Plausible Deniability and Cryptocurrency Privacy Workshop: Difference between revisions

From HOPE Wiki
No edit summary
 
(8 intermediate revisions by 2 users not shown)
Line 6: Line 6:
<span style="color:orange">'''NOTE:  You do NOT need to register to take this workshop -- please show up early to ensure a seat at Workshop A (D'Angelo 309).'''<br>
<span style="color:orange">'''NOTE:  You do NOT need to register to take this workshop -- please show up early to ensure a seat at Workshop A (D'Angelo 309).'''<br>
<br>
<br>
== Abstract ==
Hackers around the world use cryptocurrencies like bitcoin and ether every day under the mistaken assumption that these networks are somehow privacy-preserving (often conflating pseudonymity for privacy). This couldn't be further from the truth, as it is in fact often easier to trace crypto transactions than fiat transactions. Even so-called private networks like Zcash and Monero aren't failsafe from a privacy perspective. However, with a few tricks and tools it is possible to preserve privacy on cryptographic networks in a robust way. This workshop will present a brief history of privacy successes and failures in cryptocurrency and blockchain with important case studies, will demonstrate tracing and de-anonymization of actual transactions in real time, and will present tools and techniques for guaranteeing strong privacy.


== Presenter(s) ==
== Presenter(s) ==
Line 18: Line 13:
Ahmed Ghappour
Ahmed Ghappour


== Abstract ==
Hackers around the world use cryptocurrencies like bitcoin and ether every day under the mistaken assumption that these networks are somehow privacy-preserving (often conflating pseudonymity for privacy). This couldn't be further from the truth, as it is in fact often easier to trace crypto transactions than fiat transactions. Even so-called private networks like Zcash and Monero aren't failsafe from a privacy perspective. However, with a few tricks and tools it is possible to preserve privacy on cryptographic networks in a robust way. This workshop will present a brief history of privacy successes and failures in cryptocurrency and blockchain with important case studies, will demonstrate tracing and de-anonymization of actual transactions in real time, and will present tools and techniques for guaranteeing strong privacy.


== Full Description ==
== Workshop Agenda ==
full description text goes here
Understand where information about your activity may be leaked, across the stack: hardware, software, protocol, and network.<br/>
 
See case studies of how users were identified through their on-chain traces.<br/>
Learn a framework for how to think about what parts of a transaction can be made private.<br/>
Follow along as we demo tools to stay safe at a network level.<br/>
We will also demo some privacy-centric wallets and cryptocurrency protocols.


== Registration -- NOT required ==  
== Registration -- NOT required ==  
<span style="color:orange">'''You do not need to register in advance to take this workshop -- just show up early to ensure a seat.''':</span><br>
<span style="color:orange">'''You do not need to register in advance to take this workshop -- just show up early to ensure a seat.''':</span><br>
== Required Software ==
any required software goes here


== What Participants Should Bring to the Workshop (if anything) ==
== What Participants Should Bring to the Workshop (if anything) ==
any optional or required stuff to bring go here
If you'd like, bring a laptop with a browser wallet funded with some change.
 
== Links ==
any links go here

Latest revision as of 06:08, 21 July 2022

Plausible Deniability and Cryptocurrency Privacy workshop

This workshop will be given:
   Day 1: Friday, 22-July-2022, 7:30pm - 10:30pm, Workshop A (D'Angelo 309)

NOTE: You do NOT need to register to take this workshop -- please show up early to ensure a seat at Workshop A (D'Angelo 309).

Presenter(s)

Lane Rettig
Michelle Lai
Arctic Byte
Ahmed Ghappour

Abstract

Hackers around the world use cryptocurrencies like bitcoin and ether every day under the mistaken assumption that these networks are somehow privacy-preserving (often conflating pseudonymity for privacy). This couldn't be further from the truth, as it is in fact often easier to trace crypto transactions than fiat transactions. Even so-called private networks like Zcash and Monero aren't failsafe from a privacy perspective. However, with a few tricks and tools it is possible to preserve privacy on cryptographic networks in a robust way. This workshop will present a brief history of privacy successes and failures in cryptocurrency and blockchain with important case studies, will demonstrate tracing and de-anonymization of actual transactions in real time, and will present tools and techniques for guaranteeing strong privacy.

Workshop Agenda

Understand where information about your activity may be leaked, across the stack: hardware, software, protocol, and network.
See case studies of how users were identified through their on-chain traces.
Learn a framework for how to think about what parts of a transaction can be made private.
Follow along as we demo tools to stay safe at a network level.
We will also demo some privacy-centric wallets and cryptocurrency protocols.

Registration -- NOT required

You do not need to register in advance to take this workshop -- just show up early to ensure a seat.:

What Participants Should Bring to the Workshop (if anything)

If you'd like, bring a laptop with a browser wallet funded with some change.