around sort of through all of these different paradigms at the SEC were just so open-minded and curious and positive about us coming in to present.” – Jill

Economic and National Security Imperatives for Privacy

  • Privacy in crypto transcends ideological debates, emerging as a critical component for market integrity and national security. Excessive data visibility creates vulnerabilities, as demonstrated by past breaches.
  • Mitigating Market Manipulation: As tokenized assets (e.g., equities) move on-chain, privacy or shielded transactions become essential to prevent market manipulation and ensure competitive strategies.
  • Data Breach Epidemic: Cryptography-based tools offer a solution to the pervasive issue of data breaches, which have compromised sensitive information from government agencies (OPM hack) and private platforms (Strava incident).
  • Too Much Visibility as an Attack Surface: Jesse argues that major national security failures often stem from excessive data visibility, not too little, making privacy a bedfellow with national security.
  • Corporate Demand: Banks and asset managers require privacy to manage proprietary strategies, aligning corporate interests with civil liberties advocates.

“Every major national security failure involving data in the last decade has come from too much visibility, not too little.” – Jesse

Programmable Risk Management: Balancing Confidentiality and Accountability

  • Advanced cryptographic tools, particularly Zero-Knowledge (ZK) proofs, enable a new paradigm where compliance goals are met with significantly less data collection, dissolving the false trade-off between privacy and regulation.
  • Compliance with Less Data: Cryptography allows for real-time risk monitoring and transparency while encrypting sensitive asset and identity information, offering selective disclosure.
  • Beyond Clearing Costs: While blockchains reduce clearing and settlement costs, the true value lies in supercharged privacy, risk auditing, and identity tools.
  • Reinforcing Principles: Programmable risk management designs systems where confidentiality and accountability mutually reinforce each other, a capability previously unavailable.
  • Tooling, Not Mandates: Katherine emphasizes that while tools like ZK proofs (cryptographic methods allowing one party to prove a statement's truth to another without revealing the statement itself) exist for programmable risk management, regulators should not mandate their universal implementation, preserving user choice.

“We can still meet compliance goals but with less data collection. And I think that that is like if I could just tattoo one thing onto the brains of policy makers and regulators, it is that sentence.” – Jill

The Human Cost of Privacy Failures and the Spectrum of Tools

  • A personal hacking experience underscores the critical need for accountability and recourse within privacy frameworks. The industry must acknowledge the spectrum of privacy tools, from "cypherpunk" ideals to those with built-in safeguards for mainstream adoption.
  • Ideology vs. Human Protection: Jesse argues that privacy theory must explain how vulnerable individuals receive help or restitution, not just uphold abstract principles. Privacy maximalism often overlooks harm from bad actors.
  • Personal Hacking Experience: Jill recounts losing $30,000 from her hot wallet, tracing funds to Railgun (a privacy protocol), highlighting the immediate desire for accountability as a victim.
  • Safeguards in Privacy Protocols: Railgun, despite its use in illicit activity, incorporates safeguards like proof of innocence (a mechanism to demonstrate legitimate funds) and Know Your Transaction (KYT) checks (monitoring transactions for suspicious activity), though these can be circumvented.
  • Spectrum of Privacy: Jill maintains the value of censorship-resistant, cypherpunk-aligned tools but advocates for a broader spectrum, including tools with controls for mainstream usage, spurred by events like the Tornado Cash sanctions.

“If your privacy theory can't explain how a vulnerable person would get help, restitution or protection, then it's not a privacy theory for humans. It's one for ideology.” – Jesse

Do Kwon Sentencing: Precedent and Complexity

  • The sentencing of Do Kwon, founder of Terraform Labs, to 15 years for conspiracy to defraud and wire fraud, provides a detailed look into the complexities of federal sentencing guidelines and the judge's considerations beyond prosecution recommendations.
  • Sentencing Process: After a guilty plea, a sentencing hearing occurs, where defense and prosecution submit recommendations based on evidence and victim impact statements.
  • Guidelines vs. Statutory Maximum: Federal sentencing guidelines offer a framework, but judges are not bound by them or prosecution recommendations, only by the statutory maximum (e.g., 25 years for Do Kwon's charges).
  • Aggravating Factors: The judge sentenced Do Kwon above the prosecution's 12-year request, citing lack of remorse, continued fraudulent statements, and attempts to evade justice.
  • Victim Impact: Over 17,000 victims were part of the bankruptcy case, with 300 submitting statements detailing financial ruin and even suicide ideation, heavily influencing the judge's decision.

“You should see some of these tweets where he's like pretty much anyone who disagreed with him and said like Terra is falling apart, he was like you're poor or something like that.” – Jesse

Investor & Researcher Alpha

  • ZK Proofs & Privacy Tech as Infrastructure: The SEC's engagement signals a maturing regulatory view on privacy. Investors should prioritize projects building robust, auditable privacy infrastructure (e.g., ZK-proofs, FHE - Fully Homomorphic Encryption, which allows computation on encrypted data without decrypting it) that enables selective disclosure and programmable compliance, rather than purely maximalist, untraceable solutions. This is where institutional capital will flow.
  • Tokenization's Privacy Bottleneck: The rapid growth of tokenized real-world assets (RWAs) on-chain creates an urgent demand for privacy solutions to prevent market manipulation and protect proprietary strategies. Research into privacy-preserving mechanisms for institutional DeFi and RWA platforms will yield significant returns.
  • Regulatory Compliance as a Feature: The "false tradeoff" between privacy and regulation is obsolete. Projects integrating programmable risk management and KYT (Know Your Transaction) capabilities directly into their privacy protocols will gain a competitive edge and regulatory acceptance.

Strategic Conclusion

The conversation around crypto privacy has fundamentally shifted from an ideological battle to a pragmatic necessity for market integrity and national security. The industry's next step involves developing and deploying a spectrum of privacy-preserving technologies that balance confidentiality with accountability, enabling mainstream adoption while safeguarding users and national interests.

Others You May Like