What kind of privacy protections would you have had them include?
That's not the technical description I was looking for.
I understand that it's your goals, but how do you expect to get there? What would the protocol look like? What would signaling look like in order to accomplish private transactions that couldn't be tracked?
You say they failed to implement privacy protections, but I'm asking specifically how those protections might have worked.
There may have been very good reasons not to include them, after all.