SlideShare a Scribd company logo
SAFE MONEY FOR EVERYONE
Welcome
Justin Ehrenhofer
Finance
Management Information Systems
/u/SamsungGalaxyPlayer or sgp_
CryptoUMN.com
Centralized vs. Decentralized Systems
CENTRALIZED DECENTRALIZED
A History of Decentralized Systems
What is Bitcoin?
BLOCK
NewerOlder
DECENTRALIZED
Tx ID: wgis85cissajr5da7wz3fcnqnhift
Sender: w3fn5ujfm3d3r975qjd35jrwd4k5q
Receiver: nftic5k8sf4j598wf357jw38956659
Amount: 10 BTC
Bitcoin is NOT private!
People Started Adding Tools to Bitcoin
People Started Adding Tools to Bitcoin
People Started Adding Tools to Bitcoin
The Monero Difference
SENDER RECEIVER
RING
SIGNATURES
STEALTH
ADDRESSES
AMOUNT TRANSACTION
BROADCAST
ɱ
KOVRI
(I2P ROUTER)
RING CONFIDENTIAL
TRANSACTIONS (RINGCT)
Ring Signatures & RingCT
8 (Tx ID hng6iwfumwf8)
9 (Tx ID cb8vqfi8dfj65f)
1 (Tx ID e4hn4ifqyd5ed)
3 (Tx ID wb4f5hdfdicnd)
4 (Tx ID nh5nogsefwjw)
6 (Tx ID ybwnng8nengf)
2 (Tx ID eshgni5lsvnf74)
5 (Tx ID fgwinw3fwtk54)
7 (Tx ID e4bgn8flwwrj8)
10 (Tx ID fnidmfnu3dm8)
11 (Tx ID twv8mf8dnfas)
13 (Tx ID 7nr8mrjffijdtm)
12 (Tx ID h5o8mfdngkd)
14 (Tx ID f8n8madkrjmd)
15 (Tx ID wn3f4diiijffwn)
16 (Tx ID 5 f8wnfdmmii)
17 (Tx ID h8fn5mdfi4w)
18 (Tx ID n48gfwmfdki)
20 (Tx ID t4vn8lf8djer4)
19 (Tx ID fnidmnfdsam)
21 (Tx ID 4f5f8njdoam4)
BLOCKCHAIN
8 (Tx ID hng6iwfumwf8)
5 (Tx ID fgwinw3fwtk54)
11 (Tx ID twv8mf8dnfas)
15 (Tx ID wn3f4diiijffwn)
18 (Tx ID n48gfwmfdki)
21 (Tx ID 4f5f8njdoam4)
Ring Signatures & RingCT
Ringsize=6
INPUTSMinimumSeptember2017*
MinimumToday
5 (Tx ID fgwinw3fwtk54)
8 (Tx ID hng6iwfumwf8)
11 (Tx ID twv8mf8dnfas)
15 (Tx ID wn3f4diiijffwn)
18 (Tx ID n48gfwmfdki)
21 (Tx ID 4f5f8njdoam4) key image
5 (Tx ID fgwinw3fwtk54)5 (Tx ID fgwinw3fwtk54)
8 (Tx ID hng6iwfumwf8)
11 (Tx ID twv8mf8dnfas)
15 (Tx ID wn3f4diiijffwn)
18 (Tx ID n48gfwmfdki)
21 (Tx ID 4f5f8njdoam4)
Ring Signatures & RingCT
Ringsize=6
INPUTSMinimumSeptember2017*
MinimumToday
8 (Tx ID hng6iwfumwf8)
11 (Tx ID twv8mf8dnfas)
15 (Tx ID wn3f4diiijffwn)
18 (Tx ID n48gfwmfdki)
21 (Tx ID 4f5f8njdoam4) key image
RingCT ring signature,
signs difference
between commitments
? XMR
Pedersen commitment
rCT = x*G + a*H(G)
Commitment
public key
Random Number Actual Amount
Ring Signatures & RingCT
5
8
11
15
18
21
INPUTS
NewerOlder
Coinbase Transaction
(New Money)
Input Actually
Spent
Someone Else
Borrowed Input
How Inputs Are Selected
AT LAUNCH
CURRENT (IMPROVED TRIANGULAR DISTRIBUTION)
IDEAL
ENTIRE BLOCKCHAIN
Time Since Last Spent
ORIGIN
NODE
12.154.85.166
LOGGING
NODE
Tx ID: 375wd4h
ORIGIN
NODE
j3hdkil4juppzdz2z3hiybauoagcq4rz3lcqygge5tmg2ea7vs3q.b32.i2p
LOGGING
NODE
Tx ID: 375wd4h
Stealth Addresses
OUTPUTS
? XMR
Back to Sender
To Receiver
INPUTS
100 XMR
OR
hfk5yndjdmnfirwm5dnu
7yf8dji8fbwb4f5hdfdicnd
ey5f8ne58nh5nogsefwjw
58fmd8jhybwnng8nengf
5hfnq835hng6iwfumwf8
3348dqnqcb8vqfi8dfj65f
Commitment public key
Summary
5 (Tx ID fgwinw3fwtk54)
8 (Tx ID hng6iwfumwf8)
11 (Tx ID twv8mf8dnfas)
15 (Tx ID wn3f4diiijffwn)
18 (Tx ID n48gfwmfdki)
21 (Tx ID 4f5f8njdoam4)
? XMR
hfk5yndjdmnfirwm5dnu
7yf8dji8fbwb4f5hdfdicnd
ey5f8ne58nh5nogsefwjw
58fmd8jhybwnng8nengf
5hfnq835hng6iwfumwf8
3348dqnqcb8vqfi8dfj65f
Commitment public key
Mandatory Privacy
Source: MoneroBlocks.info 24 Feb 2016
Source: zcha.in 15 March 2017
A Brief History
Adapted from Scott Anecito’s Presentation
The Infamous GUI
MyMonero Lightweight Wallet
Regulatory Compliance and Transparency
A view key is used to
reveal all transactions for
a Monero account, or just
the key for a single
transaction
Transparency
View keys can be given to
selected parties, or can be
made public
Selected Parties
By publishing their view
key, charities can invite
easy public oversight
Charities
Children can be given
their own accounts, and
parents can monitor their
spending
Parents
(with the View Key)
Adapted from Riccardo Spagni’s Presentation
Monero Limitations
…but so close!
- Coinomi
- GUI port
- MyMonero
- Jaxx
Ongoing Development
Multisig Sub-Addresses Translations
Lightweight
Wallet
RingCT
Optimizations
Community
Hardfork Schedule
September 18th*
• Mandatory RingCT
• Minimum ringsize ≥5 (likely 10)
• Fluffy blocks (in testing now)
• Improved input selection algorithm
• 0MQ
• Sub-Addresses
January April September
Community Growth
Community Growth
XMR.TO – Pay Bitcoin Addresses with Monero
Thank You!
monero.stackexchange.com
getmonero.org
/r/Monero
justin@ehrenhofer.org

More Related Content

What's hot

Monero Presentation by Justin Ehrenhofer - Madison, Wisconsin 2 2017
Monero Presentation by Justin Ehrenhofer - Madison, Wisconsin 2 2017Monero Presentation by Justin Ehrenhofer - Madison, Wisconsin 2 2017
Monero Presentation by Justin Ehrenhofer - Madison, Wisconsin 2 2017
Justin Ehrenhofer
 
Monero Presentation by Justin Ehrenhofer - Vienna, Austria 2017
Monero Presentation by Justin Ehrenhofer - Vienna, Austria 2017Monero Presentation by Justin Ehrenhofer - Vienna, Austria 2017
Monero Presentation by Justin Ehrenhofer - Vienna, Austria 2017
Justin Ehrenhofer
 
Monero Presentation by Justin Ehrenhofer - Athens, Greece 2017
Monero Presentation by Justin Ehrenhofer - Athens, Greece 2017Monero Presentation by Justin Ehrenhofer - Athens, Greece 2017
Monero Presentation by Justin Ehrenhofer - Athens, Greece 2017
Justin Ehrenhofer
 
Monero Presentation by Justin Ehrenhofer - Budapest, Hungary 2017
Monero Presentation by Justin Ehrenhofer - Budapest, Hungary 2017Monero Presentation by Justin Ehrenhofer - Budapest, Hungary 2017
Monero Presentation by Justin Ehrenhofer - Budapest, Hungary 2017
Justin Ehrenhofer
 
Monero Presentation by Justin Ehrenhofer - Madison, Wisconsin 1 2017
Monero Presentation by Justin Ehrenhofer - Madison, Wisconsin 1 2017Monero Presentation by Justin Ehrenhofer - Madison, Wisconsin 1 2017
Monero Presentation by Justin Ehrenhofer - Madison, Wisconsin 1 2017
Justin Ehrenhofer
 
Privacy Coins
Privacy CoinsPrivacy Coins
Privacy Coins
Tim Menapace
 
Monero Presentation by Justin Ehrenhofer - Warsaw, Poland 2017
Monero Presentation by Justin Ehrenhofer - Warsaw, Poland 2017Monero Presentation by Justin Ehrenhofer - Warsaw, Poland 2017
Monero Presentation by Justin Ehrenhofer - Warsaw, Poland 2017
Justin Ehrenhofer
 
Crypto talk OpenValue meetup 20-3-18
Crypto talk OpenValue meetup 20-3-18Crypto talk OpenValue meetup 20-3-18
Crypto talk OpenValue meetup 20-3-18
Roy Wasse
 
Monero Presentation by Justin Ehrenhofer - Wroclaw, Poland 2017
Monero Presentation by Justin Ehrenhofer - Wroclaw, Poland 2017Monero Presentation by Justin Ehrenhofer - Wroclaw, Poland 2017
Monero Presentation by Justin Ehrenhofer - Wroclaw, Poland 2017
Justin Ehrenhofer
 
python gil
python gilpython gil
python gil
rfyiamcool
 
ClasificaciĂłn general
ClasificaciĂłn generalClasificaciĂłn general
ClasificaciĂłn general
limas17
 

What's hot (11)

Monero Presentation by Justin Ehrenhofer - Madison, Wisconsin 2 2017
Monero Presentation by Justin Ehrenhofer - Madison, Wisconsin 2 2017Monero Presentation by Justin Ehrenhofer - Madison, Wisconsin 2 2017
Monero Presentation by Justin Ehrenhofer - Madison, Wisconsin 2 2017
 
Monero Presentation by Justin Ehrenhofer - Vienna, Austria 2017
Monero Presentation by Justin Ehrenhofer - Vienna, Austria 2017Monero Presentation by Justin Ehrenhofer - Vienna, Austria 2017
Monero Presentation by Justin Ehrenhofer - Vienna, Austria 2017
 
Monero Presentation by Justin Ehrenhofer - Athens, Greece 2017
Monero Presentation by Justin Ehrenhofer - Athens, Greece 2017Monero Presentation by Justin Ehrenhofer - Athens, Greece 2017
Monero Presentation by Justin Ehrenhofer - Athens, Greece 2017
 
Monero Presentation by Justin Ehrenhofer - Budapest, Hungary 2017
Monero Presentation by Justin Ehrenhofer - Budapest, Hungary 2017Monero Presentation by Justin Ehrenhofer - Budapest, Hungary 2017
Monero Presentation by Justin Ehrenhofer - Budapest, Hungary 2017
 
Monero Presentation by Justin Ehrenhofer - Madison, Wisconsin 1 2017
Monero Presentation by Justin Ehrenhofer - Madison, Wisconsin 1 2017Monero Presentation by Justin Ehrenhofer - Madison, Wisconsin 1 2017
Monero Presentation by Justin Ehrenhofer - Madison, Wisconsin 1 2017
 
Privacy Coins
Privacy CoinsPrivacy Coins
Privacy Coins
 
Monero Presentation by Justin Ehrenhofer - Warsaw, Poland 2017
Monero Presentation by Justin Ehrenhofer - Warsaw, Poland 2017Monero Presentation by Justin Ehrenhofer - Warsaw, Poland 2017
Monero Presentation by Justin Ehrenhofer - Warsaw, Poland 2017
 
Crypto talk OpenValue meetup 20-3-18
Crypto talk OpenValue meetup 20-3-18Crypto talk OpenValue meetup 20-3-18
Crypto talk OpenValue meetup 20-3-18
 
Monero Presentation by Justin Ehrenhofer - Wroclaw, Poland 2017
Monero Presentation by Justin Ehrenhofer - Wroclaw, Poland 2017Monero Presentation by Justin Ehrenhofer - Wroclaw, Poland 2017
Monero Presentation by Justin Ehrenhofer - Wroclaw, Poland 2017
 
python gil
python gilpython gil
python gil
 
ClasificaciĂłn general
ClasificaciĂłn generalClasificaciĂłn general
ClasificaciĂłn general
 

Similar to Monero Presentation by Justin Ehrenhofer - Milwaukee, Wisconsin 2017

Evaluating Private Cryptocurrency Technologies and Implementations
Evaluating Private Cryptocurrency Technologies and ImplementationsEvaluating Private Cryptocurrency Technologies and Implementations
Evaluating Private Cryptocurrency Technologies and Implementations
Justin Ehrenhofer
 
Bitcoin.pdf
Bitcoin.pdfBitcoin.pdf
Bitcoin.pdf
INSPECTORESWSS
 
Blockchain, Smart Contracts & Crypto: Blurring The Lines Btw Investing & Gamb...
Blockchain, Smart Contracts & Crypto: Blurring The Lines Btw Investing & Gamb...Blockchain, Smart Contracts & Crypto: Blurring The Lines Btw Investing & Gamb...
Blockchain, Smart Contracts & Crypto: Blurring The Lines Btw Investing & Gamb...
Jessica Tams
 
“Technical Intro to Blockhain” by Yurijs Pimenovs from Paybis at CryptoCurren...
“Technical Intro to Blockhain” by Yurijs Pimenovs from Paybis at CryptoCurren...“Technical Intro to Blockhain” by Yurijs Pimenovs from Paybis at CryptoCurren...
“Technical Intro to Blockhain” by Yurijs Pimenovs from Paybis at CryptoCurren...
Dace Barone
 
Monero Presentation by Justin Ehrenhofer - Zagreb, Croatia 2017
Monero Presentation by Justin Ehrenhofer - Zagreb, Croatia 2017Monero Presentation by Justin Ehrenhofer - Zagreb, Croatia 2017
Monero Presentation by Justin Ehrenhofer - Zagreb, Croatia 2017
Justin Ehrenhofer
 
Defcon Monero Ring Signatures Presentation by Justin Ehrenhofer 2018
Defcon Monero Ring Signatures Presentation by Justin Ehrenhofer 2018Defcon Monero Ring Signatures Presentation by Justin Ehrenhofer 2018
Defcon Monero Ring Signatures Presentation by Justin Ehrenhofer 2018
Justin Ehrenhofer
 
Cryptocurrency Mixing
Cryptocurrency MixingCryptocurrency Mixing
Cryptocurrency Mixing
ashmoran
 
201803 Blockchains, Cryptocurrencies & Tokens - NYC Bar Association Presentat...
201803 Blockchains, Cryptocurrencies & Tokens - NYC Bar Association Presentat...201803 Blockchains, Cryptocurrencies & Tokens - NYC Bar Association Presentat...
201803 Blockchains, Cryptocurrencies & Tokens - NYC Bar Association Presentat...
Paperchain
 
Bitcoin : A fierce Decentralized internet currency
Bitcoin : A fierce Decentralized internet currencyBitcoin : A fierce Decentralized internet currency
Bitcoin : A fierce Decentralized internet currency
Shivek Khurana
 
Presentation topalidis giorgos
Presentation topalidis giorgosPresentation topalidis giorgos
Presentation topalidis giorgos
Giorgos Topalidis
 
Presentation_Topalidis_Giorgos
Presentation_Topalidis_GiorgosPresentation_Topalidis_Giorgos
Presentation_Topalidis_Giorgos
Giorgos Topalidis
 
A simplified Bitcoin Implementation in GO
A simplified Bitcoin Implementation in GOA simplified Bitcoin Implementation in GO
A simplified Bitcoin Implementation in GO
Brian Yap
 
A Pharo story on blockchain technology
A Pharo story on blockchain technologyA Pharo story on blockchain technology
A Pharo story on blockchain technology
ESUG
 
What is a decentralised application ? - Les Jeudis du Libre
What is a decentralised application ? - Les Jeudis du LibreWhat is a decentralised application ? - Les Jeudis du Libre
What is a decentralised application ? - Les Jeudis du Libre
Wajug
 
Post-Bitcoin Cryptocurrencies, Off-Chain Transaction Channels, and Cryptocur...
 Post-Bitcoin Cryptocurrencies, Off-Chain Transaction Channels, and Cryptocur... Post-Bitcoin Cryptocurrencies, Off-Chain Transaction Channels, and Cryptocur...
Post-Bitcoin Cryptocurrencies, Off-Chain Transaction Channels, and Cryptocur...
Bernhard Haslhofer
 
What is a decentralised application? - Devoxx Morocco 2018
What is a decentralised application? - Devoxx Morocco 2018What is a decentralised application? - Devoxx Morocco 2018
What is a decentralised application? - Devoxx Morocco 2018
Wajug
 
Blockchain Comes of Age
Blockchain Comes of AgeBlockchain Comes of Age
Blockchain Comes of Age
Mohannad El-Megharbel
 
Cryptography
CryptographyCryptography
Cryptography
Fraboni Ec
 
Cryptography
CryptographyCryptography
Cryptography
Young Alista
 
Cryptography
CryptographyCryptography
Cryptography
James Wong
 

Similar to Monero Presentation by Justin Ehrenhofer - Milwaukee, Wisconsin 2017 (20)

Evaluating Private Cryptocurrency Technologies and Implementations
Evaluating Private Cryptocurrency Technologies and ImplementationsEvaluating Private Cryptocurrency Technologies and Implementations
Evaluating Private Cryptocurrency Technologies and Implementations
 
Bitcoin.pdf
Bitcoin.pdfBitcoin.pdf
Bitcoin.pdf
 
Blockchain, Smart Contracts & Crypto: Blurring The Lines Btw Investing & Gamb...
Blockchain, Smart Contracts & Crypto: Blurring The Lines Btw Investing & Gamb...Blockchain, Smart Contracts & Crypto: Blurring The Lines Btw Investing & Gamb...
Blockchain, Smart Contracts & Crypto: Blurring The Lines Btw Investing & Gamb...
 
“Technical Intro to Blockhain” by Yurijs Pimenovs from Paybis at CryptoCurren...
“Technical Intro to Blockhain” by Yurijs Pimenovs from Paybis at CryptoCurren...“Technical Intro to Blockhain” by Yurijs Pimenovs from Paybis at CryptoCurren...
“Technical Intro to Blockhain” by Yurijs Pimenovs from Paybis at CryptoCurren...
 
Monero Presentation by Justin Ehrenhofer - Zagreb, Croatia 2017
Monero Presentation by Justin Ehrenhofer - Zagreb, Croatia 2017Monero Presentation by Justin Ehrenhofer - Zagreb, Croatia 2017
Monero Presentation by Justin Ehrenhofer - Zagreb, Croatia 2017
 
Defcon Monero Ring Signatures Presentation by Justin Ehrenhofer 2018
Defcon Monero Ring Signatures Presentation by Justin Ehrenhofer 2018Defcon Monero Ring Signatures Presentation by Justin Ehrenhofer 2018
Defcon Monero Ring Signatures Presentation by Justin Ehrenhofer 2018
 
Cryptocurrency Mixing
Cryptocurrency MixingCryptocurrency Mixing
Cryptocurrency Mixing
 
201803 Blockchains, Cryptocurrencies & Tokens - NYC Bar Association Presentat...
201803 Blockchains, Cryptocurrencies & Tokens - NYC Bar Association Presentat...201803 Blockchains, Cryptocurrencies & Tokens - NYC Bar Association Presentat...
201803 Blockchains, Cryptocurrencies & Tokens - NYC Bar Association Presentat...
 
Bitcoin : A fierce Decentralized internet currency
Bitcoin : A fierce Decentralized internet currencyBitcoin : A fierce Decentralized internet currency
Bitcoin : A fierce Decentralized internet currency
 
Presentation topalidis giorgos
Presentation topalidis giorgosPresentation topalidis giorgos
Presentation topalidis giorgos
 
Presentation_Topalidis_Giorgos
Presentation_Topalidis_GiorgosPresentation_Topalidis_Giorgos
Presentation_Topalidis_Giorgos
 
A simplified Bitcoin Implementation in GO
A simplified Bitcoin Implementation in GOA simplified Bitcoin Implementation in GO
A simplified Bitcoin Implementation in GO
 
A Pharo story on blockchain technology
A Pharo story on blockchain technologyA Pharo story on blockchain technology
A Pharo story on blockchain technology
 
What is a decentralised application ? - Les Jeudis du Libre
What is a decentralised application ? - Les Jeudis du LibreWhat is a decentralised application ? - Les Jeudis du Libre
What is a decentralised application ? - Les Jeudis du Libre
 
Post-Bitcoin Cryptocurrencies, Off-Chain Transaction Channels, and Cryptocur...
 Post-Bitcoin Cryptocurrencies, Off-Chain Transaction Channels, and Cryptocur... Post-Bitcoin Cryptocurrencies, Off-Chain Transaction Channels, and Cryptocur...
Post-Bitcoin Cryptocurrencies, Off-Chain Transaction Channels, and Cryptocur...
 
What is a decentralised application? - Devoxx Morocco 2018
What is a decentralised application? - Devoxx Morocco 2018What is a decentralised application? - Devoxx Morocco 2018
What is a decentralised application? - Devoxx Morocco 2018
 
Blockchain Comes of Age
Blockchain Comes of AgeBlockchain Comes of Age
Blockchain Comes of Age
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 
Cryptography
CryptographyCryptography
Cryptography
 

More from Justin Ehrenhofer

Importance of Privacy in Distributed Systems - NDSU
Importance of Privacy in Distributed Systems - NDSUImportance of Privacy in Distributed Systems - NDSU
Importance of Privacy in Distributed Systems - NDSU
Justin Ehrenhofer
 
Breaking Monero: Poisoned Outputs (EAE Attack)
Breaking Monero: Poisoned Outputs (EAE Attack)Breaking Monero: Poisoned Outputs (EAE Attack)
Breaking Monero: Poisoned Outputs (EAE Attack)
Justin Ehrenhofer
 
Monero Presentation by Justin Ehrenhofer - New York City, New York 2019
Monero Presentation by Justin Ehrenhofer - New York City, New York 2019Monero Presentation by Justin Ehrenhofer - New York City, New York 2019
Monero Presentation by Justin Ehrenhofer - New York City, New York 2019
Justin Ehrenhofer
 
Monero Presentation by Justin Ehrenhofer - Valencia, Spain 2017
Monero Presentation by Justin Ehrenhofer - Valencia, Spain 2017Monero Presentation by Justin Ehrenhofer - Valencia, Spain 2017
Monero Presentation by Justin Ehrenhofer - Valencia, Spain 2017
Justin Ehrenhofer
 
Monero Presentation by Justin Ehrenhofer - Riga, Latvia 2017
Monero Presentation by Justin Ehrenhofer - Riga, Latvia 2017Monero Presentation by Justin Ehrenhofer - Riga, Latvia 2017
Monero Presentation by Justin Ehrenhofer - Riga, Latvia 2017
Justin Ehrenhofer
 
Monero Presentation by Justin Ehrenhofer - Graz, Austria 2017
Monero Presentation by Justin Ehrenhofer - Graz, Austria 2017Monero Presentation by Justin Ehrenhofer - Graz, Austria 2017
Monero Presentation by Justin Ehrenhofer - Graz, Austria 2017
Justin Ehrenhofer
 

More from Justin Ehrenhofer (6)

Importance of Privacy in Distributed Systems - NDSU
Importance of Privacy in Distributed Systems - NDSUImportance of Privacy in Distributed Systems - NDSU
Importance of Privacy in Distributed Systems - NDSU
 
Breaking Monero: Poisoned Outputs (EAE Attack)
Breaking Monero: Poisoned Outputs (EAE Attack)Breaking Monero: Poisoned Outputs (EAE Attack)
Breaking Monero: Poisoned Outputs (EAE Attack)
 
Monero Presentation by Justin Ehrenhofer - New York City, New York 2019
Monero Presentation by Justin Ehrenhofer - New York City, New York 2019Monero Presentation by Justin Ehrenhofer - New York City, New York 2019
Monero Presentation by Justin Ehrenhofer - New York City, New York 2019
 
Monero Presentation by Justin Ehrenhofer - Valencia, Spain 2017
Monero Presentation by Justin Ehrenhofer - Valencia, Spain 2017Monero Presentation by Justin Ehrenhofer - Valencia, Spain 2017
Monero Presentation by Justin Ehrenhofer - Valencia, Spain 2017
 
Monero Presentation by Justin Ehrenhofer - Riga, Latvia 2017
Monero Presentation by Justin Ehrenhofer - Riga, Latvia 2017Monero Presentation by Justin Ehrenhofer - Riga, Latvia 2017
Monero Presentation by Justin Ehrenhofer - Riga, Latvia 2017
 
Monero Presentation by Justin Ehrenhofer - Graz, Austria 2017
Monero Presentation by Justin Ehrenhofer - Graz, Austria 2017Monero Presentation by Justin Ehrenhofer - Graz, Austria 2017
Monero Presentation by Justin Ehrenhofer - Graz, Austria 2017
 

Recently uploaded

Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
Pravash Chandra Das
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
Hiike
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Tatiana Kojar
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
Intelisync
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Wask
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
Jakub Marek
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
alexjohnson7307
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 

Recently uploaded (20)

Operating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptxOperating System Used by Users in day-to-day life.pptx
Operating System Used by Users in day-to-day life.pptx
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - HiikeSystem Design Case Study: Building a Scalable E-Commerce Platform - Hiike
System Design Case Study: Building a Scalable E-Commerce Platform - Hiike
 
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
Skybuffer AI: Advanced Conversational and Generative AI Solution on SAP Busin...
 
A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024A Comprehensive Guide to DeFi Development Services in 2024
A Comprehensive Guide to DeFi Development Services in 2024
 
Digital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying AheadDigital Marketing Trends in 2024 | Guide for Staying Ahead
Digital Marketing Trends in 2024 | Guide for Staying Ahead
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)Main news related to the CCS TSI 2023 (2023/1695)
Main news related to the CCS TSI 2023 (2023/1695)
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 

Monero Presentation by Justin Ehrenhofer - Milwaukee, Wisconsin 2017

Editor's Notes

  1. Let’s start by talking about centralized and decentralized systems. You are likely already familiar with both of these. As the names imply, a centralized system sends most traffic to a single point, while a decentralized system relies on several entities and several connections. For a centralized connection, imagine connecting to a website. You type the URL into the bar, and you create a direct connection between you and the website. If you share a file with someone over Google Drive, you upload a file to Google, and then the other party downloads from Google. With a decentralized system, all the participants connect to each other. There is no single entity that controls the swarm. Torrents are typically decentralized, and you will connect to several other peers to download and upload a file or folder. Centralized systems are typically more efficient since fewer connections are needed, and decentralized systems are typically more robust since it is harder to attack all peers instead of one centralized one.
  2. There are many decentralized systems. Two you likely have heard of are BitTorrent and Tor. The first shares files on a decentralized network, and the second provides anonymous browsing through a series of nodes that can be run by anyone. Other projects you may not have heard of include Freenet, I2P, and Tox. Freenet attempts to provide internet services, I2P has its own P2P network for a variety of purposes, and Tox is best explained as a decentralized Skype. Bitcoin is also decentralized. The network is run on thousands of nodes worldwide, which can be run by anyone. No one needs to trust these nodes. Miners keep the network secure, and hundreds of thousands of machines worldwide compete against each other to create its own decentralized system. While there are always improvements to make these systems even more decentralized, it is important to realize that many services, especially those that aim to provide privacy, use decentralized networks to mitigate the trust needed to use a system. Decentralized services, therefore, are typically used to achieve 1) privacy, and/or 2) network robustness. Bitcoin is a great example of the second case, but not the first. We will discuss why later in this presentation.
  3. In simple terms, Bitcoin is a decentralized network, where a history of the transactions is stored on thousands of computers around the world. This history is called the blockchain. The blockchain is a chain of blocks. Each block contains the most recent transaction history. There is a new block every 10 minutes. People will ask miners to include their transactions in the next block, often with a fee. The network automatically adjusts so that a new block can be added by one miner at random approximately every 10 minutes. Once a transaction is included in a block, it has a confirmation. People who are very cautious wait for several confirmations, since it is significantly harder to reverse an old transaction than a new one.
  4. Bitcoin is not private! In fact, it is perhaps the most transparent money system ever made. Everyone in the world can see a history of the following: The amount of money in a wallet Where the Bitcoin came from Where the Bitcoin went This visualization shows the transfer of Bitcoin from large accounts to others. It is a visual representation of transfers of Bitcoin.
  5. When people started realizing that Bitcoin is not private, they tried adding things on top of Bitcoin so some people could have privacy. This is traditionally done with a Bitcoin mixing or CoinJoin approach. Several people take their Bitcoin and send it to a centralized server. This centralized server then gives a random Bitcoin from among those received back to the users. Ideally, this could provide some untraceability, since the origin of the received funds is ambiguous. However, there are several fundamental issues with this type of approach.
  6. The vast majority of people who use an optional system that costs extra which you need to go out of your way to use are people who have tainted coins. Tainted coins are coins that are known to previously be used for illicit purposes. An insignificant number of people pay money to mix clean coins. Thus, mixers do not work very well at providing plausible deniability. Instead, they make you stand out, since it makes it look like you are doing something wrong. Mixing itself is a shady act.
  7. Second, you add a level of trust to the system. While Bitcoin is trustless, you need to trust the mixer you use with CoinJoin. They may choose to keep a history of the transaction information, and the people who use the service will never know. People must trust that the mixer does not act maliciously, which is a systemic risk with mixing services. In an ideal private system, you should not have to trust anyone else with your privacy. Finally, from a convenience perspective, it takes a long time to mix coins, since you need to wait for other participants to mix with. If you plan to mix a large number of coins several times, it can take days or weeks. Few users will go through this effort.
  8. Monero is different from a mixing service. It uses three technologies and a work-in-progress fourth technology to provide trustless privacy for all transactions. These technologies work together to protect different parts of a transaction. The sender is hidden with ring signatures. The amount is hidden with ring confidential transactions, or RingCT. The transaction broadcast is not currently hidden without extra steps, but Monero is working on Kovri, an I2P router, to hide this with no additional effort. The receiver is hidden with stealth addresses. All of these technologies will be addressed in this presentation.
  9. Start by imagining the entire money supply of Euros or Dollars, all in one place. This supply is divided into different notes or bills of a certain value (10, 20, 50. etc). Monero is basically the same. The whole Monero money supply is contained in different outputs, each with a certain amount of Monero. One could be 0.01 XMR, and another could be 1000 XMR. Now imagine this red highlighted one is an output that you control. You have the ability to spend it, and it’s as if you had physical money in your wallet. When you make a Monero transaction, you want to hide what the origin of the funds are, since Monero tries to prevent the blacklisting of certain coins. Your wallet software will select other inputs from those available. These will be controlled by other people. You will appear to spend these amounts, along with your own, even without communicating with the real owner. Thus, by making it seem as if your red input is spent along with the other blue ones highlighted here, no one but you (the sender) knows what the origin of the money is.
  10. The ring signature is just the process of taking your red (real) input, the blue ones (decoys), and making it seem as if they are all spent simultaneously. An outside observer does not know which is the real one, since they are all possible. In this example, the ringsize is 6, meaning that 6 total inputs (including your own) are used. As of August 2017, the minimum allowed by the network is 3. In September 2017, the minimum is expected to be increased to 5 or greater, since more decoys allows for better privacy. The key image is generated for the real input used. Nodes and miners can use this to verify that a real input is actually being spent, but they still do not know which input is real. The key image prevents attackers from spending money more than once or from spending money that does not exist.
  11. For each of these inputs, a fraction is used according to a Pedersen commitment. It is not important to remember any important math on an introductory level, but know that the sender in a transaction spends a proportion of the input that only the sender knows. The commitment itself consists of two parts: 1) the actual amount a, which is hidden by adding 2) a random number x. Since no one knows what the random number is except the sender, an outside observer does not know how much is actually being spent. This commitment will be evaluated among the inputs and outputs, to make sure the same value is generated on both sides of the transaction. A range proof prevents the sender from using a different random number for the input and output set. Finally, the transaction is fully signed as a RingCT ring signature, resulting in an unknown amount of Monero sent to the receiver or receivers. As an output, the commitment public key is published to allow the network to audit the math done behind the Pedersen commitment.
  12. Now that we have looked into how the inputs for a single transaction are hidden among others, it can be helpful to look at how inputs are used over time. The same inputs as before are on the left. The history for the red one is shown on a hypothetical blockchain on the right. The older blocks are on the left, and the newer blocks are on the right. The blocks highlighted red signify to the times that this input was included. There are three ways this could happen: It is new money from a Coinbase transaction. This is known to everyone on the network. They do not know what address controls it. The input was actually spent by the real controller The input was borrowed an used as a decoy in another transaction Since there is no way to differentiate between 2 and 3, there is no way of knowing whether an input is actually spent, even if it appears in a specific block.
  13. The hardest part to get right with Monero is the input selection algorithm. Monero needs to choose the decoy inputs convincingly to hide the real input. When Monero first launched, other inputs were selected at pure random. This may sound good, but this is actually really bad, since people are much more likely to spend new money than money that has been sitting around in a wallet for a while. Thus, Monero now uses an improved triangular distribution algorithm to heavily prefer newer inputs over older ones. Monero will continually need to improve the selection algorithm to accommodate for changing spending preferences.
  14. When you tell the network that you would like for them to include your transaction in the next block, you can leak some very important information about yourself, even if the transaction itself is obfuscated. Some nodes on the network may be logging the IP address that they receive these requests from. Fortunately, it is very difficult for an attacker to know that this is the real origin of the transaction, but they can still make an educated guess. Then, they could knock on your door and demand your private key. Not good. Or perhaps an ISP could say they purposefully block connection to the Monero network. Not good either. Kovri will allow people to hide their IP address and, optionally, hide from one’s ISP that Monero is even being used at all. This is done by tunneling connections though the I2P network. I2P is similar to Tor with a few important differences. Every node is a participant on the network, which allows Monero to contribute to I2P rather than just mostly leeching off Tor. In any case, Kovri will allow users to protect their connection information locally and from outside attackers.
  15. Instead of an attacker getting one’s real IP address, they would instead get a meaningless, disposable I2P address. We cannot prevent nodes from logging or even know which nodes log, but we can give nodes garbage information. That’s what Kovri does.
  16. Finally, Monero hides where the money is going to with stealth addresses. Instead of sending money directly to an address, Monero is essentially locked in a container. Every account must search each of these containers to know which is for them, but only one account can open the container. Furthermore, no one else knows who the container is for. This is how stealth addresses work on a very basic level. Outside observers don’t even know these outputs from a single transaction go to one person. They could go to several people. In this example, the red ones go to the receiver, and the blue ones come back to the sender as change. This change can be used to break up large inputs (say they have 100 XMR but only want to send 10 XMR to someone. Then, they can send 90 XMR back as change).
  17. In summary, for any given transaction, Monero is sent from an ambiguous source, from which an unknown amount is committed and thus an unknown amount is sent, to an unknown receiver or set of receivers. As you can see, all information stored on the blockchain is obfuscated by mandate.
  18. One thing the Monero community is particularly vocal about is the idea of mandatory privacy. We feel that all transactions must be private or else it doesn’t really matter. Before early 2016, only 1/3 of Monero transactions hid the origin of funds, which was not good for several reasons. The individual transaction is not private, and those who need privacy get less if fewer people use the privacy features. Now, it is impossible to send a transaction without hiding the origin of funds in the ring signature. Other coins claim to offer excellent privacy, but most fail in execution to provide privacy to any meaningful number of users.
  19. This is what the official GUI currently looks like. It is available on a variety of platforms.
  20. This is what the upcoming MyMonero open-source lightweight wallet will look like. It will allow users of Monero to connect to the network in a more sustainable way if they do not wish to run a full node.
  21. Monero can be optionally transparent if the user wants it to be, while only revealing this information to the intended recipient, not the whole world. The Monero project uses this method, publishing the view key with the address on the official website. Now, people can see the amount that comes in from donations.