This document provides an overview of Monero, a cryptocurrency focused on privacy and fungibility. It discusses key concepts like ring signatures and RingCT that provide privacy in Monero transactions. It notes the limitations of transparency in other cryptocurrencies and outlines some of the privacy tools that can be added, but with complications. The document compares Monero to other cryptocurrencies in terms of privacy protections for things like sender, receiver, amount. It also discusses stealth addresses, ring signatures, and RingCT techniques used in Monero to obscure transaction metadata and provide privacy.
Importance of Privacy in Distributed Systems - NDSUJustin Ehrenhofer
This document discusses the importance of privacy in distributed systems. It begins with an introduction of the presenter, Justin Ehrenhofer, and his background in cybersecurity and privacy-focused distributed systems. It then discusses how privacy is commonly misunderstood as binary but is actually a constant balancing act between privacy and transparency. The document examines the implications of transparency on individuals and businesses. It also evaluates different tools used to enhance privacy in transparent systems like mixers and zero-knowledge proofs, noting their limitations. The document advocates for privacy solutions like Monero that use ring signatures and ring confidential transactions to increase privacy and fungibility. It acknowledges that even mandatory privacy is not perfect but discusses steps Monero has taken to strengthen privacy.
Monero Presentation by Justin Ehrenhofer - Valencia, Spain 2017Justin Ehrenhofer
This document discusses privacy and the evolution of privacy tools for cryptocurrencies like Bitcoin. It focuses on explaining key privacy features of Monero such as ring signatures, ring confidential transactions, stealth addresses, and other tools that provide untraceable transactions. The summary highlights how Monero improved upon Bitcoin's privacy by making all transactions private by default and introducing new technical features over time to strengthen privacy.
Monero Presentation by Justin Ehrenhofer - Wroclaw, Poland 2017Justin Ehrenhofer
This document summarizes key features of the Monero cryptocurrency including its focus on privacy and fungibility. Monero uses ring signatures, ring confidential transactions (RingCT), and stealth addresses to obscure the origin, amounts, and destinations of transactions. It has undergone mandatory privacy upgrades and aims to provide full regulatory compliance through optional view keys while maintaining user privacy. Ongoing development seeks to improve scalability and usability.
Monero Presentation by Justin Ehrenhofer - Zagreb, Croatia 2017Justin Ehrenhofer
This document provides information about financial privacy and the cryptocurrency Monero. It begins with statistics on how sensitive people view different types of personal information. It then discusses concepts like fungibility and the history of privacy in Bitcoin. The document outlines tools that were added to Bitcoin to improve privacy as well as the technical differences in Monero including ring signatures, stealth addresses, and ring confidential transactions that help provide privacy and fungibility. It also notes ongoing development areas in Monero and its roadmap to further improve privacy and scalability.
This document introduces Monero and provides an overview of its key privacy features. It summarizes that Monero improves upon Bitcoin's privacy and fungibility through techniques like stealth addresses, ring signatures, and view keys. This allows Monero to provide privacy by default while allowing for optional transparency through view keys. The document also introduces a Monero service called XMR.TO that aims to increase Monero usability.
Monero Presentation by Justin Ehrenhofer - Warsaw, Poland 2017Justin Ehrenhofer
This document summarizes key aspects of the cryptocurrency Monero including its privacy features like ring signatures and ring confidential transactions. It explains how Monero transactions work compared to Bitcoin by obscuring sender, recipient, and amount through these techniques. The document also covers some limitations of Monero and ongoing development work to improve areas like transaction size and integration of new features.
Monero Presentation by Justin Ehrenhofer - Graz, Austria 2017Justin Ehrenhofer
Graz, Austria
Welcomes Justin Ehrenhofer for a presentation on why privacy matters in cryptocurrencies like Monero. The document discusses how privacy is important to prevent targeted crime, unintended leaks of personal information, and censorship. It also summarizes that while people say they care about privacy, survey data shows many are willing to share sensitive personal details. The rest of the document outlines Monero's technical approach to privacy through techniques like ring signatures and ring confidential transactions.
Graz, Austria
Welcomes Justin Ehrenhofer for a presentation on why privacy matters in cryptocurrencies like Monero. The document discusses how privacy is important to prevent targeted crime, unintended leaks of personal information, and censorship. It also summarizes that while people say they care about privacy, survey data shows many are willing to share sensitive personal details. The rest of the document outlines Monero's technical approach to privacy through techniques like ring signatures and ring confidential transactions.
Importance of Privacy in Distributed Systems - NDSUJustin Ehrenhofer
This document discusses the importance of privacy in distributed systems. It begins with an introduction of the presenter, Justin Ehrenhofer, and his background in cybersecurity and privacy-focused distributed systems. It then discusses how privacy is commonly misunderstood as binary but is actually a constant balancing act between privacy and transparency. The document examines the implications of transparency on individuals and businesses. It also evaluates different tools used to enhance privacy in transparent systems like mixers and zero-knowledge proofs, noting their limitations. The document advocates for privacy solutions like Monero that use ring signatures and ring confidential transactions to increase privacy and fungibility. It acknowledges that even mandatory privacy is not perfect but discusses steps Monero has taken to strengthen privacy.
Monero Presentation by Justin Ehrenhofer - Valencia, Spain 2017Justin Ehrenhofer
This document discusses privacy and the evolution of privacy tools for cryptocurrencies like Bitcoin. It focuses on explaining key privacy features of Monero such as ring signatures, ring confidential transactions, stealth addresses, and other tools that provide untraceable transactions. The summary highlights how Monero improved upon Bitcoin's privacy by making all transactions private by default and introducing new technical features over time to strengthen privacy.
Monero Presentation by Justin Ehrenhofer - Wroclaw, Poland 2017Justin Ehrenhofer
This document summarizes key features of the Monero cryptocurrency including its focus on privacy and fungibility. Monero uses ring signatures, ring confidential transactions (RingCT), and stealth addresses to obscure the origin, amounts, and destinations of transactions. It has undergone mandatory privacy upgrades and aims to provide full regulatory compliance through optional view keys while maintaining user privacy. Ongoing development seeks to improve scalability and usability.
Monero Presentation by Justin Ehrenhofer - Zagreb, Croatia 2017Justin Ehrenhofer
This document provides information about financial privacy and the cryptocurrency Monero. It begins with statistics on how sensitive people view different types of personal information. It then discusses concepts like fungibility and the history of privacy in Bitcoin. The document outlines tools that were added to Bitcoin to improve privacy as well as the technical differences in Monero including ring signatures, stealth addresses, and ring confidential transactions that help provide privacy and fungibility. It also notes ongoing development areas in Monero and its roadmap to further improve privacy and scalability.
This document introduces Monero and provides an overview of its key privacy features. It summarizes that Monero improves upon Bitcoin's privacy and fungibility through techniques like stealth addresses, ring signatures, and view keys. This allows Monero to provide privacy by default while allowing for optional transparency through view keys. The document also introduces a Monero service called XMR.TO that aims to increase Monero usability.
Monero Presentation by Justin Ehrenhofer - Warsaw, Poland 2017Justin Ehrenhofer
This document summarizes key aspects of the cryptocurrency Monero including its privacy features like ring signatures and ring confidential transactions. It explains how Monero transactions work compared to Bitcoin by obscuring sender, recipient, and amount through these techniques. The document also covers some limitations of Monero and ongoing development work to improve areas like transaction size and integration of new features.
Monero Presentation by Justin Ehrenhofer - Graz, Austria 2017Justin Ehrenhofer
Graz, Austria
Welcomes Justin Ehrenhofer for a presentation on why privacy matters in cryptocurrencies like Monero. The document discusses how privacy is important to prevent targeted crime, unintended leaks of personal information, and censorship. It also summarizes that while people say they care about privacy, survey data shows many are willing to share sensitive personal details. The rest of the document outlines Monero's technical approach to privacy through techniques like ring signatures and ring confidential transactions.
Graz, Austria
Welcomes Justin Ehrenhofer for a presentation on why privacy matters in cryptocurrencies like Monero. The document discusses how privacy is important to prevent targeted crime, unintended leaks of personal information, and censorship. It also summarizes that while people say they care about privacy, survey data shows many are willing to share sensitive personal details. The rest of the document outlines Monero's technical approach to privacy through techniques like ring signatures and ring confidential transactions.
Monero Presentation by Justin Ehrenhofer - Riga, Latvia 2017Justin Ehrenhofer
This document provides an overview of Monero, a cryptocurrency focused on privacy and fungibility. It summarizes Monero's key technical features like ring signatures, ring confidential transactions, and stealth addresses that together provide privacy and anonymity for transactions. It also discusses Monero's ongoing development work to improve scalability and usability while maintaining a high level of privacy.
Evaluating Private Cryptocurrency Technologies and ImplementationsJustin Ehrenhofer
This document summarizes Justin Ehrenhofer's presentation on evaluating private technologies and implementations. The key points are:
1. Justin introduces himself and his background in cybersecurity and interest in distributed privacy systems.
2. The document discusses how privacy is not a binary concept and examines different threat models and implications of transparency versus privacy.
3. It provides an overview of how Monero aims to increase privacy through techniques like ring signatures, ring confidential transactions, stealth addresses and other methods, while acknowledging limitations.
4. The presentation emphasizes that privacy solutions should be evaluated based on both theoretical privacy and practical usability factors, and that no system provides perfect privacy due to limitations like metadata leaks and potential attack vectors
On May 28th 2014 I posted a cryptocurrency survey to the following subreddits:
• r/bitcoin
• r/litecoin!
• r/DRKcoin
• r/vertcoin
• r/dogecoin
I also posted it to twitter via my handle @RyanMWalker. I received 148 responses. The contents of this report include the analysis, some serious insights, and some not-so-serious insights.
What is cryptocurrency everything you need to know - ultimate guidePreparationInfo
Cryptocurrencies like Bitcoin emerged as a side product of attempts to create digital cash without a central authority. Satoshi Nakamoto invented Bitcoin in 2008 to solve the problem of how to achieve consensus about transaction records in a decentralized peer-to-peer network without central oversight. Cryptocurrencies use cryptography and a public ledger called a blockchain to securely record transactions and generate new units of currency through a process called mining, where computers validate transactions by solving complex math problems. This allows cryptocurrencies to operate as decentralized digital currencies without central control.
A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?Dan York
In March 2015, I spoke at the 2015 Nonprofit Technology Conference (15NTC) on the topic of what the future of the Internet could be. More information about the session and the abstract can be found at: https://www.internetsociety.org/blog/public-policy/2015/02/speaking-nten-15ntc-conference-austin-about-our-choice-internet-futures
Warning: As you will see, these slides are done in the minimalist "Lessig style" and so there is not a great amount of value in these slides without hearing the actual session. Unfortunately there was no recording of the event.
Bitcoin - shady underworld or bright future, September 2018Luno
This document discusses blockchain technology and cryptocurrencies such as Bitcoin. It begins with an introduction and agenda, then discusses whether we are in a bubble, the actual costs of cryptocurrencies in terms of electricity usage and mining, and security issues like the 51% attack. It also covers how companies are working to increase security and compares the volatility of Bitcoin to other assets. Throughout, it emphasizes the potential of blockchain technology but also acknowledges challenges around scalability, regulation, and other issues that remain to be solved.
Crypto Hacks - Quit your Job and Become a Crypto FarmerGreg Foss
With cryptocurrencies becoming more widely adopted as a form of payment, identity management, and accountability, our understanding of security implications around digital currency needs to keep pace. This talk dives into the many ways in which the systems put in place around new cryptocurrency technologies can be exploited to take advantage of loopholes and bypasses in this technology space.
This document contains summaries of 5 books related to cryptocurrency investing and trading. It includes guides on hodling cryptocurrencies, cryptocurrency mining, initial coin offerings (ICOs), the fundamentals of cryptocurrency trading, and blockchain technology. The author provides an introduction to each topic and bonuses for purchasing the full guides.
022 Custom Essay Writing Cheap Services Uk ThatTameka Davis
The document provides instructions for using a custom essay writing service on HelpWriting.net. It outlines a 5-step process: 1) Create an account with an email and password. 2) Complete a 10-minute order form providing instructions, sources, and deadline. 3) Review bids from writers and choose one based on qualifications. 4) Review the completed paper and authorize payment if satisfied. 5) Request revisions until fully satisfied, with a refund option for plagiarized work. The service aims to provide original, high-quality content through a bidding system and revision process.
This document discusses the importance of privacy in digital currencies. It outlines several solutions that provide privacy such as tumblers, CoinJoin, and Cryptonote currencies like Monero and Bytecoin. However, all existing solutions still have weaknesses that could undermine user privacy. The key takeaways are that privacy is important for adoption but remains an unsolved challenge, and one should be aware of potential identity leaks when using digital currencies.
Monero Presentation by Justin Ehrenhofer - Budapest, Hungary 2017Justin Ehrenhofer
This document summarizes key features of the cryptocurrency Monero including its focus on privacy, anonymity and untraceability. It discusses tools like ring signatures and ring confidential transactions that obscure transaction amounts and participant identities on the blockchain. It also notes some limitations around transaction size but outlines ongoing development work and an upcoming hardfork to address privacy and scaling.
Detecting Malicious Websites using Machine LearningAndrew Beard
We present a set of newly tuned algorithms that can distinguish between malicious and non-malicious websites with a high degree of accuracy using Machine Learning (ML). We use the Bro IDS/IPS tool for extracting the SSL certificates from network traffic and training the ML algorithms.
The extracted SSL attributes are then loaded into multiple ML frameworks such as Splunk, AWS ML and we run a series of classification algorithms to identify those attributes that correlate with malicious sites.
Our analysis shows that there are a number of emerging patterns that even allow for identification of high-jacked devices and self-signed certificates. We present the results of our analysis which show which attributes are the most relevant for detecting malicious SSL certificates and as well the performance of the ML algorithms.
This document discusses Fred Hollows and his significance in promoting change for Indigenous Australia. It notes that Fred Hollows was an ophthalmologist and social justice activist who focused on ending preventable blindness among Indigenous communities. The document outlines Hollows' career beginnings and achievements, including establishing eye care programs in rural and remote Indigenous communities in Australia.
Cryptocurrency is a digital or virtual currency that uses cryptography for security. It operates independently of a central bank, making it decentralized and therefore, free from government control. Bitcoin, the first and most well-known cryptocurrency, was created in 2009. Today, there are thousands of different cryptocurrencies available on the market, each with its own unique features and uses. From Bitcoin to Ethereum, Litecoin to Ripple, the world of cryptocurrency is constantly evolving and expanding, offering new ways to store, invest and transact value
Demystifying Cryptocurrency : A Beginner's Guide to Earning Profits in the Di...cryptolearn
"Demystifying Cryptocurrency: A Beginner's Guide to Earning Profits in the Digital Frontier" offers a comprehensive introduction to the complex world of digital currencies. This beginner-friendly guide simplifies concepts, explores investment strategies, and equips readers with the knowledge needed to navigate and potentially profit in the rapidly evolving cryptocurrency landscape.
The document discusses different types of information such as reported, observed, and data from other sources. It explores qualitative versus quantitative data and warns about making assumptions from data. Various examples and sources are provided to illustrate issues around measurement and using digital tools and data.
CRYPTOCURRENCY MYTHS
I frankly admit that I also almost got infected with scepticism towards
cryptocurrency at the beginning of my journey, as many people scared me by
telling me that cryptocurrency is a wildcat venture, financial pyramid, or the
like. Such false beliefs often fence many people off from possible success.
Only a small number of sticklers verify such statements about cryptocurrency
instead of just blindly believing them.
This document discusses emerging technologies and their potential impacts. It covers topics like artificial intelligence, quantum computing, robotics, cyborgs, smart materials, fusion power, artificial life, malware, biobots, network bots, and more. The document notes that many of these technologies are still in early experimental stages and face challenges before being ready for widespread use. It also discusses debates around AI safety and the relationship between humans and increasingly intelligent machines.
Bitcoin is a crypto-currency that enables peer-to-peer payments in a way that is partially anonymous and which requires no central authorities. These features are attractive to many criminals, as it is difficult to track and shut down Bitcoin payments — difficult, but not impossible. In this talk, I present novel approaches to trace the flow of bitcoins in two types of criminal operations: (i) human traffickers that advertised sex services on Backpage [KDD ’17]; and (ii) ransomware, which encrypts files and demands bitcoins in exchange for decryption keys [IEEE S&P ’18].
This document summarizes the potential threat that success poses to the hacker community. It argues that hackers being in high demand by corporations could lead them to compromise their ideals for money and status. This could cause hackers to lose touch with their community and unique perspectives, which are needed as technology progresses. While corporate jobs are preferable to legal issues, hackers should ensure their work doesn't conflict with their values and that they remain involved with their community to avoid losing what makes them hackers. True success is maintaining one's beliefs and learning, not just wealth and prestige.
The document discusses using points of information and outputs to perform a statistical test, with more points of information and outputs higher up providing a better statistical test. The document contains letters, numbers and symbols with no other context.
Defcon Monero Ring Signatures Presentation by Justin Ehrenhofer 2018Justin Ehrenhofer
This document discusses ring signatures in Monero and some of the challenges related to increasing the ring size. It covers how ring signatures are intended to provide plausible deniability but certain attacks can reduce that deniability. These include 0-decoy attacks, chain reaction attacks, and key image reuse on chain splits. The document recommends best practices like blacklisting compromised outputs and churning to help maintain anonymity. It also notes increasing the ring size faces technical challenges related to blockchain size and computation costs.
More Related Content
Similar to Monero Presentation by Justin Ehrenhofer - New York City, New York 2019
Monero Presentation by Justin Ehrenhofer - Riga, Latvia 2017Justin Ehrenhofer
This document provides an overview of Monero, a cryptocurrency focused on privacy and fungibility. It summarizes Monero's key technical features like ring signatures, ring confidential transactions, and stealth addresses that together provide privacy and anonymity for transactions. It also discusses Monero's ongoing development work to improve scalability and usability while maintaining a high level of privacy.
Evaluating Private Cryptocurrency Technologies and ImplementationsJustin Ehrenhofer
This document summarizes Justin Ehrenhofer's presentation on evaluating private technologies and implementations. The key points are:
1. Justin introduces himself and his background in cybersecurity and interest in distributed privacy systems.
2. The document discusses how privacy is not a binary concept and examines different threat models and implications of transparency versus privacy.
3. It provides an overview of how Monero aims to increase privacy through techniques like ring signatures, ring confidential transactions, stealth addresses and other methods, while acknowledging limitations.
4. The presentation emphasizes that privacy solutions should be evaluated based on both theoretical privacy and practical usability factors, and that no system provides perfect privacy due to limitations like metadata leaks and potential attack vectors
On May 28th 2014 I posted a cryptocurrency survey to the following subreddits:
• r/bitcoin
• r/litecoin!
• r/DRKcoin
• r/vertcoin
• r/dogecoin
I also posted it to twitter via my handle @RyanMWalker. I received 148 responses. The contents of this report include the analysis, some serious insights, and some not-so-serious insights.
What is cryptocurrency everything you need to know - ultimate guidePreparationInfo
Cryptocurrencies like Bitcoin emerged as a side product of attempts to create digital cash without a central authority. Satoshi Nakamoto invented Bitcoin in 2008 to solve the problem of how to achieve consensus about transaction records in a decentralized peer-to-peer network without central oversight. Cryptocurrencies use cryptography and a public ledger called a blockchain to securely record transactions and generate new units of currency through a process called mining, where computers validate transactions by solving complex math problems. This allows cryptocurrencies to operate as decentralized digital currencies without central control.
A Choice Of Internet Futures: Will Nonprofits Be Stuck In The Slow Lane?Dan York
In March 2015, I spoke at the 2015 Nonprofit Technology Conference (15NTC) on the topic of what the future of the Internet could be. More information about the session and the abstract can be found at: https://www.internetsociety.org/blog/public-policy/2015/02/speaking-nten-15ntc-conference-austin-about-our-choice-internet-futures
Warning: As you will see, these slides are done in the minimalist "Lessig style" and so there is not a great amount of value in these slides without hearing the actual session. Unfortunately there was no recording of the event.
Bitcoin - shady underworld or bright future, September 2018Luno
This document discusses blockchain technology and cryptocurrencies such as Bitcoin. It begins with an introduction and agenda, then discusses whether we are in a bubble, the actual costs of cryptocurrencies in terms of electricity usage and mining, and security issues like the 51% attack. It also covers how companies are working to increase security and compares the volatility of Bitcoin to other assets. Throughout, it emphasizes the potential of blockchain technology but also acknowledges challenges around scalability, regulation, and other issues that remain to be solved.
Crypto Hacks - Quit your Job and Become a Crypto FarmerGreg Foss
With cryptocurrencies becoming more widely adopted as a form of payment, identity management, and accountability, our understanding of security implications around digital currency needs to keep pace. This talk dives into the many ways in which the systems put in place around new cryptocurrency technologies can be exploited to take advantage of loopholes and bypasses in this technology space.
This document contains summaries of 5 books related to cryptocurrency investing and trading. It includes guides on hodling cryptocurrencies, cryptocurrency mining, initial coin offerings (ICOs), the fundamentals of cryptocurrency trading, and blockchain technology. The author provides an introduction to each topic and bonuses for purchasing the full guides.
022 Custom Essay Writing Cheap Services Uk ThatTameka Davis
The document provides instructions for using a custom essay writing service on HelpWriting.net. It outlines a 5-step process: 1) Create an account with an email and password. 2) Complete a 10-minute order form providing instructions, sources, and deadline. 3) Review bids from writers and choose one based on qualifications. 4) Review the completed paper and authorize payment if satisfied. 5) Request revisions until fully satisfied, with a refund option for plagiarized work. The service aims to provide original, high-quality content through a bidding system and revision process.
This document discusses the importance of privacy in digital currencies. It outlines several solutions that provide privacy such as tumblers, CoinJoin, and Cryptonote currencies like Monero and Bytecoin. However, all existing solutions still have weaknesses that could undermine user privacy. The key takeaways are that privacy is important for adoption but remains an unsolved challenge, and one should be aware of potential identity leaks when using digital currencies.
Monero Presentation by Justin Ehrenhofer - Budapest, Hungary 2017Justin Ehrenhofer
This document summarizes key features of the cryptocurrency Monero including its focus on privacy, anonymity and untraceability. It discusses tools like ring signatures and ring confidential transactions that obscure transaction amounts and participant identities on the blockchain. It also notes some limitations around transaction size but outlines ongoing development work and an upcoming hardfork to address privacy and scaling.
Detecting Malicious Websites using Machine LearningAndrew Beard
We present a set of newly tuned algorithms that can distinguish between malicious and non-malicious websites with a high degree of accuracy using Machine Learning (ML). We use the Bro IDS/IPS tool for extracting the SSL certificates from network traffic and training the ML algorithms.
The extracted SSL attributes are then loaded into multiple ML frameworks such as Splunk, AWS ML and we run a series of classification algorithms to identify those attributes that correlate with malicious sites.
Our analysis shows that there are a number of emerging patterns that even allow for identification of high-jacked devices and self-signed certificates. We present the results of our analysis which show which attributes are the most relevant for detecting malicious SSL certificates and as well the performance of the ML algorithms.
This document discusses Fred Hollows and his significance in promoting change for Indigenous Australia. It notes that Fred Hollows was an ophthalmologist and social justice activist who focused on ending preventable blindness among Indigenous communities. The document outlines Hollows' career beginnings and achievements, including establishing eye care programs in rural and remote Indigenous communities in Australia.
Cryptocurrency is a digital or virtual currency that uses cryptography for security. It operates independently of a central bank, making it decentralized and therefore, free from government control. Bitcoin, the first and most well-known cryptocurrency, was created in 2009. Today, there are thousands of different cryptocurrencies available on the market, each with its own unique features and uses. From Bitcoin to Ethereum, Litecoin to Ripple, the world of cryptocurrency is constantly evolving and expanding, offering new ways to store, invest and transact value
Demystifying Cryptocurrency : A Beginner's Guide to Earning Profits in the Di...cryptolearn
"Demystifying Cryptocurrency: A Beginner's Guide to Earning Profits in the Digital Frontier" offers a comprehensive introduction to the complex world of digital currencies. This beginner-friendly guide simplifies concepts, explores investment strategies, and equips readers with the knowledge needed to navigate and potentially profit in the rapidly evolving cryptocurrency landscape.
The document discusses different types of information such as reported, observed, and data from other sources. It explores qualitative versus quantitative data and warns about making assumptions from data. Various examples and sources are provided to illustrate issues around measurement and using digital tools and data.
CRYPTOCURRENCY MYTHS
I frankly admit that I also almost got infected with scepticism towards
cryptocurrency at the beginning of my journey, as many people scared me by
telling me that cryptocurrency is a wildcat venture, financial pyramid, or the
like. Such false beliefs often fence many people off from possible success.
Only a small number of sticklers verify such statements about cryptocurrency
instead of just blindly believing them.
This document discusses emerging technologies and their potential impacts. It covers topics like artificial intelligence, quantum computing, robotics, cyborgs, smart materials, fusion power, artificial life, malware, biobots, network bots, and more. The document notes that many of these technologies are still in early experimental stages and face challenges before being ready for widespread use. It also discusses debates around AI safety and the relationship between humans and increasingly intelligent machines.
Bitcoin is a crypto-currency that enables peer-to-peer payments in a way that is partially anonymous and which requires no central authorities. These features are attractive to many criminals, as it is difficult to track and shut down Bitcoin payments — difficult, but not impossible. In this talk, I present novel approaches to trace the flow of bitcoins in two types of criminal operations: (i) human traffickers that advertised sex services on Backpage [KDD ’17]; and (ii) ransomware, which encrypts files and demands bitcoins in exchange for decryption keys [IEEE S&P ’18].
This document summarizes the potential threat that success poses to the hacker community. It argues that hackers being in high demand by corporations could lead them to compromise their ideals for money and status. This could cause hackers to lose touch with their community and unique perspectives, which are needed as technology progresses. While corporate jobs are preferable to legal issues, hackers should ensure their work doesn't conflict with their values and that they remain involved with their community to avoid losing what makes them hackers. True success is maintaining one's beliefs and learning, not just wealth and prestige.
Similar to Monero Presentation by Justin Ehrenhofer - New York City, New York 2019 (20)
The document discusses using points of information and outputs to perform a statistical test, with more points of information and outputs higher up providing a better statistical test. The document contains letters, numbers and symbols with no other context.
Defcon Monero Ring Signatures Presentation by Justin Ehrenhofer 2018Justin Ehrenhofer
This document discusses ring signatures in Monero and some of the challenges related to increasing the ring size. It covers how ring signatures are intended to provide plausible deniability but certain attacks can reduce that deniability. These include 0-decoy attacks, chain reaction attacks, and key image reuse on chain splits. The document recommends best practices like blacklisting compromised outputs and churning to help maintain anonymity. It also notes increasing the ring size faces technical challenges related to blockchain size and computation costs.
Monero Presentation by Justin Ehrenhofer - Milwaukee, Wisconsin 2017Justin Ehrenhofer
This document provides an overview of Monero, a cryptocurrency focused on privacy and decentralization. It discusses Monero's use of ring signatures and ring confidential transactions to obscure sender, recipient, and transaction amounts. It also covers Monero's development history and ongoing work to improve usability, compliance, and the community.
Monero is a cryptocurrency that focuses on privacy and fungibility. It uses ring signatures and ring confidential transactions (RingCT) to obscure transaction amounts and the origin of funds. Ring signatures mix the real spender's key with other keys to make it impossible to tell which key was used. RingCT hides amounts by using Pedersen commitments. Monero also uses stealth addresses to hide recipient addresses. Future developments aim to further improve privacy with larger ring sizes and reduce transaction sizes with techniques like bulletproofs. The Monero community and ecosystem continue growing with services like XMR.TO and more merchants accepting Monero.
Monero Presentation by Justin Ehrenhofer - Vienna, Austria 2017Justin Ehrenhofer
This document summarizes Monero, a cryptocurrency focused on privacy and anonymity. It discusses how Monero uses ring signatures and ring confidential transactions to obscure sender, recipient, and transaction amounts. It also explains other privacy features like stealth addresses and optional view keys that allow selective transparency. The summary highlights Monero's ongoing development work to improve usability, compliance, and scalability through initiatives like multisig addresses, lightweight wallets, and scheduled hardforks.
Monero Presentation by Justin Ehrenhofer - Stockholm, Sweden 2017Justin Ehrenhofer
Monero is a cryptocurrency that focuses on privacy and anonymity. It uses ring signatures and ring confidential transactions (RingCT) to obscure transaction amounts and the origin of funds. Ring signatures group transactions together so the real input is indistinguishable among others in the group. RingCT further hides transaction amounts using Pedersen commitments. Monero also uses stealth addresses to mask the recipient and Kovri to further anonymize IP addresses. Upcoming upgrades will increase the minimum ring size and implement other improvements to enhance privacy and usability.
Monero Presentation by Justin Ehrenhofer - Rome, Italy 2017Justin Ehrenhofer
This document introduces Monero, a cryptocurrency that focuses on privacy and anonymity. It summarizes Monero's key features as:
1) Using ring signatures and Ring Confidential Transactions (RingCT) to obscure the origin, amounts, and destinations of transactions.
2) Implementing stealth addresses to hide receiving addresses and amounts.
3) Making privacy the default by making all transactions private starting in March 2016.
4) Continuing development to improve privacy, usability, and compliance through features like view keys, sub-addresses, and lightweight wallets.
Monero Presentation by Justin Ehrenhofer - Oslo, Norway 2017Justin Ehrenhofer
Ring signatures and ring confidential transactions (RingCT) help provide privacy and security in Monero transactions. Transactions include dummy outputs which make it difficult to determine real inputs and outputs, providing privacy. Stealth addresses further obscure sender and recipient identities. Monero aims to provide untraceable and private transactions by default through these techniques.
Monero Presentation by Justin Ehrenhofer - Helsinki, Finland 2017Justin Ehrenhofer
Monero is a cryptocurrency that focuses on privacy and fungibility. It uses ring signatures and ring confidential transactions (RingCT) to obscure transaction amounts and the origin of funds. Ring signatures mix the real spender's key with others, making it impossible to tell which key was used. RingCT hides amounts and allows only the recipient to see the transaction amount. Upcoming upgrades will increase the minimum ring size and implement other improvements. Monero development prioritizes privacy, security, and decentralization through ongoing upgrades to its protocol.
Monero Presentation by Justin Ehrenhofer - Copenhagen, Denmark 2017Justin Ehrenhofer
Monero is a cryptocurrency that focuses on privacy and anonymity. It uses ring signatures to hide the origin and destination of transactions, and ring confidential transactions to conceal amounts. Monero development includes ongoing work to improve privacy through techniques like larger minimum ring sizes, improved input selection algorithms, and integration with networks like I2P. The Monero community is also growing to support further development and adoption of the currency.
Monero Presentation by Justin Ehrenhofer - Cologne, Germany 2017Justin Ehrenhofer
Monero is a cryptocurrency that focuses on privacy and fungibility. It uses ring signatures, stealth addresses, and ring confidential transactions (RingCT) to obscure transaction metadata. Ring signatures make it impossible to link inputs and outputs of a transaction. Stealth addresses hide recipient information. RingCT hides transaction amounts. Monero is undergoing ongoing development to improve its privacy and usability, with a planned hardfork in September to make RingCT mandatory. Its community and adoption have grown substantially in recent years.
Monero Presentation by Justin Ehrenhofer - Brussels, Belguim 2017Justin Ehrenhofer
Monero is a cryptocurrency that focuses on privacy and anonymity. It uses ring signatures and ring confidential transactions (RingCT) to obscure transaction amounts and the origin of funds. Ring signatures group transactions together so the real input is indistinguishable among others. RingCT further hides amounts through commitments. Stealth addresses receive payments privately. Monero development aims to improve usability and compliance while maintaining strong privacy through techniques like view keys and sub-addresses.
Monero Presentation by Justin Ehrenhofer - Barcelona, Spain 2017Justin Ehrenhofer
Monero is a cryptocurrency that focuses on privacy and fungibility. It uses ring signatures, stealth addresses, and ring confidential transactions (RingCT) to obscure transaction metadata. Ring signatures make it impossible to link inputs and outputs of a transaction. Stealth addresses hide recipient information. RingCT hides transaction amounts. Monero is undergoing ongoing development to improve its privacy and usability, with a planned hard fork in September to make RingCT mandatory.
Monero Presentation by Justin Ehrenhofer - Athens, Greece 2017Justin Ehrenhofer
This document summarizes Monero, a cryptocurrency that focuses on privacy and anonymity. It discusses how Monero uses ring signatures and ring confidential transactions (RingCT) to obscure transaction amounts and the origin of funds. It also covers Monero's history and ongoing development, including making privacy mandatory in 2016, the addition of RingCT in 2017, and planned hardforks to improve privacy and scalability. Regulatory compliance features like view keys are also summarized that allow selective transparency of transactions for entities like charities or parents.
Digital Marketing Trends in 2024 | Guide for Staying AheadWask
https://www.wask.co/ebooks/digital-marketing-trends-in-2024
Feeling lost in the digital marketing whirlwind of 2024? Technology is changing, consumer habits are evolving, and staying ahead of the curve feels like a never-ending pursuit. This e-book is your compass. Dive into actionable insights to handle the complexities of modern marketing. From hyper-personalization to the power of user-generated content, learn how to build long-term relationships with your audience and unlock the secrets to success in the ever-shifting digital landscape.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
Generating privacy-protected synthetic data using Secludy and MilvusZilliz
During this demo, the founders of Secludy will demonstrate how their system utilizes Milvus to store and manipulate embeddings for generating privacy-protected synthetic data. Their approach not only maintains the confidentiality of the original data but also enhances the utility and scalability of LLMs under privacy constraints. Attendees, including machine learning engineers, data scientists, and data managers, will witness first-hand how Secludy's integration with Milvus empowers organizations to harness the power of LLMs securely and efficiently.
A Comprehensive Guide to DeFi Development Services in 2024Intelisync
DeFi represents a paradigm shift in the financial industry. Instead of relying on traditional, centralized institutions like banks, DeFi leverages blockchain technology to create a decentralized network of financial services. This means that financial transactions can occur directly between parties, without intermediaries, using smart contracts on platforms like Ethereum.
In 2024, we are witnessing an explosion of new DeFi projects and protocols, each pushing the boundaries of what’s possible in finance.
In summary, DeFi in 2024 is not just a trend; it’s a revolution that democratizes finance, enhances security and transparency, and fosters continuous innovation. As we proceed through this presentation, we'll explore the various components and services of DeFi in detail, shedding light on how they are transforming the financial landscape.
At Intelisync, we specialize in providing comprehensive DeFi development services tailored to meet the unique needs of our clients. From smart contract development to dApp creation and security audits, we ensure that your DeFi project is built with innovation, security, and scalability in mind. Trust Intelisync to guide you through the intricate landscape of decentralized finance and unlock the full potential of blockchain technology.
Ready to take your DeFi project to the next level? Partner with Intelisync for expert DeFi development services today!
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
This presentation provides valuable insights into effective cost-saving techniques on AWS. Learn how to optimize your AWS resources by rightsizing, increasing elasticity, picking the right storage class, and choosing the best pricing model. Additionally, discover essential governance mechanisms to ensure continuous cost efficiency. Whether you are new to AWS or an experienced user, this presentation provides clear and practical tips to help you reduce your cloud costs and get the most out of your budget.
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
Main news related to the CCS TSI 2023 (2023/1695)Jakub Marek
An English 🇬🇧 translation of a presentation to the speech I gave about the main changes brought by CCS TSI 2023 at the biggest Czech conference on Communications and signalling systems on Railways, which was held in Clarion Hotel Olomouc from 7th to 9th November 2023 (konferenceszt.cz). Attended by around 500 participants and 200 on-line followers.
The original Czech 🇨🇿 version of the presentation can be found here: https://www.slideshare.net/slideshow/hlavni-novinky-souvisejici-s-ccs-tsi-2023-2023-1695/269688092 .
The videorecording (in Czech) from the presentation is available here: https://youtu.be/WzjJWm4IyPk?si=SImb06tuXGb30BEH .
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
leewayhertz.com-AI in predictive maintenance Use cases technologies benefits ...alexjohnson7307
Predictive maintenance is a proactive approach that anticipates equipment failures before they happen. At the forefront of this innovative strategy is Artificial Intelligence (AI), which brings unprecedented precision and efficiency. AI in predictive maintenance is transforming industries by reducing downtime, minimizing costs, and enhancing productivity.
2. Justin Ehrenhofer
• Organizer of the Monero Community Workgroup
and the Monero Malware Response Workgroup
• Board Member of MAGIC (https://magicgrants.org)
• Senior moderator of r/CryptoCurrency
• Host of Breaking Monero
• Publisher of Mastering Monero
Who Am I?
7. Transparency Has Implications
on People and Business
Sources Expenses Balances
• Employer info
• Family and friend
connections
• Business suppliers and
upstream business
connections
• Fungibility
• Political and religious
affiliations
• Health data and doctors
• Customers and downstream
business connections
• Everyday purchasing habits
• Employees
• How much money you have
• Targeted crime against
wealthy individuals and
companies, especially in
cases of malware and
robbery
• Willingness to pay suppliers
and charge customers
• Willingness to pay employees
$
8. Tools Can Be Added to Transparent Systems.
Their Effectiveness is Complicated
MIXER
TUMBLER
zkSNARK
zkSTARK
Could be effective
Probably not; it’s complicated
Highly transparent
9. Transparency Is Important…
For the Right People
Sender:
****************
Receiver:
****************
Amount:
****************
11. Transparency Is Important…
For the Right People
Sender:
Bob
Receiver:
****************
Amount:
****************
Sender:
****************
Receiver:
****************
Amount:
****************
View Key
12. Transparency Is Important…
For the Right People
Sender:
Bob
Receiver:
Alice
Amount:
5
Sender:
****************
Receiver:
****************
Amount:
****************
View Key + key image
13. Monero
Ring signatures are not perfect
Zcash
Turnstile migration process is difficult, likely impossible
Sapling introduces more output metadata
Both
Some output metadata
Timing attacks
Zero-Knowledge Does Not Mean Perfect
14. Privacy Solutions to Consider
zkSNARKs
File encryption on
central server
Hash stored on
blockchain zkSTARKs
Ring signatures
RingCT
Stealth addressess
18. Privacy Solutions to Consider
Source of Funds
Receiver
Amount
Transaction Size
Verification Time
Signing Time
Decent Protection
Protected
Protected
~1.9kB
Milliseconds
Milliseconds
Protected
Protected
Protected
~1kB
Milliseconds
~2.3 seconds
Protected if Shielded
Not Protected*
Mostly Not Protected
~20kB*
Not Sure
~10 seconds
Not Protected
Not Protected
Not Protected
~0.3kB
Milliseconds
Milliseconds
19. The Monero Difference
SENDER RECEIVER
RING
SIGNATURES
STEALTH
ADDRESSES
AMOUNT TRANSACTION
BROADCAST
ɱ
I2P, TOR,
DANDELION
RING CONFIDENTIAL
TRANSACTIONS (RINGCT)
20. Ring Signatures & RingCT
8 (Tx ID hng6iwfumwf8)
9 (Tx ID cb8vqfi8dfj65f)
1 (Tx ID e4hn4ifqyd5ed)
3 (Tx ID wb4f5hdfdicnd)
4 (Tx ID nh5nogsefwjw)
6 (Tx ID ybwnng8nengf)
2 (Tx ID eshgni5lsvnf74)
5 (Tx ID fgwinw3fwtk54)
7 (Tx ID e4bgn8flwwrj8)
10 (Tx ID fnidmfnu3dm8)
11 (Tx ID twv8mf8dnfas)
13 (Tx ID 7nr8mrjffijdtm)
12 (Tx ID h5o8mfdngkd)
14 (Tx ID f8n8madkrjmd)
15 (Tx ID wn3f4diiijffwn)
16 (Tx ID 5 f8wnfdmmii)
17 (Tx ID h8fn5mdfi4w)
18 (Tx ID n48gfwmfdki)
20 (Tx ID t4vn8lf8djer4)
19 (Tx ID fnidmnfdsam)
21 (Tx ID 4f5f8njdoam4)
BLOCKCHAIN
8 (Tx ID hng6iwfumwf8)
5 (Tx ID fgwinw3fwtk54)
11 (Tx ID twv8mf8dnfas)
15 (Tx ID wn3f4diiijffwn)
18 (Tx ID n48gfwmfdki)
21 (Tx ID 4f5f8njdoam4)
22. 5 (Tx ID fgwinw3fwtk54)5
8 (Tx ID hng6iwfumwf8)
11 (Tx ID twv8mf8dnfas)
15 (Tx ID wn3f4diiijffwn)
18 (Tx ID n48gfwmfdki)
21 (Tx ID 4f5f8njdoam4)
Ring Signatures & RingCT
8
11
15
18
21 key image
RingCT ring signature,
signs difference
between commitments
? XMR
Pedersen commitment
rCT = x*G + a*H(G)
Commitment
public key
Random Number Actual Amount
MinRingsizeuntilThursday=7
13 (Tx ID 7nr8mrjffijdtm)13
INPUTS
24. Ring Signatures & RingCT
5
8
11
15
18
21
INPUTS
A to B
Input previously seen in this transaction, but unsure if actually
used to send money or if used as a decoy in a ring signature.
NewerOlder
25. Stealth Addresses
OUTPUTS
? XMR
Back to Sender
To Receiver
INPUTS
ey5f8ne58nh5nogsefwjw
58fmd8jhybwnng8nengf
Commitment public key
Fee (included in coinbase)
Bitcoin is not private! In fact, it is perhaps the most transparent money system ever made. Everyone in the world can see a history of the following:
The amount of money in a wallet
Where the Bitcoin came from
Where the Bitcoin went
This visualization shows the transfer of Bitcoin from large accounts to others. It is a visual representation of transfers of Bitcoin.
Amount is situationally hidden. It is visible if both of the following are true:
The ring signature only includes one possible spent output (no own decoys in ring)
There are only two outputs, at least one of which is a change output
Amount is situationally hidden. It is visible if both of the following are true:
The ring signature only includes one possible spent output (no own decoys in ring)
There are only two outputs, at least one of which is a change output
Monero is different from a mixing service. It uses three technologies and a work-in-progress fourth technology to provide trustless privacy for all transactions. These technologies work together to protect different parts of a transaction. The sender is hidden with ring signatures. The amount is hidden with ring confidential transactions, or RingCT. The transaction broadcast is not currently hidden without extra steps, but Monero is working on Kovri, an I2P router, to hide this with no additional effort. The receiver is hidden with stealth addresses. All of these technologies will be addressed in this presentation.
Start by imagining the entire money supply of Euros or Dollars, all in one place. This supply is divided into different notes or bills of a certain value (10, 20, 50. etc). Monero is basically the same. The whole Monero money supply is contained in different outputs, each with a certain amount of Monero. One could be 0.01 XMR, and another could be 1000 XMR. Now imagine this red highlighted one is an output that you control. You have the ability to spend it, and it’s as if you had physical money in your wallet. When you make a Monero transaction, you want to hide what the origin of the funds are, since Monero tries to prevent the blacklisting of certain coins. Your wallet software will select other inputs from those available. These will be controlled by other people. You will appear to spend these amounts, along with your own, even without communicating with the real owner. Thus, by making it seem as if your red input is spent along with the other blue ones highlighted here, no one but you (the sender) knows what the origin of the money is.
The ring signature is just the process of taking your red (real) input, the blue ones (decoys), and making it seem as if they are all spent simultaneously. An outside observer does not know which is the real one, since they are all possible. In this example, the ringsize is 7, meaning that 7 total inputs (including your own) are used. As of August 2017, the minimum allowed by the network is 7. In September 2017, the minimum is expected to be increased to 5 or greater, since more decoys allows for better privacy. The key image is generated for the real input used. Nodes and miners can use this to verify that a real input is actually being spent, but they still do not know which input is real. The key image prevents attackers from spending money more than once or from spending money that does not exist.
For each of these inputs, a fraction is used according to a Pedersen commitment. It is not important to remember any important math on an introductory level, but know that the sender in a transaction spends a proportion of the input that only the sender knows. The commitment itself consists of two parts: 1) the actual amount a, which is hidden by adding 2) a random number x. Since no one knows what the random number is except the sender, an outside observer does not know how much is actually being spent. This commitment will be evaluated among the inputs and outputs, to make sure the same value is generated on both sides of the transaction. A range proof prevents the sender from using a different random number for the input and output set. Finally, the transaction is fully signed as a RingCT ring signature, resulting in an unknown amount of Monero sent to the receiver or receivers. As an output, the commitment public key is published to allow the network to audit the math done behind the Pedersen commitment.
For each of these inputs, a fraction is used according to a Pedersen commitment. It is not important to remember any important math on an introductory level, but know that the sender in a transaction spends a proportion of the input that only the sender knows. The commitment itself consists of two parts: 1) the actual amount a, which is hidden by adding 2) a random number x. Since no one knows what the random number is except the sender, an outside observer does not know how much is actually being spent. This commitment will be evaluated among the inputs and outputs, to make sure the same value is generated on both sides of the transaction. A range proof prevents the sender from using a different random number for the input and output set. Finally, the transaction is fully signed as a RingCT ring signature, resulting in an unknown amount of Monero sent to the receiver or receivers. As an output, the commitment public key is published to allow the network to audit the math done behind the Pedersen commitment.
Now that we have looked into how the inputs for a single transaction are hidden among others, it can be helpful to look at how inputs are used over time. The same inputs as before are on the left. The history for the red one is shown on a hypothetical blockchain on the right. The older blocks are on the left, and the newer blocks are on the right. The blocks highlighted red signify to the times that this input was included. There are three ways this could happen:
It is new money from a Coinbase transaction. This is known to everyone on the network. They do not know what address controls it.
The input was actually spent by the real controller
The input was borrowed an used as a decoy in another transaction
Since there is no way to differentiate between 2 and 3, there is no way of knowing whether an input is actually spent, even if it appears in a specific block.
Finally, Monero hides where the money is going to with stealth addresses. Instead of sending money directly to an address, Monero is essentially locked in a container. Every account must search each of these containers to know which is for them, but only one account can open the container. Furthermore, no one else knows who the container is for. This is how stealth addresses work on a very basic level. Outside observers don’t even know these outputs from a single transaction go to one person. They could go to several people. In this example, the red ones go to the receiver, and the blue ones come back to the sender as change. This change can be used to break up large inputs (say they have 100 XMR but only want to send 10 XMR to someone. Then, they can send 90 XMR back as change).
In summary, for any given transaction, Monero is sent from an ambiguous source, from which an unknown amount is committed and thus an unknown amount is sent, to an unknown receiver or set of receivers. As you can see, all information stored on the blockchain is obfuscated by mandate.
In summary, for any given transaction, Monero is sent from an ambiguous source, from which an unknown amount is committed and thus an unknown amount is sent, to an unknown receiver or set of receivers. As you can see, all information stored on the blockchain is obfuscated by mandate.
In summary, for any given transaction, Monero is sent from an ambiguous source, from which an unknown amount is committed and thus an unknown amount is sent, to an unknown receiver or set of receivers. As you can see, all information stored on the blockchain is obfuscated by mandate.
In summary, for any given transaction, Monero is sent from an ambiguous source, from which an unknown amount is committed and thus an unknown amount is sent, to an unknown receiver or set of receivers. As you can see, all information stored on the blockchain is obfuscated by mandate.