Plausible Deniability and Cryptocurrency Privacy Workshop: Difference between revisions
No edit summary |
|||
Line 9: | Line 9: | ||
== Abstract == | == Abstract == | ||
Hackers around the world use cryptocurrencies like bitcoin and ether every day under the mistaken assumption that these networks are somehow privacy-preserving (often conflating pseudonymity for privacy). This couldn't be further from the truth, as it is in fact often easier to trace crypto transactions than fiat transactions. Even so-called private networks like Zcash and Monero aren't failsafe from a privacy perspective. However, with a few tricks and tools it is possible to preserve privacy on cryptographic networks in a robust way. This workshop will present a brief history of privacy successes and failures in cryptocurrency and blockchain with important case studies, will demonstrate tracing and de-anonymization of actual transactions in real time, and will present tools and techniques for guaranteeing strong privacy. | |||
Revision as of 16:01, 16 July 2022
Plausible Deniability and Cryptocurrency Privacy workshop
This workshop will be given:
Day 1: Friday, 22-July-2022, 7:30pm - 10:30pm, Workshop A (D'Angelo 309)
NOTE: You do NOT need to register to take this workshop -- please show up early to ensure a seat at Workshop A (D'Angelo 309).
Abstract
Hackers around the world use cryptocurrencies like bitcoin and ether every day under the mistaken assumption that these networks are somehow privacy-preserving (often conflating pseudonymity for privacy). This couldn't be further from the truth, as it is in fact often easier to trace crypto transactions than fiat transactions. Even so-called private networks like Zcash and Monero aren't failsafe from a privacy perspective. However, with a few tricks and tools it is possible to preserve privacy on cryptographic networks in a robust way. This workshop will present a brief history of privacy successes and failures in cryptocurrency and blockchain with important case studies, will demonstrate tracing and de-anonymization of actual transactions in real time, and will present tools and techniques for guaranteeing strong privacy.
Presenter(s)
presenter name(s) go here
Full Description
full description text goes here
Registration -- NOT required
You do not need to register in advance to take this workshop -- just show up early to ensure a seat.:
Required Software
any required software goes here
Links
any links go here