This creates a "ring" of possible signers. Decoys use real outputs drawn from a gamma distribution to produce realistic patterns. For the receiver, it used stealth addresses generate a unique, ...