<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.hope.net/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Mountainlion</id>
	<title>HOPE Wiki - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.hope.net/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=Mountainlion"/>
	<link rel="alternate" type="text/html" href="https://wiki.hope.net/index.php/Special:Contributions/Mountainlion"/>
	<updated>2026-05-12T02:07:38Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.43.3</generator>
	<entry>
		<id>https://wiki.hope.net/index.php?title=Plausible_Deniability_and_Cryptocurrency_Privacy_Workshop&amp;diff=1536</id>
		<title>Plausible Deniability and Cryptocurrency Privacy Workshop</title>
		<link rel="alternate" type="text/html" href="https://wiki.hope.net/index.php?title=Plausible_Deniability_and_Cryptocurrency_Privacy_Workshop&amp;diff=1536"/>
		<updated>2022-07-21T06:08:16Z</updated>

		<summary type="html">&lt;p&gt;Mountainlion: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Plausible Deniability and Cryptocurrency Privacy workshop =&lt;br /&gt;
&lt;br /&gt;
This workshop will be given:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Day 1: Friday, 22-July-2022, 7:30pm - 10:30pm, Workshop A (D&#039;Angelo 309)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:orange&amp;quot;&amp;gt;&#039;&#039;&#039;NOTE:  You do NOT need to register to take this workshop -- please show up early to ensure a seat at Workshop A (D&#039;Angelo 309).&#039;&#039;&#039;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== Presenter(s) ==&lt;br /&gt;
Lane Rettig&amp;lt;br&amp;gt;&lt;br /&gt;
Michelle Lai&amp;lt;br&amp;gt;&lt;br /&gt;
Arctic Byte&amp;lt;br&amp;gt;&lt;br /&gt;
Ahmed Ghappour&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
Hackers around the world use cryptocurrencies like bitcoin and ether every day under the mistaken assumption that these networks are somehow privacy-preserving (often conflating pseudonymity for privacy). This couldn&#039;t be further from the truth, as it is in fact often easier to trace crypto transactions than fiat transactions. Even so-called private networks like Zcash and Monero aren&#039;t failsafe from a privacy perspective. However, with a few tricks and tools it is possible to preserve privacy on cryptographic networks in a robust way. This workshop will present a brief history of privacy successes and failures in cryptocurrency and blockchain with important case studies, will demonstrate tracing and de-anonymization of actual transactions in real time, and will present tools and techniques for guaranteeing strong privacy.&lt;br /&gt;
&lt;br /&gt;
== Workshop Agenda ==&lt;br /&gt;
Understand where information about your activity may be leaked, across the stack: hardware, software, protocol, and network.&amp;lt;br/&amp;gt;&lt;br /&gt;
See case studies of how users were identified through their on-chain traces.&amp;lt;br/&amp;gt;&lt;br /&gt;
Learn a framework for how to think about what parts of a transaction can be made private.&amp;lt;br/&amp;gt; &lt;br /&gt;
Follow along as we demo tools to stay safe at a network level.&amp;lt;br/&amp;gt;&lt;br /&gt;
We will also demo some privacy-centric wallets and cryptocurrency protocols.&lt;br /&gt;
&lt;br /&gt;
== Registration -- NOT required == &lt;br /&gt;
&amp;lt;span style=&amp;quot;color:orange&amp;quot;&amp;gt;&#039;&#039;&#039;You do not need to register in advance to take this workshop -- just show up early to ensure a seat.&#039;&#039;&#039;:&amp;lt;/span&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== What Participants Should Bring to the Workshop (if anything) ==&lt;br /&gt;
If you&#039;d like, bring a laptop with a browser wallet funded with some change.&lt;/div&gt;</summary>
		<author><name>Mountainlion</name></author>
	</entry>
	<entry>
		<id>https://wiki.hope.net/index.php?title=Plausible_Deniability_and_Cryptocurrency_Privacy_Workshop&amp;diff=1535</id>
		<title>Plausible Deniability and Cryptocurrency Privacy Workshop</title>
		<link rel="alternate" type="text/html" href="https://wiki.hope.net/index.php?title=Plausible_Deniability_and_Cryptocurrency_Privacy_Workshop&amp;diff=1535"/>
		<updated>2022-07-21T06:07:02Z</updated>

		<summary type="html">&lt;p&gt;Mountainlion: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Plausible Deniability and Cryptocurrency Privacy workshop =&lt;br /&gt;
&lt;br /&gt;
This workshop will be given:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Day 1: Friday, 22-July-2022, 7:30pm - 10:30pm, Workshop A (D&#039;Angelo 309)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:orange&amp;quot;&amp;gt;&#039;&#039;&#039;NOTE:  You do NOT need to register to take this workshop -- please show up early to ensure a seat at Workshop A (D&#039;Angelo 309).&#039;&#039;&#039;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
Hackers around the world use cryptocurrencies like bitcoin and ether every day under the mistaken assumption that these networks are somehow privacy-preserving (often conflating pseudonymity for privacy). This couldn&#039;t be further from the truth, as it is in fact often easier to trace crypto transactions than fiat transactions. Even so-called private networks like Zcash and Monero aren&#039;t failsafe from a privacy perspective. However, with a few tricks and tools it is possible to preserve privacy on cryptographic networks in a robust way. This workshop will present a brief history of privacy successes and failures in cryptocurrency and blockchain with important case studies, will demonstrate tracing and de-anonymization of actual transactions in real time, and will present tools and techniques for guaranteeing strong privacy.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presenter(s) ==&lt;br /&gt;
Lane Rettig&amp;lt;br&amp;gt;&lt;br /&gt;
Michelle Lai&amp;lt;br&amp;gt;&lt;br /&gt;
Arctic Byte&amp;lt;br&amp;gt;&lt;br /&gt;
Ahmed Ghappour&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Full Description ==&lt;br /&gt;
Understand where information about your activity may be leaked, across the stack: hardware, software, protocol, and network.&amp;lt;br/&amp;gt;&lt;br /&gt;
See case studies of how users were identified through their on-chain traces.&amp;lt;br/&amp;gt;&lt;br /&gt;
Learn a framework for how to think about what parts of a transaction can be made private.&amp;lt;br/&amp;gt; &lt;br /&gt;
Follow along as we demo tools to stay safe at a network level.&amp;lt;br/&amp;gt;&lt;br /&gt;
We will also demo some privacy-centric wallets and cryptocurrency protocols.&lt;br /&gt;
&lt;br /&gt;
== Registration -- NOT required == &lt;br /&gt;
&amp;lt;span style=&amp;quot;color:orange&amp;quot;&amp;gt;&#039;&#039;&#039;You do not need to register in advance to take this workshop -- just show up early to ensure a seat.&#039;&#039;&#039;:&amp;lt;/span&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
== What Participants Should Bring to the Workshop (if anything) ==&lt;br /&gt;
If you&#039;d like, bring a laptop with a browser wallet funded with some change.&lt;/div&gt;</summary>
		<author><name>Mountainlion</name></author>
	</entry>
	<entry>
		<id>https://wiki.hope.net/index.php?title=Plausible_Deniability_and_Cryptocurrency_Privacy_Workshop&amp;diff=1534</id>
		<title>Plausible Deniability and Cryptocurrency Privacy Workshop</title>
		<link rel="alternate" type="text/html" href="https://wiki.hope.net/index.php?title=Plausible_Deniability_and_Cryptocurrency_Privacy_Workshop&amp;diff=1534"/>
		<updated>2022-07-21T06:06:31Z</updated>

		<summary type="html">&lt;p&gt;Mountainlion: /* Required Software */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Plausible Deniability and Cryptocurrency Privacy workshop =&lt;br /&gt;
&lt;br /&gt;
This workshop will be given:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Day 1: Friday, 22-July-2022, 7:30pm - 10:30pm, Workshop A (D&#039;Angelo 309)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:orange&amp;quot;&amp;gt;&#039;&#039;&#039;NOTE:  You do NOT need to register to take this workshop -- please show up early to ensure a seat at Workshop A (D&#039;Angelo 309).&#039;&#039;&#039;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
Hackers around the world use cryptocurrencies like bitcoin and ether every day under the mistaken assumption that these networks are somehow privacy-preserving (often conflating pseudonymity for privacy). This couldn&#039;t be further from the truth, as it is in fact often easier to trace crypto transactions than fiat transactions. Even so-called private networks like Zcash and Monero aren&#039;t failsafe from a privacy perspective. However, with a few tricks and tools it is possible to preserve privacy on cryptographic networks in a robust way. This workshop will present a brief history of privacy successes and failures in cryptocurrency and blockchain with important case studies, will demonstrate tracing and de-anonymization of actual transactions in real time, and will present tools and techniques for guaranteeing strong privacy.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presenter(s) ==&lt;br /&gt;
Lane Rettig&amp;lt;br&amp;gt;&lt;br /&gt;
Michelle Lai&amp;lt;br&amp;gt;&lt;br /&gt;
Arctic Byte&amp;lt;br&amp;gt;&lt;br /&gt;
Ahmed Ghappour&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Full Description ==&lt;br /&gt;
Understand where information about your activity may be leaked, across the stack: hardware, software, protocol, and network.&amp;lt;br/&amp;gt;&lt;br /&gt;
See case studies of how users were identified through their on-chain traces.&amp;lt;br/&amp;gt;&lt;br /&gt;
Learn a framework for how to think about what parts of a transaction can be made private.&amp;lt;br/&amp;gt; &lt;br /&gt;
Follow along as we demo tools to stay safe at a network level.&amp;lt;br/&amp;gt;&lt;br /&gt;
We will also demo some privacy-centric wallets and cryptocurrency protocols.&lt;br /&gt;
&lt;br /&gt;
== Registration -- NOT required == &lt;br /&gt;
&amp;lt;span style=&amp;quot;color:orange&amp;quot;&amp;gt;&#039;&#039;&#039;You do not need to register in advance to take this workshop -- just show up early to ensure a seat.&#039;&#039;&#039;:&amp;lt;/span&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Required Software ==&lt;br /&gt;
None&lt;br /&gt;
&lt;br /&gt;
== What Participants Should Bring to the Workshop (if anything) ==&lt;br /&gt;
If you&#039;d like, bring a laptop with a browser wallet funded with some change.&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
any links go here&lt;/div&gt;</summary>
		<author><name>Mountainlion</name></author>
	</entry>
	<entry>
		<id>https://wiki.hope.net/index.php?title=Plausible_Deniability_and_Cryptocurrency_Privacy_Workshop&amp;diff=1533</id>
		<title>Plausible Deniability and Cryptocurrency Privacy Workshop</title>
		<link rel="alternate" type="text/html" href="https://wiki.hope.net/index.php?title=Plausible_Deniability_and_Cryptocurrency_Privacy_Workshop&amp;diff=1533"/>
		<updated>2022-07-21T06:06:23Z</updated>

		<summary type="html">&lt;p&gt;Mountainlion: /* What Participants Should Bring to the Workshop (if anything) */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Plausible Deniability and Cryptocurrency Privacy workshop =&lt;br /&gt;
&lt;br /&gt;
This workshop will be given:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Day 1: Friday, 22-July-2022, 7:30pm - 10:30pm, Workshop A (D&#039;Angelo 309)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:orange&amp;quot;&amp;gt;&#039;&#039;&#039;NOTE:  You do NOT need to register to take this workshop -- please show up early to ensure a seat at Workshop A (D&#039;Angelo 309).&#039;&#039;&#039;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
Hackers around the world use cryptocurrencies like bitcoin and ether every day under the mistaken assumption that these networks are somehow privacy-preserving (often conflating pseudonymity for privacy). This couldn&#039;t be further from the truth, as it is in fact often easier to trace crypto transactions than fiat transactions. Even so-called private networks like Zcash and Monero aren&#039;t failsafe from a privacy perspective. However, with a few tricks and tools it is possible to preserve privacy on cryptographic networks in a robust way. This workshop will present a brief history of privacy successes and failures in cryptocurrency and blockchain with important case studies, will demonstrate tracing and de-anonymization of actual transactions in real time, and will present tools and techniques for guaranteeing strong privacy.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presenter(s) ==&lt;br /&gt;
Lane Rettig&amp;lt;br&amp;gt;&lt;br /&gt;
Michelle Lai&amp;lt;br&amp;gt;&lt;br /&gt;
Arctic Byte&amp;lt;br&amp;gt;&lt;br /&gt;
Ahmed Ghappour&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Full Description ==&lt;br /&gt;
Understand where information about your activity may be leaked, across the stack: hardware, software, protocol, and network.&amp;lt;br/&amp;gt;&lt;br /&gt;
See case studies of how users were identified through their on-chain traces.&amp;lt;br/&amp;gt;&lt;br /&gt;
Learn a framework for how to think about what parts of a transaction can be made private.&amp;lt;br/&amp;gt; &lt;br /&gt;
Follow along as we demo tools to stay safe at a network level.&amp;lt;br/&amp;gt;&lt;br /&gt;
We will also demo some privacy-centric wallets and cryptocurrency protocols.&lt;br /&gt;
&lt;br /&gt;
== Registration -- NOT required == &lt;br /&gt;
&amp;lt;span style=&amp;quot;color:orange&amp;quot;&amp;gt;&#039;&#039;&#039;You do not need to register in advance to take this workshop -- just show up early to ensure a seat.&#039;&#039;&#039;:&amp;lt;/span&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Required Software ==&lt;br /&gt;
any required software goes here&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== What Participants Should Bring to the Workshop (if anything) ==&lt;br /&gt;
If you&#039;d like, bring a laptop with a browser wallet funded with some change.&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
any links go here&lt;/div&gt;</summary>
		<author><name>Mountainlion</name></author>
	</entry>
	<entry>
		<id>https://wiki.hope.net/index.php?title=Plausible_Deniability_and_Cryptocurrency_Privacy_Workshop&amp;diff=1532</id>
		<title>Plausible Deniability and Cryptocurrency Privacy Workshop</title>
		<link rel="alternate" type="text/html" href="https://wiki.hope.net/index.php?title=Plausible_Deniability_and_Cryptocurrency_Privacy_Workshop&amp;diff=1532"/>
		<updated>2022-07-21T06:05:13Z</updated>

		<summary type="html">&lt;p&gt;Mountainlion: /* Full Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Plausible Deniability and Cryptocurrency Privacy workshop =&lt;br /&gt;
&lt;br /&gt;
This workshop will be given:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Day 1: Friday, 22-July-2022, 7:30pm - 10:30pm, Workshop A (D&#039;Angelo 309)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:orange&amp;quot;&amp;gt;&#039;&#039;&#039;NOTE:  You do NOT need to register to take this workshop -- please show up early to ensure a seat at Workshop A (D&#039;Angelo 309).&#039;&#039;&#039;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
Hackers around the world use cryptocurrencies like bitcoin and ether every day under the mistaken assumption that these networks are somehow privacy-preserving (often conflating pseudonymity for privacy). This couldn&#039;t be further from the truth, as it is in fact often easier to trace crypto transactions than fiat transactions. Even so-called private networks like Zcash and Monero aren&#039;t failsafe from a privacy perspective. However, with a few tricks and tools it is possible to preserve privacy on cryptographic networks in a robust way. This workshop will present a brief history of privacy successes and failures in cryptocurrency and blockchain with important case studies, will demonstrate tracing and de-anonymization of actual transactions in real time, and will present tools and techniques for guaranteeing strong privacy.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presenter(s) ==&lt;br /&gt;
Lane Rettig&amp;lt;br&amp;gt;&lt;br /&gt;
Michelle Lai&amp;lt;br&amp;gt;&lt;br /&gt;
Arctic Byte&amp;lt;br&amp;gt;&lt;br /&gt;
Ahmed Ghappour&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Full Description ==&lt;br /&gt;
Understand where information about your activity may be leaked, across the stack: hardware, software, protocol, and network.&amp;lt;br/&amp;gt;&lt;br /&gt;
See case studies of how users were identified through their on-chain traces.&amp;lt;br/&amp;gt;&lt;br /&gt;
Learn a framework for how to think about what parts of a transaction can be made private.&amp;lt;br/&amp;gt; &lt;br /&gt;
Follow along as we demo tools to stay safe at a network level.&amp;lt;br/&amp;gt;&lt;br /&gt;
We will also demo some privacy-centric wallets and cryptocurrency protocols.&lt;br /&gt;
&lt;br /&gt;
== Registration -- NOT required == &lt;br /&gt;
&amp;lt;span style=&amp;quot;color:orange&amp;quot;&amp;gt;&#039;&#039;&#039;You do not need to register in advance to take this workshop -- just show up early to ensure a seat.&#039;&#039;&#039;:&amp;lt;/span&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Required Software ==&lt;br /&gt;
any required software goes here&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== What Participants Should Bring to the Workshop (if anything) ==&lt;br /&gt;
any optional or required stuff to bring go here&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
any links go here&lt;/div&gt;</summary>
		<author><name>Mountainlion</name></author>
	</entry>
	<entry>
		<id>https://wiki.hope.net/index.php?title=Plausible_Deniability_and_Cryptocurrency_Privacy_Workshop&amp;diff=1531</id>
		<title>Plausible Deniability and Cryptocurrency Privacy Workshop</title>
		<link rel="alternate" type="text/html" href="https://wiki.hope.net/index.php?title=Plausible_Deniability_and_Cryptocurrency_Privacy_Workshop&amp;diff=1531"/>
		<updated>2022-07-21T06:04:33Z</updated>

		<summary type="html">&lt;p&gt;Mountainlion: /* Full Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Plausible Deniability and Cryptocurrency Privacy workshop =&lt;br /&gt;
&lt;br /&gt;
This workshop will be given:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Day 1: Friday, 22-July-2022, 7:30pm - 10:30pm, Workshop A (D&#039;Angelo 309)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:orange&amp;quot;&amp;gt;&#039;&#039;&#039;NOTE:  You do NOT need to register to take this workshop -- please show up early to ensure a seat at Workshop A (D&#039;Angelo 309).&#039;&#039;&#039;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
Hackers around the world use cryptocurrencies like bitcoin and ether every day under the mistaken assumption that these networks are somehow privacy-preserving (often conflating pseudonymity for privacy). This couldn&#039;t be further from the truth, as it is in fact often easier to trace crypto transactions than fiat transactions. Even so-called private networks like Zcash and Monero aren&#039;t failsafe from a privacy perspective. However, with a few tricks and tools it is possible to preserve privacy on cryptographic networks in a robust way. This workshop will present a brief history of privacy successes and failures in cryptocurrency and blockchain with important case studies, will demonstrate tracing and de-anonymization of actual transactions in real time, and will present tools and techniques for guaranteeing strong privacy.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presenter(s) ==&lt;br /&gt;
Lane Rettig&amp;lt;br&amp;gt;&lt;br /&gt;
Michelle Lai&amp;lt;br&amp;gt;&lt;br /&gt;
Arctic Byte&amp;lt;br&amp;gt;&lt;br /&gt;
Ahmed Ghappour&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Full Description ==&lt;br /&gt;
Understand where information about your activity may be leaked, across the stack: hardware, software, protocol, and network.&amp;lt;br/&amp;gt;&lt;br /&gt;
See case studies of how users were identified through their on-chain traces. &lt;br /&gt;
Learn a framework for how to think about what parts of a transaction can be made private. &lt;br /&gt;
Follow along as we demo tools to stay safe at a network level. &lt;br /&gt;
We will also demo some privacy-centric wallets and cryptocurrency protocols.&lt;br /&gt;
&lt;br /&gt;
== Registration -- NOT required == &lt;br /&gt;
&amp;lt;span style=&amp;quot;color:orange&amp;quot;&amp;gt;&#039;&#039;&#039;You do not need to register in advance to take this workshop -- just show up early to ensure a seat.&#039;&#039;&#039;:&amp;lt;/span&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Required Software ==&lt;br /&gt;
any required software goes here&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== What Participants Should Bring to the Workshop (if anything) ==&lt;br /&gt;
any optional or required stuff to bring go here&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
any links go here&lt;/div&gt;</summary>
		<author><name>Mountainlion</name></author>
	</entry>
	<entry>
		<id>https://wiki.hope.net/index.php?title=Plausible_Deniability_and_Cryptocurrency_Privacy_Workshop&amp;diff=1530</id>
		<title>Plausible Deniability and Cryptocurrency Privacy Workshop</title>
		<link rel="alternate" type="text/html" href="https://wiki.hope.net/index.php?title=Plausible_Deniability_and_Cryptocurrency_Privacy_Workshop&amp;diff=1530"/>
		<updated>2022-07-21T06:03:54Z</updated>

		<summary type="html">&lt;p&gt;Mountainlion: /* Full Description */&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Plausible Deniability and Cryptocurrency Privacy workshop =&lt;br /&gt;
&lt;br /&gt;
This workshop will be given:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Day 1: Friday, 22-July-2022, 7:30pm - 10:30pm, Workshop A (D&#039;Angelo 309)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:orange&amp;quot;&amp;gt;&#039;&#039;&#039;NOTE:  You do NOT need to register to take this workshop -- please show up early to ensure a seat at Workshop A (D&#039;Angelo 309).&#039;&#039;&#039;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
Hackers around the world use cryptocurrencies like bitcoin and ether every day under the mistaken assumption that these networks are somehow privacy-preserving (often conflating pseudonymity for privacy). This couldn&#039;t be further from the truth, as it is in fact often easier to trace crypto transactions than fiat transactions. Even so-called private networks like Zcash and Monero aren&#039;t failsafe from a privacy perspective. However, with a few tricks and tools it is possible to preserve privacy on cryptographic networks in a robust way. This workshop will present a brief history of privacy successes and failures in cryptocurrency and blockchain with important case studies, will demonstrate tracing and de-anonymization of actual transactions in real time, and will present tools and techniques for guaranteeing strong privacy.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presenter(s) ==&lt;br /&gt;
Lane Rettig&amp;lt;br&amp;gt;&lt;br /&gt;
Michelle Lai&amp;lt;br&amp;gt;&lt;br /&gt;
Arctic Byte&amp;lt;br&amp;gt;&lt;br /&gt;
Ahmed Ghappour&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Full Description ==&lt;br /&gt;
Understand where information about your activity may be leaked, across the stack: hardware, software, protocol, and network. &lt;br /&gt;
See case studies of how users were identified through their on-chain traces. &lt;br /&gt;
Learn a framework for how to think about what parts of a transaction can be made private. &lt;br /&gt;
Follow along as we demo tools to stay safe at a network level. &lt;br /&gt;
We will also demo some privacy-centric wallets and cryptocurrency protocols.&lt;br /&gt;
&lt;br /&gt;
== Registration -- NOT required == &lt;br /&gt;
&amp;lt;span style=&amp;quot;color:orange&amp;quot;&amp;gt;&#039;&#039;&#039;You do not need to register in advance to take this workshop -- just show up early to ensure a seat.&#039;&#039;&#039;:&amp;lt;/span&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Required Software ==&lt;br /&gt;
any required software goes here&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== What Participants Should Bring to the Workshop (if anything) ==&lt;br /&gt;
any optional or required stuff to bring go here&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
any links go here&lt;/div&gt;</summary>
		<author><name>Mountainlion</name></author>
	</entry>
	<entry>
		<id>https://wiki.hope.net/index.php?title=Plausible_Deniability_and_Cryptocurrency_Privacy_Workshop&amp;diff=1529</id>
		<title>Plausible Deniability and Cryptocurrency Privacy Workshop</title>
		<link rel="alternate" type="text/html" href="https://wiki.hope.net/index.php?title=Plausible_Deniability_and_Cryptocurrency_Privacy_Workshop&amp;diff=1529"/>
		<updated>2022-07-21T06:03:28Z</updated>

		<summary type="html">&lt;p&gt;Mountainlion: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Plausible Deniability and Cryptocurrency Privacy workshop =&lt;br /&gt;
&lt;br /&gt;
This workshop will be given:&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;amp;nbsp;&amp;amp;nbsp;&amp;amp;nbsp;Day 1: Friday, 22-July-2022, 7:30pm - 10:30pm, Workshop A (D&#039;Angelo 309)&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;span style=&amp;quot;color:orange&amp;quot;&amp;gt;&#039;&#039;&#039;NOTE:  You do NOT need to register to take this workshop -- please show up early to ensure a seat at Workshop A (D&#039;Angelo 309).&#039;&#039;&#039;&amp;lt;br&amp;gt;&lt;br /&gt;
&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Abstract ==&lt;br /&gt;
Hackers around the world use cryptocurrencies like bitcoin and ether every day under the mistaken assumption that these networks are somehow privacy-preserving (often conflating pseudonymity for privacy). This couldn&#039;t be further from the truth, as it is in fact often easier to trace crypto transactions than fiat transactions. Even so-called private networks like Zcash and Monero aren&#039;t failsafe from a privacy perspective. However, with a few tricks and tools it is possible to preserve privacy on cryptographic networks in a robust way. This workshop will present a brief history of privacy successes and failures in cryptocurrency and blockchain with important case studies, will demonstrate tracing and de-anonymization of actual transactions in real time, and will present tools and techniques for guaranteeing strong privacy.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Presenter(s) ==&lt;br /&gt;
Lane Rettig&amp;lt;br&amp;gt;&lt;br /&gt;
Michelle Lai&amp;lt;br&amp;gt;&lt;br /&gt;
Arctic Byte&amp;lt;br&amp;gt;&lt;br /&gt;
Ahmed Ghappour&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Full Description ==&lt;br /&gt;
Understand where information about your activity may be leaked, across the stack: hardware, software, protocol, and network. See case studies of how users were identified through their on-chain traces. Learn a framework for how to think about what parts of a transaction can be made private. Follow along as we demo tools to stay safe at a network level. We will also demo some privacy-centric wallets and cryptocurrency protocols.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Registration -- NOT required == &lt;br /&gt;
&amp;lt;span style=&amp;quot;color:orange&amp;quot;&amp;gt;&#039;&#039;&#039;You do not need to register in advance to take this workshop -- just show up early to ensure a seat.&#039;&#039;&#039;:&amp;lt;/span&amp;gt;&amp;lt;br&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Required Software ==&lt;br /&gt;
any required software goes here&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== What Participants Should Bring to the Workshop (if anything) ==&lt;br /&gt;
any optional or required stuff to bring go here&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
== Links ==&lt;br /&gt;
any links go here&lt;/div&gt;</summary>
		<author><name>Mountainlion</name></author>
	</entry>
</feed>