Monero Presentation by Justin Ehrenhofer - Budapest, Hungary 2017Justin Ehrenhofer
This document summarizes key features of the cryptocurrency Monero including its focus on privacy, anonymity and untraceability. It discusses tools like ring signatures and ring confidential transactions that obscure transaction amounts and participant identities on the blockchain. It also notes some limitations around transaction size but outlines ongoing development work and an upcoming hardfork to address privacy and scaling.
Monero Presentation by Justin Ehrenhofer - Athens, Greece 2017Justin Ehrenhofer
This document summarizes Monero, a cryptocurrency that focuses on privacy and anonymity. It discusses how Monero uses ring signatures and ring confidential transactions (RingCT) to obscure transaction amounts and the origin of funds. It also covers Monero's history and ongoing development, including making privacy mandatory in 2016, the addition of RingCT in 2017, and planned hardforks to improve privacy and scalability. Regulatory compliance features like view keys are also summarized that allow selective transparency of transactions for entities like charities or parents.
Monero is a cryptocurrency that focuses on privacy and fungibility. It uses ring signatures and ring confidential transactions (RingCT) to obscure transaction amounts and the origin of funds. Ring signatures mix the real spender's key with other keys to make it impossible to tell which key was used. RingCT hides amounts by using Pedersen commitments. Monero also uses stealth addresses to hide recipient addresses. Future developments aim to further improve privacy with larger ring sizes and reduce transaction sizes with techniques like bulletproofs. The Monero community and ecosystem continue growing with services like XMR.TO and more merchants accepting Monero.
Monero Presentation by Justin Ehrenhofer - Oslo, Norway 2017Justin Ehrenhofer
Ring signatures and ring confidential transactions (RingCT) help provide privacy and security in Monero transactions. Transactions include dummy outputs which make it difficult to determine real inputs and outputs, providing privacy. Stealth addresses further obscure sender and recipient identities. Monero aims to provide untraceable and private transactions by default through these techniques.
Monero Presentation by Justin Ehrenhofer - Brussels, Belguim 2017Justin Ehrenhofer
Monero is a cryptocurrency that focuses on privacy and anonymity. It uses ring signatures and ring confidential transactions (RingCT) to obscure transaction amounts and the origin of funds. Ring signatures group transactions together so the real input is indistinguishable among others. RingCT further hides amounts through commitments. Stealth addresses receive payments privately. Monero development aims to improve usability and compliance while maintaining strong privacy through techniques like view keys and sub-addresses.
Monero Presentation by Justin Ehrenhofer - Helsinki, Finland 2017Justin Ehrenhofer
Monero is a cryptocurrency that focuses on privacy and fungibility. It uses ring signatures and ring confidential transactions (RingCT) to obscure transaction amounts and the origin of funds. Ring signatures mix the real spender's key with others, making it impossible to tell which key was used. RingCT hides amounts and allows only the recipient to see the transaction amount. Upcoming upgrades will increase the minimum ring size and implement other improvements. Monero development prioritizes privacy, security, and decentralization through ongoing upgrades to its protocol.
Monero Presentation by Justin Ehrenhofer - Stockholm, Sweden 2017Justin Ehrenhofer
Monero is a cryptocurrency that focuses on privacy and anonymity. It uses ring signatures and ring confidential transactions (RingCT) to obscure transaction amounts and the origin of funds. Ring signatures group transactions together so the real input is indistinguishable among others in the group. RingCT further hides transaction amounts using Pedersen commitments. Monero also uses stealth addresses to mask the recipient and Kovri to further anonymize IP addresses. Upcoming upgrades will increase the minimum ring size and implement other improvements to enhance privacy and usability.
Monero Presentation by Justin Ehrenhofer - Rome, Italy 2017Justin Ehrenhofer
This document introduces Monero, a cryptocurrency that focuses on privacy and anonymity. It summarizes Monero's key features as:
1) Using ring signatures and Ring Confidential Transactions (RingCT) to obscure the origin, amounts, and destinations of transactions.
2) Implementing stealth addresses to hide receiving addresses and amounts.
3) Making privacy the default by making all transactions private starting in March 2016.
4) Continuing development to improve privacy, usability, and compliance through features like view keys, sub-addresses, and lightweight wallets.
Monero Presentation by Justin Ehrenhofer - Budapest, Hungary 2017Justin Ehrenhofer
This document summarizes key features of the cryptocurrency Monero including its focus on privacy, anonymity and untraceability. It discusses tools like ring signatures and ring confidential transactions that obscure transaction amounts and participant identities on the blockchain. It also notes some limitations around transaction size but outlines ongoing development work and an upcoming hardfork to address privacy and scaling.
Monero Presentation by Justin Ehrenhofer - Athens, Greece 2017Justin Ehrenhofer
This document summarizes Monero, a cryptocurrency that focuses on privacy and anonymity. It discusses how Monero uses ring signatures and ring confidential transactions (RingCT) to obscure transaction amounts and the origin of funds. It also covers Monero's history and ongoing development, including making privacy mandatory in 2016, the addition of RingCT in 2017, and planned hardforks to improve privacy and scalability. Regulatory compliance features like view keys are also summarized that allow selective transparency of transactions for entities like charities or parents.
Monero is a cryptocurrency that focuses on privacy and fungibility. It uses ring signatures and ring confidential transactions (RingCT) to obscure transaction amounts and the origin of funds. Ring signatures mix the real spender's key with other keys to make it impossible to tell which key was used. RingCT hides amounts by using Pedersen commitments. Monero also uses stealth addresses to hide recipient addresses. Future developments aim to further improve privacy with larger ring sizes and reduce transaction sizes with techniques like bulletproofs. The Monero community and ecosystem continue growing with services like XMR.TO and more merchants accepting Monero.
Monero Presentation by Justin Ehrenhofer - Oslo, Norway 2017Justin Ehrenhofer
Ring signatures and ring confidential transactions (RingCT) help provide privacy and security in Monero transactions. Transactions include dummy outputs which make it difficult to determine real inputs and outputs, providing privacy. Stealth addresses further obscure sender and recipient identities. Monero aims to provide untraceable and private transactions by default through these techniques.
Monero Presentation by Justin Ehrenhofer - Brussels, Belguim 2017Justin Ehrenhofer
Monero is a cryptocurrency that focuses on privacy and anonymity. It uses ring signatures and ring confidential transactions (RingCT) to obscure transaction amounts and the origin of funds. Ring signatures group transactions together so the real input is indistinguishable among others. RingCT further hides amounts through commitments. Stealth addresses receive payments privately. Monero development aims to improve usability and compliance while maintaining strong privacy through techniques like view keys and sub-addresses.
Monero Presentation by Justin Ehrenhofer - Helsinki, Finland 2017Justin Ehrenhofer
Monero is a cryptocurrency that focuses on privacy and fungibility. It uses ring signatures and ring confidential transactions (RingCT) to obscure transaction amounts and the origin of funds. Ring signatures mix the real spender's key with others, making it impossible to tell which key was used. RingCT hides amounts and allows only the recipient to see the transaction amount. Upcoming upgrades will increase the minimum ring size and implement other improvements. Monero development prioritizes privacy, security, and decentralization through ongoing upgrades to its protocol.
Monero Presentation by Justin Ehrenhofer - Stockholm, Sweden 2017Justin Ehrenhofer
Monero is a cryptocurrency that focuses on privacy and anonymity. It uses ring signatures and ring confidential transactions (RingCT) to obscure transaction amounts and the origin of funds. Ring signatures group transactions together so the real input is indistinguishable among others in the group. RingCT further hides transaction amounts using Pedersen commitments. Monero also uses stealth addresses to mask the recipient and Kovri to further anonymize IP addresses. Upcoming upgrades will increase the minimum ring size and implement other improvements to enhance privacy and usability.
Monero Presentation by Justin Ehrenhofer - Rome, Italy 2017Justin Ehrenhofer
This document introduces Monero, a cryptocurrency that focuses on privacy and anonymity. It summarizes Monero's key features as:
1) Using ring signatures and Ring Confidential Transactions (RingCT) to obscure the origin, amounts, and destinations of transactions.
2) Implementing stealth addresses to hide receiving addresses and amounts.
3) Making privacy the default by making all transactions private starting in March 2016.
4) Continuing development to improve privacy, usability, and compliance through features like view keys, sub-addresses, and lightweight wallets.
Monero Presentation by Justin Ehrenhofer - Barcelona, Spain 2017Justin Ehrenhofer
Monero is a cryptocurrency that focuses on privacy and fungibility. It uses ring signatures, stealth addresses, and ring confidential transactions (RingCT) to obscure transaction metadata. Ring signatures make it impossible to link inputs and outputs of a transaction. Stealth addresses hide recipient information. RingCT hides transaction amounts. Monero is undergoing ongoing development to improve its privacy and usability, with a planned hard fork in September to make RingCT mandatory.
Monero Presentation by Justin Ehrenhofer - Milwaukee, Wisconsin 2017Justin Ehrenhofer
This document provides an overview of Monero, a cryptocurrency focused on privacy and decentralization. It discusses Monero's use of ring signatures and ring confidential transactions to obscure sender, recipient, and transaction amounts. It also covers Monero's development history and ongoing work to improve usability, compliance, and the community.
Monero Presentation by Justin Ehrenhofer - Vienna, Austria 2017Justin Ehrenhofer
This document summarizes Monero, a cryptocurrency focused on privacy and anonymity. It discusses how Monero uses ring signatures and ring confidential transactions to obscure sender, recipient, and transaction amounts. It also explains other privacy features like stealth addresses and optional view keys that allow selective transparency. The summary highlights Monero's ongoing development work to improve usability, compliance, and scalability through initiatives like multisig addresses, lightweight wallets, and scheduled hardforks.
Monero Presentation by Justin Ehrenhofer - Copenhagen, Denmark 2017Justin Ehrenhofer
Monero is a cryptocurrency that focuses on privacy and anonymity. It uses ring signatures to hide the origin and destination of transactions, and ring confidential transactions to conceal amounts. Monero development includes ongoing work to improve privacy through techniques like larger minimum ring sizes, improved input selection algorithms, and integration with networks like I2P. The Monero community is also growing to support further development and adoption of the currency.
Monero Presentation by Justin Ehrenhofer - Cologne, Germany 2017Justin Ehrenhofer
Monero is a cryptocurrency that focuses on privacy and fungibility. It uses ring signatures, stealth addresses, and ring confidential transactions (RingCT) to obscure transaction metadata. Ring signatures make it impossible to link inputs and outputs of a transaction. Stealth addresses hide recipient information. RingCT hides transaction amounts. Monero is undergoing ongoing development to improve its privacy and usability, with a planned hardfork in September to make RingCT mandatory. Its community and adoption have grown substantially in recent years.
RNASeqR: RNA-Seq workflow for case-control studyKuanHaoChao
This R package is designed for case-control RNA-Seq analysis (two-group). There are six steps: "RNASeqRParam S4 Object Creation", "Environment Setup", "Quality Assessment", "Reads Alignment & Quantification", "Gene-level Differential Analyses" and "Functional Analyses". Each step corresponds to a function in this package. After running functions in order, a basic RNASeq analysis would be done easily.
Vortrag über anonyme Blockchain Protokolle @PwC
- Warum Bitcoin nicht anonym ist
- Monero: Ring Signature, RingCT & Stealth Adresses
- Zero-Knowledge-Proof und zkSnarks
The Advanced Encryption Standard, also known by its original name Rijndael, is a specification for the encryption of electronic data established by the U.S.
This document contains the non-default configuration of a network switch, including VLAN, port, and logging settings. VLANs are created and named for different departments and services. Port priorities and VLAN access ports are configured. A logging server is configured to receive logs.
cnc, mesin cnc, fanuc, haas, makino, yaskawa, doosan, mesin bubut, mesin milling, mesin tapping, wirecut, mesin press, mesin pabrik, mesin otomotif, sparepart mesin cnc
Monero Presentation by Justin Ehrenhofer - Warsaw, Poland 2017Justin Ehrenhofer
This document summarizes key aspects of the cryptocurrency Monero including its privacy features like ring signatures and ring confidential transactions. It explains how Monero transactions work compared to Bitcoin by obscuring sender, recipient, and amount through these techniques. The document also covers some limitations of Monero and ongoing development work to improve areas like transaction size and integration of new features.
Monero Presentation by Justin Ehrenhofer - Wroclaw, Poland 2017Justin Ehrenhofer
This document summarizes key features of the Monero cryptocurrency including its focus on privacy and fungibility. Monero uses ring signatures, ring confidential transactions (RingCT), and stealth addresses to obscure the origin, amounts, and destinations of transactions. It has undergone mandatory privacy upgrades and aims to provide full regulatory compliance through optional view keys while maintaining user privacy. Ongoing development seeks to improve scalability and usability.
A visual, and easy to undertsand outline of the Bitcoin Protocol.
In this talk, I explain the 'legend' of Satoshi Nakamoto, and the protocol that he conceived. The specific aspects covered are Wallets, Addresses, Trasactions, The Block Chain, Mining and currency Issuance.
The intention is to help a general audience understand HOW Bitcoin achieves a decentralized peer to peer currency.
Armed with this understanding, groups are better equipped to have a critical discussion about the economic, social and political impacts of this technology.
The outline, and visual presentation seem to be effective for the purpose, so the content belongs to the creative commons. I ask that you credit me for the work, but you are free to copy and revise as you wish.
You can find the original content here (you'll have to copy the file to your own Google Drive in order to edit it):
http://bit.ly/1gyJmx2
The document discusses several Unix command line tools including ps, top, netstat, vmstat, lsof. Ps is used to list processes, top provides an interactive display of process information, netstat lists network connections and interface statistics, vmstat reports virtual memory statistics and lsof lists open files. Each tool has various options and filters that can be used to view specific details.
This document discusses cryptocurrency privacy implementations for Bitcoin and Dash. It describes CoinJoin, a technique used by JoinMarket to conduct mixing of Bitcoin transactions on the blockchain in a peer-to-peer manner. It also describes masternode mixing for Dash, which performs mixing of transactions ahead of time through masternodes. The document provides steps to set up a JoinMarket wallet, fund it, and conduct mixing by joining the peer-to-peer CoinJoin market and sending payments between different mixing depths.
#2 Case study Tachyon & ICOVO App by Yoshikazu Nishimura, ICOVO's CTOICOVO
【Outline】
We will welcome two blockchain engineers to dive deep into the development of wallets.
Yoshikazu Nishimura is a creator of Tachyon wallet that supports Ethereum and all the ERC20 standard tokens.
http://tachyon-wallet.io/en/
Alex Melville is an engineer at BitGo. BitGo is a company based in Palo Alto, CA. They make variety of products such as a wallet, an offline vault and institutional custody.
https://www.bitgo.com/
It's organized by ICOVO AG. https://icovo.co/
The document provides a summary of the history and development of proof-of-possession (PoP) mechanisms in the context of OAuth and related protocols over the past 16 years. It discusses early concepts like holder-of-key (HoK) and various token designs incorporating PoP like SAML assertions and JWTs. It also covers proposals like Token Binding and OAuth MTLS that aimed to provide PoP but saw limited adoption. More recently, DPoP was conceived to provide application-layer PoP for access tokens without requiring changes to TLS. The document traces the evolution of thinking and various approaches to demonstrating token possession in requests.
This document summarizes elements of the Bitcoin protocol for developers. It describes the blockchain network protocol, how transactions are structured with inputs and outputs, and how Bitcoin scripting works to lock and unlock transactions based on signatures and public keys. Bitcoin scripting uses a stack-based approach to evaluate transactions in a non-Turing complete manner. Examples are provided of common script patterns and a more complex script for an odd/even betting contract.
Evaluating Private Cryptocurrency Technologies and ImplementationsJustin Ehrenhofer
This document summarizes Justin Ehrenhofer's presentation on evaluating private technologies and implementations. The key points are:
1. Justin introduces himself and his background in cybersecurity and interest in distributed privacy systems.
2. The document discusses how privacy is not a binary concept and examines different threat models and implications of transparency versus privacy.
3. It provides an overview of how Monero aims to increase privacy through techniques like ring signatures, ring confidential transactions, stealth addresses and other methods, while acknowledging limitations.
4. The presentation emphasizes that privacy solutions should be evaluated based on both theoretical privacy and practical usability factors, and that no system provides perfect privacy due to limitations like metadata leaks and potential attack vectors
Defcon Monero Ring Signatures Presentation by Justin Ehrenhofer 2018Justin Ehrenhofer
This document discusses ring signatures in Monero and some of the challenges related to increasing the ring size. It covers how ring signatures are intended to provide plausible deniability but certain attacks can reduce that deniability. These include 0-decoy attacks, chain reaction attacks, and key image reuse on chain splits. The document recommends best practices like blacklisting compromised outputs and churning to help maintain anonymity. It also notes increasing the ring size faces technical challenges related to blockchain size and computation costs.
Блокчейн. Lego для интересующихся / Александр Боргардт (GolosCore) Ontico
HighLoad++ 2017
Зал «Конгресс-Холл», 7 ноября, 16:00
Презентация и тезисы:
http://www.highload.ru/2017/abstracts/3109.html
В докладе будут освещены некоторые фундаментальные свойства и особенности блокчейна, так как на его основе уже построено много проектов.
Блокчейн, как и любая технология, состоит из большого числа абстракций. И чтобы понять, как она функционирует на высоком уровне, необходимо разобраться с тем, что происходит на каждом из нижележащих уровней. Блокчейн не является исключением.
...
The document discusses blockchain and cryptocurrency technologies. It provides information on the following key points:
- Cryptographic hash functions are the backbone of blockchain and map variable-length inputs to fixed-length outputs, making it difficult to determine the input from the output or find colliding inputs.
- Blockchain uses these hash functions to create tamper-evident linked data structures like blocks in a blockchain or nodes in a Merkle tree. This allows transactions in a blockchain to be publicly verifiable and tamper-resistant.
- Bitcoin implements blockchain technology to create a decentralized transaction ledger. Transactions are grouped into blocks and miners compete to add new blocks through a computational puzzle. This consensus mechanism allows all nodes to agree
Monero Presentation by Justin Ehrenhofer - Barcelona, Spain 2017Justin Ehrenhofer
Monero is a cryptocurrency that focuses on privacy and fungibility. It uses ring signatures, stealth addresses, and ring confidential transactions (RingCT) to obscure transaction metadata. Ring signatures make it impossible to link inputs and outputs of a transaction. Stealth addresses hide recipient information. RingCT hides transaction amounts. Monero is undergoing ongoing development to improve its privacy and usability, with a planned hard fork in September to make RingCT mandatory.
Monero Presentation by Justin Ehrenhofer - Milwaukee, Wisconsin 2017Justin Ehrenhofer
This document provides an overview of Monero, a cryptocurrency focused on privacy and decentralization. It discusses Monero's use of ring signatures and ring confidential transactions to obscure sender, recipient, and transaction amounts. It also covers Monero's development history and ongoing work to improve usability, compliance, and the community.
Monero Presentation by Justin Ehrenhofer - Vienna, Austria 2017Justin Ehrenhofer
This document summarizes Monero, a cryptocurrency focused on privacy and anonymity. It discusses how Monero uses ring signatures and ring confidential transactions to obscure sender, recipient, and transaction amounts. It also explains other privacy features like stealth addresses and optional view keys that allow selective transparency. The summary highlights Monero's ongoing development work to improve usability, compliance, and scalability through initiatives like multisig addresses, lightweight wallets, and scheduled hardforks.
Monero Presentation by Justin Ehrenhofer - Copenhagen, Denmark 2017Justin Ehrenhofer
Monero is a cryptocurrency that focuses on privacy and anonymity. It uses ring signatures to hide the origin and destination of transactions, and ring confidential transactions to conceal amounts. Monero development includes ongoing work to improve privacy through techniques like larger minimum ring sizes, improved input selection algorithms, and integration with networks like I2P. The Monero community is also growing to support further development and adoption of the currency.
Monero Presentation by Justin Ehrenhofer - Cologne, Germany 2017Justin Ehrenhofer
Monero is a cryptocurrency that focuses on privacy and fungibility. It uses ring signatures, stealth addresses, and ring confidential transactions (RingCT) to obscure transaction metadata. Ring signatures make it impossible to link inputs and outputs of a transaction. Stealth addresses hide recipient information. RingCT hides transaction amounts. Monero is undergoing ongoing development to improve its privacy and usability, with a planned hardfork in September to make RingCT mandatory. Its community and adoption have grown substantially in recent years.
RNASeqR: RNA-Seq workflow for case-control studyKuanHaoChao
This R package is designed for case-control RNA-Seq analysis (two-group). There are six steps: "RNASeqRParam S4 Object Creation", "Environment Setup", "Quality Assessment", "Reads Alignment & Quantification", "Gene-level Differential Analyses" and "Functional Analyses". Each step corresponds to a function in this package. After running functions in order, a basic RNASeq analysis would be done easily.
Vortrag über anonyme Blockchain Protokolle @PwC
- Warum Bitcoin nicht anonym ist
- Monero: Ring Signature, RingCT & Stealth Adresses
- Zero-Knowledge-Proof und zkSnarks
The Advanced Encryption Standard, also known by its original name Rijndael, is a specification for the encryption of electronic data established by the U.S.
This document contains the non-default configuration of a network switch, including VLAN, port, and logging settings. VLANs are created and named for different departments and services. Port priorities and VLAN access ports are configured. A logging server is configured to receive logs.
cnc, mesin cnc, fanuc, haas, makino, yaskawa, doosan, mesin bubut, mesin milling, mesin tapping, wirecut, mesin press, mesin pabrik, mesin otomotif, sparepart mesin cnc
Monero Presentation by Justin Ehrenhofer - Warsaw, Poland 2017Justin Ehrenhofer
This document summarizes key aspects of the cryptocurrency Monero including its privacy features like ring signatures and ring confidential transactions. It explains how Monero transactions work compared to Bitcoin by obscuring sender, recipient, and amount through these techniques. The document also covers some limitations of Monero and ongoing development work to improve areas like transaction size and integration of new features.
Monero Presentation by Justin Ehrenhofer - Wroclaw, Poland 2017Justin Ehrenhofer
This document summarizes key features of the Monero cryptocurrency including its focus on privacy and fungibility. Monero uses ring signatures, ring confidential transactions (RingCT), and stealth addresses to obscure the origin, amounts, and destinations of transactions. It has undergone mandatory privacy upgrades and aims to provide full regulatory compliance through optional view keys while maintaining user privacy. Ongoing development seeks to improve scalability and usability.
A visual, and easy to undertsand outline of the Bitcoin Protocol.
In this talk, I explain the 'legend' of Satoshi Nakamoto, and the protocol that he conceived. The specific aspects covered are Wallets, Addresses, Trasactions, The Block Chain, Mining and currency Issuance.
The intention is to help a general audience understand HOW Bitcoin achieves a decentralized peer to peer currency.
Armed with this understanding, groups are better equipped to have a critical discussion about the economic, social and political impacts of this technology.
The outline, and visual presentation seem to be effective for the purpose, so the content belongs to the creative commons. I ask that you credit me for the work, but you are free to copy and revise as you wish.
You can find the original content here (you'll have to copy the file to your own Google Drive in order to edit it):
http://bit.ly/1gyJmx2
The document discusses several Unix command line tools including ps, top, netstat, vmstat, lsof. Ps is used to list processes, top provides an interactive display of process information, netstat lists network connections and interface statistics, vmstat reports virtual memory statistics and lsof lists open files. Each tool has various options and filters that can be used to view specific details.
This document discusses cryptocurrency privacy implementations for Bitcoin and Dash. It describes CoinJoin, a technique used by JoinMarket to conduct mixing of Bitcoin transactions on the blockchain in a peer-to-peer manner. It also describes masternode mixing for Dash, which performs mixing of transactions ahead of time through masternodes. The document provides steps to set up a JoinMarket wallet, fund it, and conduct mixing by joining the peer-to-peer CoinJoin market and sending payments between different mixing depths.
#2 Case study Tachyon & ICOVO App by Yoshikazu Nishimura, ICOVO's CTOICOVO
【Outline】
We will welcome two blockchain engineers to dive deep into the development of wallets.
Yoshikazu Nishimura is a creator of Tachyon wallet that supports Ethereum and all the ERC20 standard tokens.
http://tachyon-wallet.io/en/
Alex Melville is an engineer at BitGo. BitGo is a company based in Palo Alto, CA. They make variety of products such as a wallet, an offline vault and institutional custody.
https://www.bitgo.com/
It's organized by ICOVO AG. https://icovo.co/
The document provides a summary of the history and development of proof-of-possession (PoP) mechanisms in the context of OAuth and related protocols over the past 16 years. It discusses early concepts like holder-of-key (HoK) and various token designs incorporating PoP like SAML assertions and JWTs. It also covers proposals like Token Binding and OAuth MTLS that aimed to provide PoP but saw limited adoption. More recently, DPoP was conceived to provide application-layer PoP for access tokens without requiring changes to TLS. The document traces the evolution of thinking and various approaches to demonstrating token possession in requests.
This document summarizes elements of the Bitcoin protocol for developers. It describes the blockchain network protocol, how transactions are structured with inputs and outputs, and how Bitcoin scripting works to lock and unlock transactions based on signatures and public keys. Bitcoin scripting uses a stack-based approach to evaluate transactions in a non-Turing complete manner. Examples are provided of common script patterns and a more complex script for an odd/even betting contract.
Evaluating Private Cryptocurrency Technologies and ImplementationsJustin Ehrenhofer
This document summarizes Justin Ehrenhofer's presentation on evaluating private technologies and implementations. The key points are:
1. Justin introduces himself and his background in cybersecurity and interest in distributed privacy systems.
2. The document discusses how privacy is not a binary concept and examines different threat models and implications of transparency versus privacy.
3. It provides an overview of how Monero aims to increase privacy through techniques like ring signatures, ring confidential transactions, stealth addresses and other methods, while acknowledging limitations.
4. The presentation emphasizes that privacy solutions should be evaluated based on both theoretical privacy and practical usability factors, and that no system provides perfect privacy due to limitations like metadata leaks and potential attack vectors
Defcon Monero Ring Signatures Presentation by Justin Ehrenhofer 2018Justin Ehrenhofer
This document discusses ring signatures in Monero and some of the challenges related to increasing the ring size. It covers how ring signatures are intended to provide plausible deniability but certain attacks can reduce that deniability. These include 0-decoy attacks, chain reaction attacks, and key image reuse on chain splits. The document recommends best practices like blacklisting compromised outputs and churning to help maintain anonymity. It also notes increasing the ring size faces technical challenges related to blockchain size and computation costs.
Блокчейн. Lego для интересующихся / Александр Боргардт (GolosCore) Ontico
HighLoad++ 2017
Зал «Конгресс-Холл», 7 ноября, 16:00
Презентация и тезисы:
http://www.highload.ru/2017/abstracts/3109.html
В докладе будут освещены некоторые фундаментальные свойства и особенности блокчейна, так как на его основе уже построено много проектов.
Блокчейн, как и любая технология, состоит из большого числа абстракций. И чтобы понять, как она функционирует на высоком уровне, необходимо разобраться с тем, что происходит на каждом из нижележащих уровней. Блокчейн не является исключением.
...
The document discusses blockchain and cryptocurrency technologies. It provides information on the following key points:
- Cryptographic hash functions are the backbone of blockchain and map variable-length inputs to fixed-length outputs, making it difficult to determine the input from the output or find colliding inputs.
- Blockchain uses these hash functions to create tamper-evident linked data structures like blocks in a blockchain or nodes in a Merkle tree. This allows transactions in a blockchain to be publicly verifiable and tamper-resistant.
- Bitcoin implements blockchain technology to create a decentralized transaction ledger. Transactions are grouped into blocks and miners compete to add new blocks through a computational puzzle. This consensus mechanism allows all nodes to agree
This torrent provides CSI Etabs version 9.7.2, a structural analysis and design software. It contains one file that is 95.65 MB in size. The torrent was uploaded today at 13:29 and is tagged with "etabs", "etabsv9.7.2", "csi", and "etabs version 9.7". There are currently no seeders or leechers for this torrent.
BCHGraz - Meetup #16 - Blockchain Real Life Usecases - Dr. Peter TeuflBlockchainHub Graz
Peter gave a great overview how the Austrian Finance is using a real use case for a Blockchain - naturally not a decentralized one. ;-)
Video: https://www.youtube.com/watch?v=enjVlnyjJzU
MongoDB Europe 2016 - Distributed Ledgers, Blockchain + MongoDBMongoDB
Blockchain is a decentralized, distributed ledger in which users can validate transactions without need for an intermediary 3rd party. As a publicly available, and secure ledger it could replace traditional commercial banking as we understand it. Institutional banks are already integrating this technology as they implement their own private side-chains. As a distributed ledger, blockchain can be used for purposes outside finance, including voting systems and identity registration. Yet, Blockchain is still only one component of a full application architecture. Practical use of use of blockchain will require integration with Spark & Hadoop for analytics capabilities and MongoDB for service to real-time application loads. This talk will describe and demystify blockchain and provide integrations Spark and MongoDB to produce truly performant, innovative and robust applications.
The document shows statistics on interrupt counts for different CPUs and network interfaces on a system. It shows counts for CPUs 0 through 15 and network interfaces eth0, eth1, eth2, and eth1-TxRx-0 through eth2-TxRx-7. Most counts are zero, but some interfaces like eth0-TxRx-0 have counts in the thousands or hundreds of thousands, indicating interrupt activity on those interfaces.
Delivered at Casual Connect USA 2018. A big trading firm announced that its average hold time on a stock was 11 seconds. If this is considered investing, why do many say this sounds like betting and vice versa? On-the-fly wagering while the game unfolds, known as in-running, is new to casinos. How can blockchain and in-game wallets provide a system that is robust enough to handle the play-by-play handicapping, where the game is the market?
Workshop - Registro de Informações em Blockchain - Bitcoin - Ethereum - DecredOriginalMy.com
This document discusses how blockchain technologies can be used to provide proof of authenticity and trust for digital documents. It provides examples of storing hashes, metadata, and messages on the blockchains of Bitcoin, Ethereum and Decred. Key information includes how data can be stored in the coinbase field, OP_RETURN field or public addresses on Bitcoin. For Ethereum, it shows a simplified smart contract to store document hashes and timestamps. For Decred, it explains how the DCRTime service allows timestamping document hashes in a Merkle tree stored on the blockchain. OriginalMy is highlighted as a service that allows registering and verifying timestamps using Decred.
Winnyp is an anonymous P2P filesharing software based on Winny. It uses its own encryption key generation algorithm that is more complex than Winny's algorithm, making it more difficult to analyze. The report details Winnyp's internal workings, including how it initializes and patches itself, generates encryption keys through multiple algorithms, and specifies the version of connected nodes by using different encryption keys. It also describes how Winnyp sends packets with dummy data and receives packets to communicate with both Winny and other Winnyp nodes.
Similar to Monero Presentation by Justin Ehrenhofer - Madison, Wisconsin 1 2017 (20)
Importance of Privacy in Distributed Systems - NDSUJustin Ehrenhofer
This document discusses the importance of privacy in distributed systems. It begins with an introduction of the presenter, Justin Ehrenhofer, and his background in cybersecurity and privacy-focused distributed systems. It then discusses how privacy is commonly misunderstood as binary but is actually a constant balancing act between privacy and transparency. The document examines the implications of transparency on individuals and businesses. It also evaluates different tools used to enhance privacy in transparent systems like mixers and zero-knowledge proofs, noting their limitations. The document advocates for privacy solutions like Monero that use ring signatures and ring confidential transactions to increase privacy and fungibility. It acknowledges that even mandatory privacy is not perfect but discusses steps Monero has taken to strengthen privacy.
The document discusses using points of information and outputs to perform a statistical test, with more points of information and outputs higher up providing a better statistical test. The document contains letters, numbers and symbols with no other context.
Monero Presentation by Justin Ehrenhofer - New York City, New York 2019Justin Ehrenhofer
This document provides an overview of Monero, a cryptocurrency focused on privacy and fungibility. It discusses key concepts like ring signatures and RingCT that provide privacy in Monero transactions. It notes the limitations of transparency in other cryptocurrencies and outlines some of the privacy tools that can be added, but with complications. The document compares Monero to other cryptocurrencies in terms of privacy protections for things like sender, receiver, amount. It also discusses stealth addresses, ring signatures, and RingCT techniques used in Monero to obscure transaction metadata and provide privacy.
Monero Presentation by Justin Ehrenhofer - Zagreb, Croatia 2017Justin Ehrenhofer
This document provides information about financial privacy and the cryptocurrency Monero. It begins with statistics on how sensitive people view different types of personal information. It then discusses concepts like fungibility and the history of privacy in Bitcoin. The document outlines tools that were added to Bitcoin to improve privacy as well as the technical differences in Monero including ring signatures, stealth addresses, and ring confidential transactions that help provide privacy and fungibility. It also notes ongoing development areas in Monero and its roadmap to further improve privacy and scalability.
Monero Presentation by Justin Ehrenhofer - Valencia, Spain 2017Justin Ehrenhofer
This document discusses privacy and the evolution of privacy tools for cryptocurrencies like Bitcoin. It focuses on explaining key privacy features of Monero such as ring signatures, ring confidential transactions, stealth addresses, and other tools that provide untraceable transactions. The summary highlights how Monero improved upon Bitcoin's privacy by making all transactions private by default and introducing new technical features over time to strengthen privacy.
Monero Presentation by Justin Ehrenhofer - Riga, Latvia 2017Justin Ehrenhofer
This document provides an overview of Monero, a cryptocurrency focused on privacy and fungibility. It summarizes Monero's key technical features like ring signatures, ring confidential transactions, and stealth addresses that together provide privacy and anonymity for transactions. It also discusses Monero's ongoing development work to improve scalability and usability while maintaining a high level of privacy.
Monero Presentation by Justin Ehrenhofer - Graz, Austria 2017Justin Ehrenhofer
Graz, Austria
Welcomes Justin Ehrenhofer for a presentation on why privacy matters in cryptocurrencies like Monero. The document discusses how privacy is important to prevent targeted crime, unintended leaks of personal information, and censorship. It also summarizes that while people say they care about privacy, survey data shows many are willing to share sensitive personal details. The rest of the document outlines Monero's technical approach to privacy through techniques like ring signatures and ring confidential transactions.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
GraphRAG for Life Science to increase LLM accuracyTomaz Bratanic
GraphRAG for life science domain, where you retriever information from biomedical knowledge graphs using LLMs to increase the accuracy and performance of generated answers
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
CAKE: Sharing Slices of Confidential Data on BlockchainClaudio Di Ciccio
Presented at the CAiSE 2024 Forum, Intelligent Information Systems, June 6th, Limassol, Cyprus.
Synopsis: Cooperative information systems typically involve various entities in a collaborative process within a distributed environment. Blockchain technology offers a mechanism for automating such processes, even when only partial trust exists among participants. The data stored on the blockchain is replicated across all nodes in the network, ensuring accessibility to all participants. While this aspect facilitates traceability, integrity, and persistence, it poses challenges for adopting public blockchains in enterprise settings due to confidentiality issues. In this paper, we present a software tool named Control Access via Key Encryption (CAKE), designed to ensure data confidentiality in scenarios involving public blockchains. After outlining its core components and functionalities, we showcase the application of CAKE in the context of a real-world cyber-security project within the logistics domain.
Paper: https://doi.org/10.1007/978-3-031-61000-4_16
Driving Business Innovation: Latest Generative AI Advancements & Success StorySafe Software
Are you ready to revolutionize how you handle data? Join us for a webinar where we’ll bring you up to speed with the latest advancements in Generative AI technology and discover how leveraging FME with tools from giants like Google Gemini, Amazon, and Microsoft OpenAI can supercharge your workflow efficiency.
During the hour, we’ll take you through:
Guest Speaker Segment with Hannah Barrington: Dive into the world of dynamic real estate marketing with Hannah, the Marketing Manager at Workspace Group. Hear firsthand how their team generates engaging descriptions for thousands of office units by integrating diverse data sources—from PDF floorplans to web pages—using FME transformers, like OpenAIVisionConnector and AnthropicVisionConnector. This use case will show you how GenAI can streamline content creation for marketing across the board.
Ollama Use Case: Learn how Scenario Specialist Dmitri Bagh has utilized Ollama within FME to input data, create custom models, and enhance security protocols. This segment will include demos to illustrate the full capabilities of FME in AI-driven processes.
Custom AI Models: Discover how to leverage FME to build personalized AI models using your data. Whether it’s populating a model with local data for added security or integrating public AI tools, find out how FME facilitates a versatile and secure approach to AI.
We’ll wrap up with a live Q&A session where you can engage with our experts on your specific use cases, and learn more about optimizing your data workflows with AI.
This webinar is ideal for professionals seeking to harness the power of AI within their data management systems while ensuring high levels of customization and security. Whether you're a novice or an expert, gain actionable insights and strategies to elevate your data processes. Join us to see how FME and AI can revolutionize how you work with data!
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfTechgropse Pvt.Ltd.
In this blog post, we'll delve into the intersection of AI and app development in Saudi Arabia, focusing on the food delivery sector. We'll explore how AI is revolutionizing the way Saudi consumers order food, how restaurants manage their operations, and how delivery partners navigate the bustling streets of cities like Riyadh, Jeddah, and Dammam. Through real-world case studies, we'll showcase how leading Saudi food delivery apps are leveraging AI to redefine convenience, personalization, and efficiency.
Full-RAG: A modern architecture for hyper-personalizationZilliz
Mike Del Balso, CEO & Co-Founder at Tecton, presents "Full RAG," a novel approach to AI recommendation systems, aiming to push beyond the limitations of traditional models through a deep integration of contextual insights and real-time data, leveraging the Retrieval-Augmented Generation architecture. This talk will outline Full RAG's potential to significantly enhance personalization, address engineering challenges such as data management and model training, and introduce data enrichment with reranking as a key solution. Attendees will gain crucial insights into the importance of hyperpersonalization in AI, the capabilities of Full RAG for advanced personalization, and strategies for managing complex data integrations for deploying cutting-edge AI solutions.
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
12. The Monero Difference
SENDER RECEIVER
RING
SIGNATURES
STEALTH
ADDRESSES
AMOUNT TRANSACTION
BROADCAST
ɱ
KOVRI
(I2P ROUTER)
RING CONFIDENTIAL
TRANSACTIONS (RINGCT)
13. Ring Signatures & RingCT
8 (Tx ID hng6iwfumwf8)
9 (Tx ID cb8vqfi8dfj65f)
1 (Tx ID e4hn4ifqyd5ed)
3 (Tx ID wb4f5hdfdicnd)
4 (Tx ID nh5nogsefwjw)
6 (Tx ID ybwnng8nengf)
2 (Tx ID eshgni5lsvnf74)
5 (Tx ID fgwinw3fwtk54)
7 (Tx ID e4bgn8flwwrj8)
10 (Tx ID fnidmfnu3dm8)
11 (Tx ID twv8mf8dnfas)
13 (Tx ID 7nr8mrjffijdtm)
12 (Tx ID h5o8mfdngkd)
14 (Tx ID f8n8madkrjmd)
15 (Tx ID wn3f4diiijffwn)
16 (Tx ID 5 f8wnfdmmii)
17 (Tx ID h8fn5mdfi4w)
18 (Tx ID n48gfwmfdki)
20 (Tx ID t4vn8lf8djer4)
19 (Tx ID fnidmnfdsam)
21 (Tx ID 4f5f8njdoam4)
BLOCKCHAIN
8 (Tx ID hng6iwfumwf8)
5 (Tx ID fgwinw3fwtk54)
11 (Tx ID twv8mf8dnfas)
15 (Tx ID wn3f4diiijffwn)
18 (Tx ID n48gfwmfdki)
21 (Tx ID 4f5f8njdoam4)
14. Ring Signatures & RingCT
Ringsize=6
INPUTSMinimumRingsizeAllowed
5 (Tx ID fgwinw3fwtk54)
8 (Tx ID hng6iwfumwf8)
11 (Tx ID twv8mf8dnfas)
15 (Tx ID wn3f4diiijffwn)
18 (Tx ID n48gfwmfdki)
21 (Tx ID 4f5f8njdoam4) key image
15. 5 (Tx ID fgwinw3fwtk54)5 (Tx ID fgwinw3fwtk54)
8 (Tx ID hng6iwfumwf8)
11 (Tx ID twv8mf8dnfas)
15 (Tx ID wn3f4diiijffwn)
18 (Tx ID n48gfwmfdki)
21 (Tx ID 4f5f8njdoam4)
Ring Signatures & RingCT
Ringsize=6
INPUTSMinimumRingsizeAllowed
8 (Tx ID hng6iwfumwf8)
11 (Tx ID twv8mf8dnfas)
15 (Tx ID wn3f4diiijffwn)
18 (Tx ID n48gfwmfdki)
21 (Tx ID 4f5f8njdoam4) key image
RingCT ring signature,
signs difference
between commitments
? XMR
Pedersen commitment
rCT = x*G + a*H(G)
Commitment
public key
Random Number Actual Amount
16. Ring Signatures & RingCT
5
8
11
15
18
21
INPUTS
NewerOlder
A to B B to C C to D
Input previously seen in this transaction, but unsure if actually
used as sent money or if used as a decoy in a ring signature.
20. Summary
5 (Tx ID fgwinw3fwtk54)
8 (Tx ID hng6iwfumwf8)
11 (Tx ID twv8mf8dnfas)
15 (Tx ID wn3f4diiijffwn)
18 (Tx ID n48gfwmfdki)
21 (Tx ID 4f5f8njdoam4)
? XMR
5hfnq835hng6iwfumwf8
3348dqnqcb8vqfi8dfj65f
Commitment public key
21. Regulatory Compliance and Transparency
A view key is used to
reveal all transactions for
a Monero account, or just
the key for a single
transaction
Transparency
View keys can be given to
selected parties, or can be
made public
Selected Parties
By publishing their view
key, charities can invite
easy public oversight
Charities
Children can be given
their own accounts, and
parents can monitor their
spending
Parents
(with the View Key)
Adapted from Riccardo Spagni’s Presentation
33. Zcash Transaction Types
Fully-shielded Partially-shielded Transparentx
• Sending from one z-address
to another z-address
• Sender, receiver, and amount
hidden with zero-knowledge
proofs
• <0.5% of transactions in the
past month
• These theoretically provide
greater untraceability than
Monero
• Sending from one z-address
to a t-address or vice versa
• Sender OR receiver hidden
• Amount visible
• <10% of transactions in the
past month
• Sending from one t-address
to another t-address
• Sender, receiver, and amount
visible, just like Bitcoin
• >90% of transactions in the
past month
https://explorer.zcha.in/statistics/usage
34. Zcash “Round Trip” Transactions
31.5% of all transactions that enter the shielded
pool can be traced with strong evidence.
http://jeffq.com/blog/on-the-linkability-of-zcash-transactions/
In simple terms, Bitcoin is a decentralized network, where a history of the transactions is stored on thousands of computers around the world. This history is called the blockchain. The blockchain is a chain of blocks. Each block contains the most recent transaction history. There is a new block every 10 minutes. People will ask miners to include their transactions in the next block, often with a fee. The network automatically adjusts so that a new block can be added by one miner at random approximately every 10 minutes. Once a transaction is included in a block, it has a confirmation. People who are very cautious wait for several confirmations, since it is significantly harder to reverse an old transaction than a new one.
Bitcoin is not private! In fact, it is perhaps the most transparent money system ever made. Everyone in the world can see a history of the following:
The amount of money in a wallet
Where the Bitcoin came from
Where the Bitcoin went
This visualization shows the transfer of Bitcoin from large accounts to others. It is a visual representation of transfers of Bitcoin.
When people started realizing that Bitcoin is not private, they tried adding things on top of Bitcoin so some people could have privacy. This is traditionally done with a Bitcoin mixing or CoinJoin approach. Several people take their Bitcoin and send it to a centralized server. This centralized server then gives a random Bitcoin from among those received back to the users. Ideally, this could provide some untraceability, since the origin of the received funds is ambiguous. However, there are several fundamental issues with this type of approach.
The vast majority of people who use an optional system that costs extra which you need to go out of your way to use are people who have tainted coins. Tainted coins are coins that are known to previously be used for illicit purposes. An insignificant number of people pay money to mix clean coins. Thus, mixers do not work very well at providing plausible deniability. Instead, they make you stand out, since it makes it look like you are doing something wrong. Mixing itself is a shady act.
Second, you add a level of trust to the system. While Bitcoin is trustless, you need to trust the mixer you use with CoinJoin. They may choose to keep a history of the transaction information, and the people who use the service will never know. People must trust that the mixer does not act maliciously, which is a systemic risk with mixing services. In an ideal private system, you should not have to trust anyone else with your privacy.
Finally, from a convenience perspective, it takes a long time to mix coins, since you need to wait for other participants to mix with. If you plan to mix a large number of coins several times, it can take days or weeks. Few users will go through this effort.
Monero is different from a mixing service. It uses three technologies and a work-in-progress fourth technology to provide trustless privacy for all transactions. These technologies work together to protect different parts of a transaction. The sender is hidden with ring signatures. The amount is hidden with ring confidential transactions, or RingCT. The transaction broadcast is not currently hidden without extra steps, but Monero is working on Kovri, an I2P router, to hide this with no additional effort. The receiver is hidden with stealth addresses. All of these technologies will be addressed in this presentation.
Start by imagining the entire money supply of Euros or Dollars, all in one place. This supply is divided into different notes or bills of a certain value (10, 20, 50. etc). Monero is basically the same. The whole Monero money supply is contained in different outputs, each with a certain amount of Monero. One could be 0.01 XMR, and another could be 1000 XMR. Now imagine this red highlighted one is an output that you control. You have the ability to spend it, and it’s as if you had physical money in your wallet. When you make a Monero transaction, you want to hide what the origin of the funds are, since Monero tries to prevent the blacklisting of certain coins. Your wallet software will select other inputs from those available. These will be controlled by other people. You will appear to spend these amounts, along with your own, even without communicating with the real owner. Thus, by making it seem as if your red input is spent along with the other blue ones highlighted here, no one but you (the sender) knows what the origin of the money is.
The ring signature is just the process of taking your red (real) input, the blue ones (decoys), and making it seem as if they are all spent simultaneously. An outside observer does not know which is the real one, since they are all possible. In this example, the ringsize is 6, meaning that 6 total inputs (including your own) are used. As of August 2017, the minimum allowed by the network is 3. In September 2017, the minimum is expected to be increased to 5 or greater, since more decoys allows for better privacy. The key image is generated for the real input used. Nodes and miners can use this to verify that a real input is actually being spent, but they still do not know which input is real. The key image prevents attackers from spending money more than once or from spending money that does not exist.
For each of these inputs, a fraction is used according to a Pedersen commitment. It is not important to remember any important math on an introductory level, but know that the sender in a transaction spends a proportion of the input that only the sender knows. The commitment itself consists of two parts: 1) the actual amount a, which is hidden by adding 2) a random number x. Since no one knows what the random number is except the sender, an outside observer does not know how much is actually being spent. This commitment will be evaluated among the inputs and outputs, to make sure the same value is generated on both sides of the transaction. A range proof prevents the sender from using a different random number for the input and output set. Finally, the transaction is fully signed as a RingCT ring signature, resulting in an unknown amount of Monero sent to the receiver or receivers. As an output, the commitment public key is published to allow the network to audit the math done behind the Pedersen commitment.
Now that we have looked into how the inputs for a single transaction are hidden among others, it can be helpful to look at how inputs are used over time. The same inputs as before are on the left. The history for the red one is shown on a hypothetical blockchain on the right. The older blocks are on the left, and the newer blocks are on the right. The blocks highlighted red signify to the times that this input was included. There are three ways this could happen:
It is new money from a Coinbase transaction. This is known to everyone on the network. They do not know what address controls it.
The input was actually spent by the real controller
The input was borrowed an used as a decoy in another transaction
Since there is no way to differentiate between 2 and 3, there is no way of knowing whether an input is actually spent, even if it appears in a specific block.
When you tell the network that you would like for them to include your transaction in the next block, you can leak some very important information about yourself, even if the transaction itself is obfuscated. Some nodes on the network may be logging the IP address that they receive these requests from. Fortunately, it is very difficult for an attacker to know that this is the real origin of the transaction, but they can still make an educated guess. Then, they could knock on your door and demand your private key. Not good. Or perhaps an ISP could say they purposefully block connection to the Monero network. Not good either. Kovri will allow people to hide their IP address and, optionally, hide from one’s ISP that Monero is even being used at all. This is done by tunneling connections though the I2P network. I2P is similar to Tor with a few important differences. Every node is a participant on the network, which allows Monero to contribute to I2P rather than just mostly leeching off Tor. In any case, Kovri will allow users to protect their connection information locally and from outside attackers.
Instead of an attacker getting one’s real IP address, they would instead get a meaningless, disposable I2P address. We cannot prevent nodes from logging or even know which nodes log, but we can give nodes garbage information. That’s what Kovri does.
Finally, Monero hides where the money is going to with stealth addresses. Instead of sending money directly to an address, Monero is essentially locked in a container. Every account must search each of these containers to know which is for them, but only one account can open the container. Furthermore, no one else knows who the container is for. This is how stealth addresses work on a very basic level. Outside observers don’t even know these outputs from a single transaction go to one person. They could go to several people. In this example, the red ones go to the receiver, and the blue ones come back to the sender as change. This change can be used to break up large inputs (say they have 100 XMR but only want to send 10 XMR to someone. Then, they can send 90 XMR back as change).
In summary, for any given transaction, Monero is sent from an ambiguous source, from which an unknown amount is committed and thus an unknown amount is sent, to an unknown receiver or set of receivers. As you can see, all information stored on the blockchain is obfuscated by mandate.
Monero can be optionally transparent if the user wants it to be, while only revealing this information to the intended recipient, not the whole world. The Monero project uses this method, publishing the view key with the address on the official website. Now, people can see the amount that comes in from donations.
This is what the official GUI currently looks like. It is available on a variety of platforms.
This is what the upcoming MyMonero open-source lightweight wallet will look like. It will allow users of Monero to connect to the network in a more sustainable way if they do not wish to run a full node.
This is what the upcoming MyMonero open-source lightweight wallet will look like. It will allow users of Monero to connect to the network in a more sustainable way if they do not wish to run a full node.