SlideShare a Scribd company logo
1 of 9
1
How Identity and Privacy
Apply to Bitcoin
Dr Craig Wright | Chief Scientist | nChain
Bitcoin Masterclass Series: Introductory Session
DAY 2
#1
Delegate Registration
Session 1: Day One Review and Discussion
Dr Wright will recap on the topics covered in yesterday’s session.
Coffee Break
Session 2: Private Identity
Keeping your identity private on the blockchain is possible—even
though transactions are completely transparent. What is needed to
prove your identity to transact?
Lunch
Session 3: Identity Proofs
Without a centralised authority, how is identity demonstrated on
the blockchain without exposing sensitive information?
Coffee Break
Session 4: Topic Reviews
Review of audience discussion topics.
09:00 – 09:30
09:30 – 11:00
11:00 – 11:15
11.15 – 12.45
12.45 – 13.45
13.45 – 15.15
15.15 – 15.30
15.30 – 17.00
Agenda
DAY
2
3
HOW IDENTITY AND PRIVACY APPLY TO BITCOIN
Day1–ReviewandDiscussion
P2P Knowledge
Privacy
2
Anonymity
3 4
Confidentiality
1
4
HOW IDENTITY AND PRIVACY APPLY TO BITCOIN
PrivateIdentity&IdentityProofs
5
Private Identity
HOW IDENTITY AND PRIVACY APPLY TO BITCOIN
Proof when needed:
✓ i.e., by age; or
✓ using a driving licence
We can use a
zero-knowledge proof
(ZKP) to link identity by
attribute - without
sharing all personal
information.
6
Private Identity
HOW IDENTITY AND PRIVACY APPLY TO BITCOIN
Proof when needed:
✓ i.e., by age; or
✓ using a driving licence
We can use a
zero-knowledge proof
(ZKP) to link identity by
attribute—without
sharing all personal
information.
7
HOW IDENTITY AND PRIVACY APPLY TO BITCOIN
AudienceDiscussionTopics
8
HOW IDENTITY AND PRIVACY APPLY TO BITCOIN
Thankyou
www.nchain.com
contact@nchain.com

More Related Content

Similar to Bitcoin Masterclass (London) - Day 2

CGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption MechanismCGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption Mechanism
Amit Singh
 
Bitcoin and blockchain security
Bitcoin and blockchain securityBitcoin and blockchain security
Bitcoin and blockchain security
Dlive Dlive
 
Introduction to Cryptocurrencies
Introduction to CryptocurrenciesIntroduction to Cryptocurrencies
Introduction to Cryptocurrencies
Owen Hart
 

Similar to Bitcoin Masterclass (London) - Day 2 (20)

PresentationV_1
PresentationV_1PresentationV_1
PresentationV_1
 
5 Core Blockchain Technology Concepts
5 Core Blockchain Technology Concepts 5 Core Blockchain Technology Concepts
5 Core Blockchain Technology Concepts
 
An Overview of Cryptocurrencies
An Overview of CryptocurrenciesAn Overview of Cryptocurrencies
An Overview of Cryptocurrencies
 
Bitcoin beginner-guide (1)
Bitcoin beginner-guide (1)Bitcoin beginner-guide (1)
Bitcoin beginner-guide (1)
 
CGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption MechanismCGI White Paper - Key Incryption Mechanism
CGI White Paper - Key Incryption Mechanism
 
Roseville Blockchain Meetup #1
Roseville Blockchain Meetup #1Roseville Blockchain Meetup #1
Roseville Blockchain Meetup #1
 
BLOCKCHAIN.pptx
 BLOCKCHAIN.pptx BLOCKCHAIN.pptx
BLOCKCHAIN.pptx
 
Analyzing Cryptocurrencies with Python
Analyzing Cryptocurrencies with PythonAnalyzing Cryptocurrencies with Python
Analyzing Cryptocurrencies with Python
 
Blockchain explained for non-technicals
Blockchain explained for non-technicalsBlockchain explained for non-technicals
Blockchain explained for non-technicals
 
5 quick benefits of bitcoin certification
5 quick benefits of bitcoin certification5 quick benefits of bitcoin certification
5 quick benefits of bitcoin certification
 
Blockchain event 01
Blockchain event 01Blockchain event 01
Blockchain event 01
 
Blockchain Brochure
Blockchain Brochure Blockchain Brochure
Blockchain Brochure
 
Blockchain technology is best explained timeline, types, uses and how to invest
Blockchain technology is best explained timeline, types, uses and how to investBlockchain technology is best explained timeline, types, uses and how to invest
Blockchain technology is best explained timeline, types, uses and how to invest
 
Bitcoin and blockchain security
Bitcoin and blockchain securityBitcoin and blockchain security
Bitcoin and blockchain security
 
InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity InDITA - Understanding Self-Sovereign Identity
InDITA - Understanding Self-Sovereign Identity
 
Introduction to blockchain_hcmc_20170820
Introduction to blockchain_hcmc_20170820Introduction to blockchain_hcmc_20170820
Introduction to blockchain_hcmc_20170820
 
Bitcoin and Blockchain overview
Bitcoin and Blockchain overviewBitcoin and Blockchain overview
Bitcoin and Blockchain overview
 
Blockchain Technology Fundamentals
Blockchain Technology FundamentalsBlockchain Technology Fundamentals
Blockchain Technology Fundamentals
 
Introduction to Cryptocurrencies
Introduction to CryptocurrenciesIntroduction to Cryptocurrencies
Introduction to Cryptocurrencies
 
CryptoFinalizedBSAF1A.pptx
CryptoFinalizedBSAF1A.pptxCryptoFinalizedBSAF1A.pptx
CryptoFinalizedBSAF1A.pptx
 

More from Liz Louw

More from Liz Louw (8)

The BSV Association’s Digital Wallet Survey - the results are in!
The BSV Association’s Digital Wallet Survey - the results are in!The BSV Association’s Digital Wallet Survey - the results are in!
The BSV Association’s Digital Wallet Survey - the results are in!
 
nLocktime and Delayed Transactions | Bitcoin Masterclass Day 2
nLocktime and Delayed Transactions | Bitcoin Masterclass Day 2nLocktime and Delayed Transactions | Bitcoin Masterclass Day 2
nLocktime and Delayed Transactions | Bitcoin Masterclass Day 2
 
nLocktime and Delayed Transactions | Bitcoin Masterclass Day 1
nLocktime and Delayed Transactions | Bitcoin Masterclass Day 1nLocktime and Delayed Transactions | Bitcoin Masterclass Day 1
nLocktime and Delayed Transactions | Bitcoin Masterclass Day 1
 
he Bitcoin Masterclass (Slovenia) Day 1: Multicast and IPv6, Bitcoin and IPv6...
he Bitcoin Masterclass (Slovenia) Day 1: Multicast and IPv6, Bitcoin and IPv6...he Bitcoin Masterclass (Slovenia) Day 1: Multicast and IPv6, Bitcoin and IPv6...
he Bitcoin Masterclass (Slovenia) Day 1: Multicast and IPv6, Bitcoin and IPv6...
 
The Bitcoin Masterclass (Zurich) Day 2: Multiple transaction systems
The Bitcoin Masterclass (Zurich) Day 2: Multiple transaction systemsThe Bitcoin Masterclass (Zurich) Day 2: Multiple transaction systems
The Bitcoin Masterclass (Zurich) Day 2: Multiple transaction systems
 
Blockchain as a Foundation for Industrial IoT | Dr Craig S. Wright
Blockchain as a Foundation for Industrial IoT | Dr Craig S. WrightBlockchain as a Foundation for Industrial IoT | Dr Craig S. Wright
Blockchain as a Foundation for Industrial IoT | Dr Craig S. Wright
 
Partnerships Working in Health and Social Care
Partnerships Working in Health and Social CarePartnerships Working in Health and Social Care
Partnerships Working in Health and Social Care
 
What are the Types of Common Mental Illnesses and Disorders?
What are the Types of Common Mental Illnesses and Disorders?What are the Types of Common Mental Illnesses and Disorders?
What are the Types of Common Mental Illnesses and Disorders?
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Recently uploaded (20)

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Bitcoin Masterclass (London) - Day 2

  • 1. 1 How Identity and Privacy Apply to Bitcoin Dr Craig Wright | Chief Scientist | nChain Bitcoin Masterclass Series: Introductory Session DAY 2 #1
  • 2. Delegate Registration Session 1: Day One Review and Discussion Dr Wright will recap on the topics covered in yesterday’s session. Coffee Break Session 2: Private Identity Keeping your identity private on the blockchain is possible—even though transactions are completely transparent. What is needed to prove your identity to transact? Lunch Session 3: Identity Proofs Without a centralised authority, how is identity demonstrated on the blockchain without exposing sensitive information? Coffee Break Session 4: Topic Reviews Review of audience discussion topics. 09:00 – 09:30 09:30 – 11:00 11:00 – 11:15 11.15 – 12.45 12.45 – 13.45 13.45 – 15.15 15.15 – 15.30 15.30 – 17.00 Agenda DAY 2
  • 3. 3 HOW IDENTITY AND PRIVACY APPLY TO BITCOIN Day1–ReviewandDiscussion P2P Knowledge Privacy 2 Anonymity 3 4 Confidentiality 1
  • 4. 4 HOW IDENTITY AND PRIVACY APPLY TO BITCOIN PrivateIdentity&IdentityProofs
  • 5. 5 Private Identity HOW IDENTITY AND PRIVACY APPLY TO BITCOIN Proof when needed: ✓ i.e., by age; or ✓ using a driving licence We can use a zero-knowledge proof (ZKP) to link identity by attribute - without sharing all personal information.
  • 6. 6 Private Identity HOW IDENTITY AND PRIVACY APPLY TO BITCOIN Proof when needed: ✓ i.e., by age; or ✓ using a driving licence We can use a zero-knowledge proof (ZKP) to link identity by attribute—without sharing all personal information.
  • 7. 7 HOW IDENTITY AND PRIVACY APPLY TO BITCOIN AudienceDiscussionTopics
  • 8. 8 HOW IDENTITY AND PRIVACY APPLY TO BITCOIN Thankyou