Plausible Deniability and Cryptocurrency Privacy Workshop: Difference between revisions
No edit summary |
Mountainlion (talk | contribs) No edit summary |
||
(7 intermediate revisions by the same user not shown) | |||
Line 6: | Line 6: | ||
<span style="color:orange">'''NOTE: You do NOT need to register to take this workshop -- please show up early to ensure a seat at Workshop A (D'Angelo 309).'''<br> | <span style="color:orange">'''NOTE: You do NOT need to register to take this workshop -- please show up early to ensure a seat at Workshop A (D'Angelo 309).'''<br> | ||
<br> | <br> | ||
== Presenter(s) == | == Presenter(s) == | ||
Line 18: | Line 13: | ||
Ahmed Ghappour | Ahmed Ghappour | ||
== Abstract == | |||
Hackers around the world use cryptocurrencies like bitcoin and ether every day under the mistaken assumption that these networks are somehow privacy-preserving (often conflating pseudonymity for privacy). This couldn't be further from the truth, as it is in fact often easier to trace crypto transactions than fiat transactions. Even so-called private networks like Zcash and Monero aren't failsafe from a privacy perspective. However, with a few tricks and tools it is possible to preserve privacy on cryptographic networks in a robust way. This workshop will present a brief history of privacy successes and failures in cryptocurrency and blockchain with important case studies, will demonstrate tracing and de-anonymization of actual transactions in real time, and will present tools and techniques for guaranteeing strong privacy. | |||
== | == Workshop Agenda == | ||
Understand where information about your activity may be leaked, across the stack: hardware, software, protocol, and network.<br/> | |||
See case studies of how users were identified through their on-chain traces.<br/> | |||
Learn a framework for how to think about what parts of a transaction can be made private.<br/> | |||
Follow along as we demo tools to stay safe at a network level.<br/> | |||
We will also demo some privacy-centric wallets and cryptocurrency protocols. | |||
== Registration -- NOT required == | == Registration -- NOT required == | ||
<span style="color:orange">'''You do not need to register in advance to take this workshop -- just show up early to ensure a seat.''':</span><br> | <span style="color:orange">'''You do not need to register in advance to take this workshop -- just show up early to ensure a seat.''':</span><br> | ||
== What Participants Should Bring to the Workshop (if anything) == | == What Participants Should Bring to the Workshop (if anything) == | ||
If you'd like, bring a laptop with a browser wallet funded with some change. | |||
Latest revision as of 06:08, 21 July 2022
Plausible Deniability and Cryptocurrency Privacy workshop
This workshop will be given:
Day 1: Friday, 22-July-2022, 7:30pm - 10:30pm, Workshop A (D'Angelo 309)
NOTE: You do NOT need to register to take this workshop -- please show up early to ensure a seat at Workshop A (D'Angelo 309).
Presenter(s)
Lane Rettig
Michelle Lai
Arctic Byte
Ahmed Ghappour
Abstract
Hackers around the world use cryptocurrencies like bitcoin and ether every day under the mistaken assumption that these networks are somehow privacy-preserving (often conflating pseudonymity for privacy). This couldn't be further from the truth, as it is in fact often easier to trace crypto transactions than fiat transactions. Even so-called private networks like Zcash and Monero aren't failsafe from a privacy perspective. However, with a few tricks and tools it is possible to preserve privacy on cryptographic networks in a robust way. This workshop will present a brief history of privacy successes and failures in cryptocurrency and blockchain with important case studies, will demonstrate tracing and de-anonymization of actual transactions in real time, and will present tools and techniques for guaranteeing strong privacy.
Workshop Agenda
Understand where information about your activity may be leaked, across the stack: hardware, software, protocol, and network.
See case studies of how users were identified through their on-chain traces.
Learn a framework for how to think about what parts of a transaction can be made private.
Follow along as we demo tools to stay safe at a network level.
We will also demo some privacy-centric wallets and cryptocurrency protocols.
Registration -- NOT required
You do not need to register in advance to take this workshop -- just show up early to ensure a seat.:
What Participants Should Bring to the Workshop (if anything)
If you'd like, bring a laptop with a browser wallet funded with some change.