Next scheduled rescrape ... never
Version 2
Last scraped
Scraped on 11/06/2025, 23:01:41 UTC
Yes the trail breaks when you transfer Munn to Speed via LN because it's happening offline and only who control the entry as well as exit nodes can link that if they want to and it is almost impossible via chain analysis to link back the transfer with KYCed address unless you reuse the address again to link with any KYCed funds again.
No, this is not true. The link is not broken and there are many ways you can be tracked. Please don't give incorrect information here.

But my question was mostly just technical - to better understand these things. So far I haven't parted with a single SAT yet. I don't trade or anything like that.

@Satofan44, thanks for the extensive reply. Much appreciated!!
I hope that you have understood that my answer applies pretty much directly to LN as well. Just think about it, starting with the address reuse example. In addition, there are probably some LN specific concerns. Reading a paper such as this one could be interesting to you: https://arxiv.org/abs/2003.12470.

If you have any questions about any specific points, but how it relates to LN feel free to ask. Generally you can think about it this way: Almost everything is possible, it just depends on whothe following:
  • Who is looking, how? From random users to state agencies.
  • How hard are they looking for it? From basic analysis of addresses to correlational timing and more complex attacks.
  • And most importantly, how many resources are they willing to spend to tracktracking you?
Version 1
Scraped on 11/06/2025, 22:36:54 UTC
Yes the trail breaks when you transfer Munn to Speed via LN because it's happening offline and only who control the entry as well as exit nodes can link that if they want to and it is almost impossible via chain analysis to link back the transfer with KYCed address unless you reuse the address again to link with any KYCed funds again.
No, this is not true. The link is not broken and there are many ways you can be tracked. Please don't give incorrect information here.

But my question was mostly just technical - to better understand these things. So far I haven't parted with a single SAT yet. I don't trade or anything like that.

@Satofan44, thanks for the extensive reply. Much appreciated!!
I hope that you have understood that my answer applies pretty much directly to LN as well. Just think about it, starting with the address reuse example. Replace XMR with Lightning andIn addition, there are probably some LN specific concerns. Reading a paper such as this one could be interesting to you get the same result: https://arxiv.org/abs/2003.12470.

If you have any questions about any otherspecific points, but more specifichow it relates to LN feel free to ask. Generally you can think about it this way: Almost everything is possible, it just depends on who is looking, how hard and how many resources are they willing to spend to track you?
Original archived Re: [Anonymity] Can I get rid of KYC trace through Lightning?
Scraped on 11/06/2025, 22:31:49 UTC
Yes the trail breaks when you transfer Munn to Speed via LN because it's happening offline and only who control the entry as well as exit nodes can link that if they want to and it is almost impossible via chain analysis to link back the transfer with KYCed address unless you reuse the address again to link with any KYCed funds again.
No, this is not true. The link is not broken and there are many ways you can be tracked. Please don't give incorrect information here.

But my question was mostly just technical - to better understand these things. So far I haven't parted with a single SAT yet. I don't trade or anything like that.

@Satofan44, thanks for the extensive reply. Much appreciated!!
I hope that you have understood that my answer applies pretty much directly to LN as well. Just think about it, starting with the address example. Replace XMR with Lightning and you get the same result. If you have any questions about any other points, but more specific to LN. Generally you can think about it this way: Almost everything is possible, it just depends on who is looking, how hard and how many resources are they willing to spend to track you?