• Breaking News

    Monday, August 10, 2020

    Ethereum Everstake has signed the first block in the ETH 2.0 testnet ☄️

    Ethereum Everstake has signed the first block in the ETH 2.0 testnet ☄️


    Everstake has signed the first block in the ETH 2.0 testnet ☄️

    Posted: 10 Aug 2020 06:15 AM PDT

    What are all the ethereum dapps you use?

    Posted: 10 Aug 2020 05:27 PM PDT

    Recovery guide for situations where you accidentally send Eth to an address on a different chain (Things like VET, Theta, etc...)

    Posted: 10 Aug 2020 05:10 PM PDT

    Crypto Trends 10 August 2020 2️⃣ ETH2 Phase 0 testnet ⚔️ EF building ETH2 security team ⚡️ OpenZeppelin turns 5 + Taylor Monahan on things I wish I knew in Q1 2017

    Posted: 10 Aug 2020 02:47 AM PDT

    The Privacy Coin Guide Part 1

    Posted: 10 Aug 2020 06:25 AM PDT

    As interest picks up in crypto again, I want to share this post I made on privacy coins again to just give the basics of their evolution. This is only part 1, and parts 2 and 3 are not available in this format, but this part is informative and basic.

    If you're looking for a quick and easy way to assess what the best privacy coin in the current space is, which has the best features, or which is most likely to give high returns, then this is not that guide. My goal is to give you the power to make your own decisions, to clearly state my biases, and educate. I really wanted to understand this niche of the crypto-space due to my background and current loyalties[1], and grasp the nuances of the features, origins and timelines of technologies used in privacy coins, while not being anything close to a developer myself. This is going to be a 3-part series, starting with an overview and basic review of the technology, then looking at its implications, and ending with why I like a specific project. It might be mildly interesting or delightfully educational. Cryptocurrencies are young and existing privacy coins are deploying technology that is a work in progress. This series assumes a basic understanding of how blockchains work, specifically as used in cryptocurrencies. If you don't have that understanding, might I suggest that you get it? [2],[3],[4] Because cryptocurrencies have a long way to go before reaching their end-game: when the world relies on the technology without understanding it. So, shall we do a deep dive into the privacy coin space?

    FIRST THERE WAS BITCOIN

    Cryptocurrencies allow you to tokenize value and track its exchange between hands over time, with transaction information verified by a distributed network of users. The most famous version of a cryptocurrency in use is Bitcoin, defined as peer-to-peer electronic cash. [5] Posted anonymously in 2008, the whitepaper seemed to be in direct response to the global financial meltdown and public distrust of the conventional banking and financing systems. Although cryptographic techniques are used in Bitcoin to ensure that (i) only the owner of a specific wallet has the authority to spend funds from that wallet, (ii) the public address is linked but cannot be traced by a third party to the private address (iii) the information is stored via cryptographic hashing in a merkle tree structure to ensure data integrity, the actual transaction information is publicly visible on the blockchain and can be traced back to the individual through chain analysis.[6] This has raised fears of possible financial censorship or the metaphorical tainting of money due to its origination point, as demonstrated in the Silk Road marketplace disaster.[7] This can happen because fiat money is usually exchanged for cryptocurrency at some point, as crypto-enthusiasts are born in the real world and inevitably cash out. There are already chain analysis firms and software that are increasingly efficient at tracking transactions on the Bitcoin blockchain.[8] This lack of privacy is one of the limitations of Bitcoin that has resulted in the creation of altcoins that experiment with the different features a cryptocurrency can have. Privacy coins are figuring out how to introduce privacy in addition to the payment network. The goal is to make the cryptocurrency fungible, each unit able to be exchanged for equal value without knowledge of its transaction history – like cash, while being publicly verifiable on a decentralized network. In other words, anyone can add the math up without being able to see the full details. Some privacy solutions and protocols have popped up as a result:

    CRYPTONOTE – RING SIGNATURES AND STEALTH ADDRESSES

    Used in: Monero and Particl as its successor RING-CT, Bytecoin

    In December 2012, CryptoNote introduced the use of ring signatures and stealth addresses (along with other notable features such as its own codebase) to improve cryptocurrency privacy.[9] An updated CryptoNote version 2 came in October 2013 [10](though there is some dispute over this timeline [11]), also authored under the name Nicolas van Saberhagen. Ring signatures hide sender information by having the sender sign a transaction using a signature that could belong to multiple users. This makes a transaction untraceable. Stealth addresses allow a receiver to give a single address which generates a different public address for funds to be received at each time funds are sent to it. That makes a transaction unlinkable. In terms of privacy, CryptoNote gave us a protocol for untraceable and unlinkable transactions. The first implementation of CryptoNote technology was Bytecoin in March 2014 (timeline disputed [12]), which spawned many children (forks) in subsequent years, a notable example being Monero, based on CryptoNote v2 in April 2014.

    RING SIGNATURES and STEALTH ADDRESSES

    PROS

    – Provides sender and receiver privacy

    – Privacy can be default

    – Mature technology

    – Greater scalability with bulletproofs

    – Does not require any third-party

    CONS

    – Privacy not very effective without high volume

    -Does not hide transaction information if not combined with another protocol.

    COINJOIN

    Used in: Dash

    Bitcoin developer Gregory Maxwell proposed a set of solutions to bring privacy to Bitcoin and cryptocurrencies, the first being CoinJoin (January 28 – Aug 22, 2013).[13],[14] CoinJoin (sometimes called CoinSwap) allows multiple users to combine their transactions into a single transaction, by receiving inputs from multiple users, and then sending their outputs to the multiple users, irrespective of who in the group the inputs came from. So, the receiver will get whatever output amount they were supposed to, but it cannot be directly traced to its origination input. Similar proposals include Coinshuffle in 2014 and Tumblebit in 2016, building on CoinJoin but not terribly popular [15],[16]. They fixed the need for a trusted third party to 'mix' the transactions. There are CoinJoin implementations that are being actively worked on but are not the most popular privacy solutions of today. A notable coin that uses CoinJoin technology is Dash, launched in January 2014, with masternodes in place of a trusted party.

    COINJOIN

    PROS

    – Provides sender and receiver privacy

    – Easy to implement on any cryptocurrency

    – Lightweight

    – Greater scalability with bulletproofs

    – Mature technology

    CONS

    – Least anonymous privacy solution. Transaction amounts can be calculated

    – Even without third-party mixer, depends on wealth centralization of masternodes

    ZEROCOIN

    Used in: Zcoin, PIVX

    In May 2013, the Zerocoin protocol was introduced by John Hopkins University professor Matthew D. Green and his graduate students Ian Miers and Christina Garman.[17] In response to the need for use of a third party to do CoinJoin, the Zerocoin proposal allowed for a coin to be destroyed and remade in order to erase its history whenever it is spent. Zero-knowledge cryptography and zero-knowledge proofs are used to prove that the new coins for spending are being appropriately made. A zero-knowledge proof allows one party to prove to another that they know specific information, without revealing any information about it, other than the fact that they know it. Zerocoin was not accepted by the Bitcoin community as an implementation to be added to Bitcoin, so a new cryptocurrency had to be formed. Zcoin was the first cryptocurrency to implement the Zerocoin protocol in 2016. [18]

    ZEROCOIN

    PROS

    – Provides sender and receiver privacy

    – Supply can be audited

    – Relatively mature technology

    – Does not require a third-party

    CONS

    – Requires trusted setup (May not be required with Sigma protocol)

    – Large proof sizes (not lightweight)

    – Does not provide full privacy for transaction amounts

    ZEROCASH

    Used in: Zcash, Horizen, Komodo, Zclassic, Bitcoin Private

    In May 2014, the current successor to the Zerocoin protocol, Zerocash, was created, also by Matthew Green and others (Eli Ben-Sasson, Alessandro Chiesa, Christina Garman, Matthew Green, Ian Miers, Eran Tromer, Madars Virza).[19] It improved upon the Zerocoin concept by taking advantage of zero-knowledge proofs called zk-snarks (zero knowledge succinct non-interactive arguments of knowledge). Unlike Zerocoin, which hid coin origins and payment history, Zerocash was faster, with smaller transaction sizes, and hides transaction information on the sender, receiver and amount. Zcash is the first cryptocurrency to implement the Zerocash protocol in 2016. [20]

    ZEROCASH

    PROS

    – Provides full anonymity. Sender, receiver and amount hidden.

    – Privacy can be default?

    – Fast due to small proof sizes.

    – Payment amount can be optionally disclosed for auditing

    – Does not require any third-party

    CONS

    – Requires trusted setup. (May be improved with zt-starks technology)

    – Supply cannot be audited. And coins can potentially be forged without proper implementation.

    – Private transactions computationally intensive (improved with Sapling upgrade)

    CONFIDENTIAL TRANSACTIONS

    Used in: Monero and Particl with Ring Signatures as RING-CT

    The next proposal from Maxwell was that of confidential transactions, proposed in June 2015 as part of the Sidechain Elements project from Blockstream, where Maxwell was Chief Technical Officer.[21],[22] It proposed to hide the transaction amount and asset type (e.g. deposits, currencies, shares), so that only the sender and receiver are aware of the amount, unless they choose to make the amount public. It uses homomorphic encryption[23] to encrypt the inputs and outputs by using blinding factors and a kind of ring signature in a commitment scheme, so the amount can be 'committed' to, without the amount actually being known. I'm terribly sorry if you now have the urge to go and research exactly what that means. The takeaway is that the transaction amount can be hidden from outsiders while being verifiable.

    CONFIDENTIAL TRANSACTIONS

    PROS

    – Hides transaction amounts

    – Privacy can be default

    – Mature technology

    – Does not require any third-party

    CONS

    – Only provides transaction amount privacy when used alone

    RING-CT

    Used in: Monero, Particl

    Then came Ring Confidential transactions, proposed by Shen-Noether of Monero Research Labs in October 2015.[24] RingCT combines the use of ring signatures for hiding sender information, with the use of confidential transactions (which also uses ring signatures) for hiding amounts. The proposal described a new type of ring signature, A Multi-layered Linkable Spontaneous Anonymous Group signature which "allows for hidden amounts, origins and destinations of transactions with reasonable efficiency and verifiable, trustless coin generation".[25] RingCT was implemented in Monero in January 2017 and made mandatory after September 2017.

    RING -CONFIDENTIAL TRANSACTIONS

    PROS

    – Provides full anonymity. Hides transaction amounts and receiver privacy

    – Privacy can be default

    – Mature technology

    – Greater scalability with bulletproofs

    – Does not require any third-party

    CONS

    – Privacy not very effective without high volume

    MIMBLEWIMBLE

    Used in: Grin

    Mimblewimble was proposed in July 2016 by pseudonymous contributor Tom Elvis Jedusorand further developed in October 2016 by Andrew Poelstra.[26],[27] Mimblewimble is a "privacy and fungibility focused cryptocoin transaction structure proposal".[28] The key words are transaction structure proposal, so the way the blockchain is built is different, in order to accommodate privacy and fungibility features. Mimblewimble uses the concept of Confidential transactions to keep amounts hidden, looks at private keys and transaction information to prove ownership of funds rather than using addresses, and bundles transactions together instead of listing them separately on the blockchain. It also introduces a novel method of pruning the blockchain. Grin is a cryptocurrency in development that is applying Mimblewimble. Mimblewimble is early in development and you can understand it more here [29].

    MIMBLEWIMBLE

    PROS

    – Hides transaction amounts and receiver privacy

    – Privacy is on by default

    – Lightweight

    – No public addresses?

    CONS

    – Privacy not very effective without high volume

    – Sender and receiver must both be online

    – Relatively new technology

    ZEXE

    Fresh off the minds of brilliant cryptographers (Sean Bowe, Alessandro Chiesa, Matthew Green, Ian Miers, Pratyush Mishra, Howard Wu), in October 2018 Zexe proposed a new cryptographic primitive called 'decentralized private computation.[30] It allows users of a decentralized ledger to "execute offline computations that result in transactions"[31], but also keeps transaction amounts hidden and allows transaction validation to happen at any time regardless of computations being done online. This can have far reaching implications for privacy coins in the future. Consider cases where transactions need to be automatic and private, without both parties being present.

    NETWORK PRIVACY

    Privacy technologies that look at network privacy as nodes communicate with each other on the network are important considerations, rather than just looking at privacy on the blockchain itself. Anonymous layers encrypt and/or reroute data as it moves among peers, so it is not obvious who they originate from on the network. They are used to protect against surveillance or censorship from ISPs and governments. The Invisible Internet Project (I2P) is an anonymous network layer that uses end to end encryption for peers on a network to communicate with each other.[32] Its history dates back to 2003. Kovri is a Monero created implementation of I2P.[33] The Onion Router (Tor) is another anonymity layer [34]) that Verge is a privacy cryptocurrency that uses. But its historical link to the US government may be is concerning to some[35]. Dandelion transaction relay is also an upcoming Bitcoin improvement proposal (BIP) that scrambles IP data that will provide network privacy for Bitcoin as transaction and other information is transmitted.[36],[37],[38]

    UPCOMING

    Monero completed bulletproofs protocol updates that reduce RINGCT transaction sizes and thus transaction fee costs. (Bulletproofs are a replacement for range proofs used in confidential transactions that aid in encrypting inputs and outputs by making sure they add to zero).

    Sigma Protocol – being actively researched by Zcoin team as of 2018 to replace Zerocoin protocol so that a trusted setup is not required.[39] There is a possible replacement for zk-snarks, called zk-starks, another form of zero-knowledge proof technology, that may make a trusted set-up unnecessary for zero-knowledege proof coins.[40]

    PART 1 CONCLUSION OF THE PRIVACY COIN GUIDE ON THE TECHNOLOGY BEHIND PRIVACY COINS

    Although Bitcoin is still a groundbreaking technology that gives us a trust-less transaction system, it has failed to live up to its expectations of privacy. Over time, new privacy technologies have arrived and are arriving with innovative and exciting solutions for Bitcoin's lack of fungibility. It is important to note that these technologies are built on prior research and application, but we are considering their use in cryptocurrencies. Protocols are proposed based on cryptographic concepts that show how they would work, and then developers actually implement them. Please note that I did not include the possibility of improper implementation as a disadvantage, and the advantages assume that the technical development is well done. A very important point is that coins can also adapt new privacy technologies as their merits become obvious, even as they start with a specific privacy protocol. Furthermore, I am, unfortunately, positive that this is not an exhaustive overview and I am only covering publicized solutions. Next, we'll talk more about the pros and cons and give an idea of how the coins can be compared.

    There's a video version that can be watched, and you can find out how to get the second two parts if you want on my website (video link on the page): https://cryptoramble.com/guide-on-privacy-coins/

    submitted by /u/CryptoRamble
    [link] [comments]

    Ethereum Cat Herders Update #27

    Posted: 10 Aug 2020 11:16 AM PDT

    Introduction to backrunning - webinar series - Thursday 4pm PT - OpenZeppelin & IDEO

    Posted: 10 Aug 2020 04:07 PM PDT

    Introduction to backrunning - webinar series - Thursday 4pm PT - OpenZeppelin & IDEO

    OpenZeppelin are thrilled to be launching a new webinar series together with IDEO to share practical code reviews exploring the latest blockchain security research. We are kicking it off this Thursday with Austin Williams and Dan Elitzer on Ethereum Backrunning.

    Backrunning is the strategy of getting a transaction to be next in line after a transaction that would benefit you, such as a liquidation immediately following an oracle price update.

    Join us online this Thursday at 4pm PT - register below to attend:
    https://zoom.us/webinar/register/3015970849687/WN_ysl1Bv5YS3OIaa0jklj7XA

    https://preview.redd.it/hfdww63ta9g51.png?width=1280&format=png&auto=webp&s=d5b1d2aa09dbce47c2f6c517c8e97c615502c265

    submitted by /u/abcoathup
    [link] [comments]

    Opyn hacked, ETH 2.0 testnet, #supplygate - Another Crazy Week in Crypto

    Posted: 10 Aug 2020 08:03 AM PDT

    ETH Fans, Want to Learn More About Ambiguity and Blockchains?

    Posted: 10 Aug 2020 08:39 AM PDT

    Join us for a presentation of "Crystals and Mud on the Blockchain" by James Grimmelmann hosted by the Initiative for CryptoCurrencies and Contracts (IC3).

    Abstract: Blockchains seem to replace the muddiness of human institutions with the crystalline mathematical perfection of code. But some of this shift is an illusion: the mud always finds a way to seep back in. I will give a lawyer's perspective on why ambiguity and discretion are so hard to get rid of, even on blockchains.

    Bio: James Grimmelmann is the Tessler Family Professor of Digital and Information Law at Cornell Tech and Cornell Law School. He studies how laws regulating software affect freedom, wealth, and power. He tries to help lawyers and technologists understand each other by writing about digital copyright, search engines, privacy on social networks, online governance, and other topics in computer and Internet law.

    About IC3:
    The initiative for Cryptocurrencies & Contracts (IC3) is an initiative of faculty members at Carnegie Mellon University, Cornell University, Cornell Tech, EPFL, ETH Zurich, UC Berkeley, University College London, UIUC and the Technion. Learn more about IC3 blockchain research at initc3.org.

    Register for the event: https://cornell.zoom.us/webinar/register/WN_NNDV3zbNRkSZE6R4a6Rl9g

    submitted by /u/BiblioScarlet
    [link] [comments]

    The Story of My Bitcoin Journey . I can't even afford 32ETH to Stake Ethereum 2.0

    Posted: 10 Aug 2020 05:10 PM PDT

    I've got a story. The Story I kept for 6 years now. The story makes me ask myself: How to ask for Help' I try to hold my tears as I type my story. ....It was late 2008 I started collecting bitcoins..later bought added to my collection. That time security was weak, bitcoin was vulnerable really. I managed to keep my coins until mtgox.com dumped magic exchange gateway and Justcoin.com were doing well. Mtgox held 70% of all bitcoin in circulation then. And the devil struck. Mtgox got hacked..I LOST ALL MY 4900 BITCOINS and the small kept in my justcoin trading platform, due to justcoin closure ,I moved them to swisscex.com and my remaining 1100 got lost . Is someone here can help me get my claim certificate from mtgox? I am homeless now....at least I could get a decent home with roof over my head today if I still have a 1/3 of my coins I got. If YOU come across my story and you want extend helping hands to me...please do so to: btc bc1q8gvt5x5ax6wx6wvx84ckkfwp4262c5kkneu0xa Eth:0xb123bcAdc3a74D219fA4a8C31c7518152fcc8D24

    submitted by /u/Lebon4u
    [link] [comments]

    No comments:

    Post a Comment