SlideShare a Scribd company logo
1 of 13
Download to read offline
Privacy and Security - Guaranteed
Boolberry Solves CryptoNote Issues
Boolberry Solves CryptoNote Issues 1
Boolberry’s feature:
Unlinkable Outputs
2
In this presentation you’ll find out how anonymity
works in ordinary CryptoNote technology and
modified CryptoNote technology.Boolberry’s
Boolberry Solves CryptoNote Issues
Ordinary CryptoNote Technology
Let’s compare!
3
Alice wants to send a coin to and keep this transfer private.Romulus
To achieve this, she uses Bob’s and Carol’s coins as *mixins.
At the same time, Dave wants to send a coin to , and also wants toRemus
keep the transfer private. To achieve this he took Bob’s coin as a *mixin.
*mixin - it's a part of Cryptonote technology that makes your transfer private.
coin
coin
coin
coin
coin
coin
Alice
Romulus: “From Alice, Bob or Carol?”
Remus: “From Bob or Dave?”
Bob
Carol
Dave
Ordinary CryptoNote transfer
Boolberry Solves CryptoNote Issues
Let’s compare!
Romulus’ Remus’and transfer is unlinkable. Great!
But what if Bob will decide to send his coin to Leyla without mixin?
4
coin
coin
coin
coin
coin
coin
coin
Alice
Romulus: “From Alice, Bob or Carol?”
Remus: “From Bob or Dave?”
Leyla: “I received a coin from Bob!”
Bob
Carol
Dave
Bob sending his coin to Leyla without mixin
Ordinary CryptoNote Technology
Boolberry Solves CryptoNote Issues
Once Bob sent his coin without mixins,
his coin in other mixins became fake.
5
coin
coin
Leyla: “I received a coin from Bob!”
Bob
coin
coin
coin
coin
coin
Alice
Romulus: “From Alice, Bob or Carol?”
Remus: “From Bob or Dave?”
Carol
Dave
Bob sending his coin to Leyla without mixin
Let’s compare!
Ordinary CryptoNote Technology
Boolberry Solves CryptoNote Issues
Since all mixins with Bob’s coin became ,fake
Dave’s transfer is not unlinkable anymore!
6
coin
coin
Leyla: “I received a coin from Bob!”
Bob
coin
coin
coin
coin
coin
Alice
Romulus: “From Alice, Bob or Carol?”
Carol
Dave
Remus receives a linkable coin
Remus: “Transaction became linkable!”
Let’s compare!
Ordinary CryptoNote Technology
Boolberry Solves CryptoNote Issues
The same issue occurs when Carol sends her coin without mixin to John.
Alices’s transfer is not unlinkable anymore!
7
coin
coin
Leyla: “I received a coin from Bob!”
Bob
coin
coin
coin
coin
coin
coin
Alice
Romulus: “Transaction became linkable!”
Remus: “Transaction became linkable!”
John: “I received a coin from Carol!”
Carol
Dave
Carol sending her coin to John without mixin
Let’s compare!
Ordinary CryptoNote Technology
Boolberry Solves CryptoNote Issues
The problem is that ordinary CryptoNote coin’s (Bytecoin/Monero)
*ring signatures from time to time.will lose unlikability
8
coin
coin
Leyla: “I received a coin from Bob!”
Bob
coin
coin
coin
coin
coin
coin
Alice
Romulus: “Transaction became linkable!”
Remus: “Transaction became linkable!”
John: “I received a coin from Carol!”
Carol
Dave
Carol sending her coin to John without mixin
*ring signature - Cryptographic algorithm used in CryptoNote technology for transaction validation.
Let’s compare!
Ordinary CryptoNote Technology
Boolberry Solves CryptoNote Issues
How does solve this critical issue?
Modified CryptoNote Technology
Unlike other CryptoNote coins such as Bytecoin and Monero,
Boolberry has a special in each transaction’s output.flag
With that flag the sender can set the output to be used only with
specified number of mixins.
In other words, this flag guarantees that this coin won’t be spent without
mixins, so it will never compromise ring signatures in which it was
involved.
9
Ordinary CryptoNote Technology
Boolberry Solves CryptoNote Issues
10
Boolberry’s outputs with guaranteed anonymity
coin
coin
coin
coin
coin
coin
Alice
Romulus: “From Alice, Bob or Carol?”
Remus: “From Bob or Dave?”
Bob
Carol
Dave
Bob is trying to send his coin without mixins, but he can’t!
coin Leyla: “You need to use mixins!”
Modified CryptoNote Technology
Boolberry’s solution
Boolberry Solves CryptoNote Issues
11
Boolberry’s outputs with guaranteed anonymity
coin
coin
coin
coin
Alice
Bob: mixin!
Carol
Dave
coin
coin
Romulus: “From Alice, Bob or Carol?”
Remus: “From Bob or Dave?”
The only way to send this coin for Bob is with mixin
coin Leyla: “Mixin worked! A coin has been received!”
Boolberry’s solution
Modified CryptoNote Technology
Boolberry Solves CryptoNote Issues
12
coin
coin
coin
coin
Alice
Bob
Carol
Dave
coin
coin
Privacy and security - Guaranteed
coin
Boolberry’s solution
Modified CryptoNote Technology
Boolberry’s outputs with guaranteed anonymity.
Using this feature you can be sure that your transfers
will stay unlinked forever.
Boolberry Solves CryptoNote Issues
Boolberry is the first and only
CryptoNote coin that can guarantee
unlinkability for users!
Guess what?
13
Boolberry is trading on andwww.poloniex.com www.bittrex.com
For more information please visit www.boolberry.com
Contact: press@boolberry.com
Boolberry Solves CryptoNote Issues

More Related Content

Recently uploaded

Recently uploaded (20)

The mythical technical debt. (Brooke, please, forgive me)
The mythical technical debt. (Brooke, please, forgive me)The mythical technical debt. (Brooke, please, forgive me)
The mythical technical debt. (Brooke, please, forgive me)
 
Abortion Pill Prices Mthatha (@](+27832195400*)[ 🏥 Women's Abortion Clinic In...
Abortion Pill Prices Mthatha (@](+27832195400*)[ 🏥 Women's Abortion Clinic In...Abortion Pill Prices Mthatha (@](+27832195400*)[ 🏥 Women's Abortion Clinic In...
Abortion Pill Prices Mthatha (@](+27832195400*)[ 🏥 Women's Abortion Clinic In...
 
Spring into AI presented by Dan Vega 5/14
Spring into AI presented by Dan Vega 5/14Spring into AI presented by Dan Vega 5/14
Spring into AI presented by Dan Vega 5/14
 
From Knowledge Graphs via Lego Bricks to scientific conversations.pptx
From Knowledge Graphs via Lego Bricks to scientific conversations.pptxFrom Knowledge Graphs via Lego Bricks to scientific conversations.pptx
From Knowledge Graphs via Lego Bricks to scientific conversations.pptx
 
architecting-ai-in-the-enterprise-apis-and-applications.pdf
architecting-ai-in-the-enterprise-apis-and-applications.pdfarchitecting-ai-in-the-enterprise-apis-and-applications.pdf
architecting-ai-in-the-enterprise-apis-and-applications.pdf
 
Encryption Recap: A Refresher on Key Concepts
Encryption Recap: A Refresher on Key ConceptsEncryption Recap: A Refresher on Key Concepts
Encryption Recap: A Refresher on Key Concepts
 
GraphSummit Milan - Visione e roadmap del prodotto Neo4j
GraphSummit Milan - Visione e roadmap del prodotto Neo4jGraphSummit Milan - Visione e roadmap del prodotto Neo4j
GraphSummit Milan - Visione e roadmap del prodotto Neo4j
 
Novo Nordisk: When Knowledge Graphs meet LLMs
Novo Nordisk: When Knowledge Graphs meet LLMsNovo Nordisk: When Knowledge Graphs meet LLMs
Novo Nordisk: When Knowledge Graphs meet LLMs
 
Weeding your micro service landscape.pdf
Weeding your micro service landscape.pdfWeeding your micro service landscape.pdf
Weeding your micro service landscape.pdf
 
Rapidoform for Modern Form Building and Insights
Rapidoform for Modern Form Building and InsightsRapidoform for Modern Form Building and Insights
Rapidoform for Modern Form Building and Insights
 
Microsoft365_Dev_Security_2024_05_16.pdf
Microsoft365_Dev_Security_2024_05_16.pdfMicrosoft365_Dev_Security_2024_05_16.pdf
Microsoft365_Dev_Security_2024_05_16.pdf
 
Transformer Neural Network Use Cases with Links
Transformer Neural Network Use Cases with LinksTransformer Neural Network Use Cases with Links
Transformer Neural Network Use Cases with Links
 
From Theory to Practice: Utilizing SpiraPlan's REST API
From Theory to Practice: Utilizing SpiraPlan's REST APIFrom Theory to Practice: Utilizing SpiraPlan's REST API
From Theory to Practice: Utilizing SpiraPlan's REST API
 
Workshop - Architecting Innovative Graph Applications- GraphSummit Milan
Workshop -  Architecting Innovative Graph Applications- GraphSummit MilanWorkshop -  Architecting Innovative Graph Applications- GraphSummit Milan
Workshop - Architecting Innovative Graph Applications- GraphSummit Milan
 
BusinessGPT - Security and Governance for Generative AI
BusinessGPT  - Security and Governance for Generative AIBusinessGPT  - Security and Governance for Generative AI
BusinessGPT - Security and Governance for Generative AI
 
Effective Strategies for Wix's Scaling challenges - GeeCon
Effective Strategies for Wix's Scaling challenges - GeeConEffective Strategies for Wix's Scaling challenges - GeeCon
Effective Strategies for Wix's Scaling challenges - GeeCon
 
Community is Just as Important as Code by Andrea Goulet
Community is Just as Important as Code by Andrea GouletCommunity is Just as Important as Code by Andrea Goulet
Community is Just as Important as Code by Andrea Goulet
 
Your Ultimate Web Studio for Streaming Anywhere | Evmux
Your Ultimate Web Studio for Streaming Anywhere | EvmuxYour Ultimate Web Studio for Streaming Anywhere | Evmux
Your Ultimate Web Studio for Streaming Anywhere | Evmux
 
Abortion Clinic In Johannesburg ](+27832195400*)[ 🏥 Safe Abortion Pills in Jo...
Abortion Clinic In Johannesburg ](+27832195400*)[ 🏥 Safe Abortion Pills in Jo...Abortion Clinic In Johannesburg ](+27832195400*)[ 🏥 Safe Abortion Pills in Jo...
Abortion Clinic In Johannesburg ](+27832195400*)[ 🏥 Safe Abortion Pills in Jo...
 
Auto Affiliate AI Earns First Commission in 3 Hours..pdf
Auto Affiliate  AI Earns First Commission in 3 Hours..pdfAuto Affiliate  AI Earns First Commission in 3 Hours..pdf
Auto Affiliate AI Earns First Commission in 3 Hours..pdf
 

Featured

Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 

Boolberry solves CryptoNote Issues

  • 1. Privacy and Security - Guaranteed Boolberry Solves CryptoNote Issues Boolberry Solves CryptoNote Issues 1
  • 2. Boolberry’s feature: Unlinkable Outputs 2 In this presentation you’ll find out how anonymity works in ordinary CryptoNote technology and modified CryptoNote technology.Boolberry’s Boolberry Solves CryptoNote Issues
  • 3. Ordinary CryptoNote Technology Let’s compare! 3 Alice wants to send a coin to and keep this transfer private.Romulus To achieve this, she uses Bob’s and Carol’s coins as *mixins. At the same time, Dave wants to send a coin to , and also wants toRemus keep the transfer private. To achieve this he took Bob’s coin as a *mixin. *mixin - it's a part of Cryptonote technology that makes your transfer private. coin coin coin coin coin coin Alice Romulus: “From Alice, Bob or Carol?” Remus: “From Bob or Dave?” Bob Carol Dave Ordinary CryptoNote transfer Boolberry Solves CryptoNote Issues
  • 4. Let’s compare! Romulus’ Remus’and transfer is unlinkable. Great! But what if Bob will decide to send his coin to Leyla without mixin? 4 coin coin coin coin coin coin coin Alice Romulus: “From Alice, Bob or Carol?” Remus: “From Bob or Dave?” Leyla: “I received a coin from Bob!” Bob Carol Dave Bob sending his coin to Leyla without mixin Ordinary CryptoNote Technology Boolberry Solves CryptoNote Issues
  • 5. Once Bob sent his coin without mixins, his coin in other mixins became fake. 5 coin coin Leyla: “I received a coin from Bob!” Bob coin coin coin coin coin Alice Romulus: “From Alice, Bob or Carol?” Remus: “From Bob or Dave?” Carol Dave Bob sending his coin to Leyla without mixin Let’s compare! Ordinary CryptoNote Technology Boolberry Solves CryptoNote Issues
  • 6. Since all mixins with Bob’s coin became ,fake Dave’s transfer is not unlinkable anymore! 6 coin coin Leyla: “I received a coin from Bob!” Bob coin coin coin coin coin Alice Romulus: “From Alice, Bob or Carol?” Carol Dave Remus receives a linkable coin Remus: “Transaction became linkable!” Let’s compare! Ordinary CryptoNote Technology Boolberry Solves CryptoNote Issues
  • 7. The same issue occurs when Carol sends her coin without mixin to John. Alices’s transfer is not unlinkable anymore! 7 coin coin Leyla: “I received a coin from Bob!” Bob coin coin coin coin coin coin Alice Romulus: “Transaction became linkable!” Remus: “Transaction became linkable!” John: “I received a coin from Carol!” Carol Dave Carol sending her coin to John without mixin Let’s compare! Ordinary CryptoNote Technology Boolberry Solves CryptoNote Issues
  • 8. The problem is that ordinary CryptoNote coin’s (Bytecoin/Monero) *ring signatures from time to time.will lose unlikability 8 coin coin Leyla: “I received a coin from Bob!” Bob coin coin coin coin coin coin Alice Romulus: “Transaction became linkable!” Remus: “Transaction became linkable!” John: “I received a coin from Carol!” Carol Dave Carol sending her coin to John without mixin *ring signature - Cryptographic algorithm used in CryptoNote technology for transaction validation. Let’s compare! Ordinary CryptoNote Technology Boolberry Solves CryptoNote Issues
  • 9. How does solve this critical issue? Modified CryptoNote Technology Unlike other CryptoNote coins such as Bytecoin and Monero, Boolberry has a special in each transaction’s output.flag With that flag the sender can set the output to be used only with specified number of mixins. In other words, this flag guarantees that this coin won’t be spent without mixins, so it will never compromise ring signatures in which it was involved. 9 Ordinary CryptoNote Technology Boolberry Solves CryptoNote Issues
  • 10. 10 Boolberry’s outputs with guaranteed anonymity coin coin coin coin coin coin Alice Romulus: “From Alice, Bob or Carol?” Remus: “From Bob or Dave?” Bob Carol Dave Bob is trying to send his coin without mixins, but he can’t! coin Leyla: “You need to use mixins!” Modified CryptoNote Technology Boolberry’s solution Boolberry Solves CryptoNote Issues
  • 11. 11 Boolberry’s outputs with guaranteed anonymity coin coin coin coin Alice Bob: mixin! Carol Dave coin coin Romulus: “From Alice, Bob or Carol?” Remus: “From Bob or Dave?” The only way to send this coin for Bob is with mixin coin Leyla: “Mixin worked! A coin has been received!” Boolberry’s solution Modified CryptoNote Technology Boolberry Solves CryptoNote Issues
  • 12. 12 coin coin coin coin Alice Bob Carol Dave coin coin Privacy and security - Guaranteed coin Boolberry’s solution Modified CryptoNote Technology Boolberry’s outputs with guaranteed anonymity. Using this feature you can be sure that your transfers will stay unlinked forever. Boolberry Solves CryptoNote Issues
  • 13. Boolberry is the first and only CryptoNote coin that can guarantee unlinkability for users! Guess what? 13 Boolberry is trading on andwww.poloniex.com www.bittrex.com For more information please visit www.boolberry.com Contact: press@boolberry.com Boolberry Solves CryptoNote Issues