Assuming you are in search of monetary privateness from different community members, sure in all probability. Else it depends upon what sort of info entry your hypothetical adversary has.
I am not aware of any of the three providers. Cursory search appears to point that they’re centrally operated, however some are known as “non-custodial”. It isn’t apparent to me, what mentioned characteristic is meant to ivolve precisely or how it’s applied, however I did not attempt too laborious to seek out out.
I didn’t see any indication or guarantees that the providers don’t hold logs. In actual fact, since a few of these providers promote their nice buyer help, I’d anticipate them to maintain complete logs so as to have the ability to reply to buyer help requests. Clearly, no one however the workers (or possibly even only a subset of them) can inform you what the precise inside information retention practices of those providers are.
That being mentioned, buying and selling to a different coin will disintermediate your transaction historical past to all however the alternate that facilitated the commerce (“swap alternate”). Relying on how the swap alternate receives the deposits or facilitates the commerce, the service that you just initially bought from (“unique alternate”) wouldn’t essentially know who you despatched to, however particularly would have virtually no likelihood to attach it to the later cost that despatched you the opposite forex, besides maybe by the quantities transferred and the timing or by way of mixed info from unique and swap alternate.
There are nonetheless information of:
- your unique buy on the unique alternate together with your full buyer data
- the onchain report of the switch(s) connecting the unique alternate and the swap alternate
- the report on the swap alternate the place you hopped chains
- the onchain report of the withdrawal from the swap alternate
- pockets fingerprints, transactions you made, and many others. that could be linked by a sufficiently motivated sleuth
So, it does enhance your privateness from different community members typically, however relying on what your menace mannequin is, an adversary may a) simply ask prospects of the unique alternate what they did after buying there, and usually assume that you just nonetheless personal the cash except you present info that convinces them in any other case, or b) assuming that your purported adversary has entry to the logs of each providers merely be capable of observe the trail fully.