Assuming you are searching for monetary privateness from different community members, sure most likely. Else it relies on what sort of info entry your hypothetical adversary has.
I am not accustomed to any of the three providers. Cursory search appears to point that they’re centrally operated, however some are known as “non-custodial”. It is not apparent to me, what stated function is meant to ivolve precisely or how it’s carried out, however I did not strive too onerous to search out out.
I didn’t see any indication or guarantees that the providers don’t hold logs. Actually, since a few of these providers promote their nice buyer assist, I might count on them to maintain complete logs so as to have the ability to reply to buyer assist requests. Clearly, no one however the workers (or perhaps even only a subset of them) can inform you what the precise inner knowledge retention practices of those providers are.
That being stated, buying and selling to a different coin will disintermediate your transaction historical past to all however the trade that facilitated the commerce (“swap trade”). Relying on how the swap trade receives the deposits or facilitates the commerce, the service that you simply initially bought from (“authentic trade”) wouldn’t essentially know who you despatched to, however particularly would have nearly no probability to attach it to the later fee that despatched you the opposite forex, besides maybe by the quantities transferred and the timing or through mixed info from authentic and swap trade.
There are nonetheless data of:
- your authentic buy on the authentic trade along with your full buyer information
- the onchain file of the switch(s) connecting the unique trade and the swap trade
- the file on the swap trade the place you hopped chains
- the onchain file of the withdrawal from the swap trade
- pockets fingerprints, transactions you made, and so on. that is likely to be linked by a sufficiently motivated sleuth
So, it does enhance your privateness from different community members basically, however relying on what your menace mannequin is, an adversary may a) simply ask clients of the unique trade what they did after buying there, and usually assume that you simply nonetheless personal the cash except you present info that convinces them in any other case, or b) assuming that your purported adversary has entry to the logs of each providers merely be capable of observe the trail fully.